Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Biometrics Security using Steganography
Chander Kant, Ranjender Nath, Sheetal Chaudhary
Pages - 1 - 5 | Revised - 15-02-2008 | Published - 30-02-2008
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
biometric, steganography, cryptography, encoding, decoding
ABSTRACT
A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the
security afforded by the system or to put off the normal functioning of the system. Various risks
have been discovered while using biometric system. Proper use of cryptography greatly reduces
the risks in biometric systems as the hackers have to find both secret key and template. It is
notified that still fraudrant goes on to some extent. Here in this paper a new idea is presented to
make system more secure by use of steganography. Here the secret key (which is in the form of
pixel intensities) will be merged in the picture itself while encoding, and at decoding end only the
authentic user will be allowed to decode.
1 | Chakdar, D., Gope, G., Talukdar, A., Avasthi, D. K., & Nath, S. S. (2016). Optical absorption and luminescence study of ZnS quantum dots. une, 13, 15. |
2 | Wójtowicz, W. Wykorzystanie technik biometrycznych do tworzenia cyfrowych znaków wodnych. |
3 | Patil, S., Bhosale, S., & Patil, S. (2015). A Two Fold Approach to Store and Share Secrete Data for Groups in Cloud. IJETT, 2(2). |
4 | Vegh, L., & Miclea, L. Improving the Security of a Cyber-Physical System using Cryptography, Steganography and Digital Signatures. |
5 | Arjunwadkar, M. V. (2015). The knowledge based intrusion detection and prevention model for biometric system. |
6 | Gobi, M., & Kannan, D. (2015). A Secured Public Key Cryptosystem for Biometric Encryption. International Journal of Computer Science and Network Security (IJCSNS), 15(1), 49. |
7 | Tripathy, A., & Kumar, D. Image Steganography By Using Integer Wavelet Transform And Genetic Algorithm To Perform Text Based Hiding Behind Gray Scaled or Colored Image. |
8 | Wójtowicz, W., & Ogiela, M. R. (2014). Biometric watermarks based on face recognition methods for authentication of digital images. Security and Communication Networks. |
9 | Vegh, L., & Miclea, L. (2014, May). Securing communication in cyber-physical systems using steganography and cryptography. In Communications (COMM), 2014 10th International Conference on (pp. 1-4). IEEE. |
10 | Ogiela, M. R. (2014). New Directions in Cognitive Cryptography. Journal of Convergence Volume, 5(3). |
11 | Barkathunisha, S., & Meenakumari, R. (2013, April). Secure transmission of medical information using IRIS recognition and steganography. In Computation of Power, Energy, Information and Communication (ICCPEIC), 2013 International Conference on (pp. 89-92). IEEE.Pawar, A., Kumbhare, T., & Murkute, P. Enhancing Iris Scanning Using Visual Cryptography. |
12 | Rahmes, M., Wilder, K., & Fox, K. (2013, May). A multi-resolution fractal additive scheme for blind watermarking of 3D point data. In SPIE Defense, Security, and Sensing (pp. 87570G-87570G). International Society for Optics and Photonics. |
13 | Roja, M. M., & Sawarkar, S. (2013). ElGamel Encryption for Biometric Database Protection. International Journal of Computer Applications, 68(6). |
14 | ManiRoja, M., & Sawarkar, S. (2013). Biometric Database Protection using Public Key Cryptography. International Journal of Computer Science and Network Security (IJCSNS), 13(5), 20. |
15 | Sinduja, R., Sathiya, R. D., & Vaithiyanathan, V. (2012, March). Sheltered iris attestation by means of Visual Cryptography (SIA-VC). In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 650-655). IEEE. |
16 | Shami, F., Shamsafar, F., & Seyedarabi, H. (2012). Securing Database of Biometric Systems. Database, 7, 6. |
17 | Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm. |
18 | Diwakar, M., & Sharma, P. Fingerprint Template Protection using Steganography. |
19 | Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT. |
20 | KITM, K., & HCTM, K. Secure Personal Recognition System based on Hashes Keys. |
21 | Paunwala, M. C., & Patnaik, S. (2011). Biometric Template Protection With Robust Semi–Blind Watermarking Using Image Intrinsic Local Property. International Journal of Biometrics and Bioinformatics (IJBB), 5(2), 28. |
22 | Kathuria, M. (2010). Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography. International Journal of Computer Applications, 12(8), 1-5. |
23 | Revenkar, P. S., Anjum, A., & Gandhare, W. Z. (2010). Secure iris authentication using visual cryptography. arXiv preprint arXiv:1004.1748. |
24 | Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Photo-luminescence of CdSe quantum dots suspended in liquid paraffin. OPTOELECTRONICS AND ADVANCED MATERIALS-RAPID COMMUNICATIONS, 4(11), 1721-1723. |
25 | Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Fluorescence study of CdSe quantum dots suspended in liquid paraffin. Nano, 5(06), 357-359. |
26 | Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. International Journal of Computer Science and Security (IJCSS), 3(2), 113. |
27 | Kaur, M., & Sofat, S. (2009). A Review on Biometrics Security Breaches and Remedies. Biometrics and Bioinformatics, 1(8), 92-98. |
28 | S. Mansor,R bin Din, A. Samsudin. "Analysis of Natural Language Steganography". International Journal of Computer Science and Security (IJCSS), 3(2):62-153, 2009 |
29 | Nath, S. S., Chakdar, D., Gope, G., & Avasthi, D. K. (2008). Effect of 100 MeV nickel ions on silica coated ZnS quantum dots. Journal of Nanoelectronics and Optoelectronics, 3(2), 180-183. |
A. Adler, “Can images be regenerated from biometric templates?,” in Biometrics Consortium Conference, (Arlington, VA), September 2003. | |
A. K. Jain, Arun Ross and U. Uludag “Biometrics Template security: Challenges and solutions” in Proc. of European Signal Processing Conference September 2005. | |
A. K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999. | |
A. Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005. | |
Bosselares, R.Govaerts : Fast Hashing on the Pentium. Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology. Springer-Verlag, 1996 Pages: 298 - 312. | |
C. Soutar, “Biometric system security,” White Paper, Bioscrypt, http://www.bioscrypt.com. | |
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer- Verlag, 2003. | |
Parvinder Singh, Sudhir Batra, HR Sharma, “Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane”, WSEAS Transactions on Information Science and Applications”, issue 8, vol 2, Aug 2005, pp 1220-1227. | |
R. Cappelli, R. Erol, D. Maio, and D. Maltoni, “Synthetic fingerprint-image generation,” in Proc. Int’l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475–478, (Barcelona, Spain), September 2000. | |
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004. | |
U.K. Biometric Working Group, “Biometric security concerns,” Technical Report, CESG, September 2003, http://www.cesg.gov.uk/site/ast/biometrics/media/ BiometricSecurityConcerns.pdf. | |
Mr. Chander Kant
- India
ckverma@rediffmail.com
Mr. Ranjender Nath
- India
Mr. Sheetal Chaudhary
- India
|
|
|
|
View all special issues >> | |
|
|