(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 11 Issue: 02, December 2012
Fingerprint Template Protection using Steganography Sangam
Manoj Diwakar
Pratibha Sharma
Mody Institute of Technology & Science, Lakshmangarh
Mody Institute of Technology & Science, Lakshmangarh
Mody Institute of Technology & Science, Lakshmangarh
secure. In this approach another fingerprint of human itself is used as key image of steganography. Here both thumb impression of the user are taken. One thumb impression is fingerprint image and another one act as key image for that particular fingerprint image. To increase security fingerprint image is not used directly for steganography. First using a key image one thumb impression is secured. In second step another thumb impression is secured using the key image. In third step one thumb impression is act as image and another one is act as key image. As fingerprint of human are unique so in this security process fingerprint template and the key image both are unique. It increases security of the fingerprint template database and make authentication reliable. In this approach LSB algorithm with slight modification is used.
Abstract- Fingerprint is considered as unique id of human being. A fingerprint authentication system should be vulnerable to variety of attacks. In fingerprint authentication system the key element in which security is needed is fingerprint template database. In this paper we propose a scheme to secure fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make authentication of user reliable.
I. INTRODUCTION Authentication of user is very important task in today’s web enabled world. Reliable authentication of user is very much needed. Error in authentication of user means recognizing user incorrectly undermine system integrity. For example applications like airport security, international border security, internet banking, driving license delivery etc, hence for maintaining system integrity correct authentication of user is important. There are several methods for user authentication like password protection, unique ID, biometric authentication. Among all these methods biometric authentication is considered as most reliable. Biometric authentication includes fingerprint authentication, iris authentication etc. In recent days fingerprint authentication is used very vastly as fingerprint authentication is considered as one of the most reliable security systems. To increase reliability of fingerprint authentication system security of fingerprint template database is needed. Fingerprint template database security has main difficulty of fuzziness as it is not exact, so cryptographic techniques are difficult to apply. To secure fingerprint template steganography can be used. In steganography security fingerprint image is encoded with a key image. Fingerprint image is hiding into a key image. In steganography security the main key element is the key image. So the key image should be
II.
FINGERPRINT TEMPLATE INFORMATION A template is set of salient feature. A fingerprint template consists of salient features of fingerprint. It summarizes the data of fingerprint. Template is in compact form and contains all information about the fingerprint of user. As it is in compact form generally it is assumed that it does not contain all information. Template contains all information in compact form so it is easy to maintain a template instead of fingerprint image. In fingerprint authentication system, there is a database which store fingerprint template of all users with their unique id. Security of this database is an crucial task in fingerprint authentication system. To secure the database templates are not stored directly, some security operations are applied on it. Several methods are available for template security such encryption, watermarking, steganography. In this system steganography is applied on templates for security, to enhance security of system
©IJEECS
(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 11 Issue: 02, December 2012
steganography is applied two times. Steganographed templates are difficult to analyze by attacker.
palette color should be minimum. Another solution for this problem is to add more palettes of almost visually same to existing colors. After adding more template cover image can be chosen easily but if there is any tempering with palette, it becomes very easy to detect. To overcome this problem grey scale images should be used. In an 8-bit gray scale image changes in color is very gradual so it is very hard to detect. There are many approaches to perform LSB, most simplest is OPA(optimum pixel adjustment). Steps of OPA are as follows: (1) Few LSB bits of image to be hidden are substituted. (2) To minimize the error pixels are arranged by putting hidden bits before the pixels of cover image. (3) For adjustment in pixels: if(d1~d2)<=(2^n)/2 then no adjustment else if(d1
III. LSB ALGORITHM There are several algorithms available for steganography such as LSB, Jseg, F5 etc. In this security system improved LSB is used. This is the simplest form of image steganography. In this method basically the least significant bit of each pixel of key image is substituted by the bit value of image to be hide. This method flips the least significant value of the key image to show the effect of the image need to be hide. For example given are 8 sequential pixel values of key image: 11000101 10000011 11000010 10101010 10101001 11100111 10100000 10000110 Pixel value of the image to be hide is 11010101. LSB flips bits as following: 11000101 10000011 11000010 10101011 10101000 11100111 10100000 10000111 This is the simplest way to apply this algorithm. To make this method more secure certain pixels are to be changed. Change in certain pixels instead of sequential change, is difficult to detect. This approach makes use of BMP images. These images uses lossless compression. To hide an image in a BMP image large cover size image is needed. Another format which can be used to hide an image is GIF. GIF is a palette based image, in this colors used in images are stored in palettes. As GIF format images has maximum pixel depth is 8 bit so maximum number of colors an image can store is 256. In using GIF image as cover image problem that may occur is that change in least significant bit of pixel, can be result in a completely different color. One solution to minimize this problem is to sort palette such that difference between consecutive
IV. PROPOSED SCHEME In this paper we propose a method to secure fingerprint templates using stegnography. In this method to increase security of fingerprint template steganography is used at two levels.
©IJEECS
(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 11 Issue: 02, December 2012
Fingerprint scanner
LSB method
DATABASE
Key image
(d) Output image of this steganography algorithm is the secured fingerprint template and it is saved to database. In this method steganography is applied two times on the fingerprint image. In first step a key image is used for steganography. One thumb impression is hide in the cover image. Another thumb impression is also hide into the same cover image. Output of this step are two images in one image one fingerprint image is hidden and in another image another fingerprint image is hidden. In second step these two images are given to steganography algorithm. One image act as cover image and another one is hide in it. Output of this step is secured fingerprint template. This fingerprint template is saved into database.
LSB method
Right fingerprint after LSB
Left fingerprint after s LSB
method
method
Secured fingerprint template
Apply LSB method
This fingerprint template is further used for authentication of user. User’s fingerprint template is saved with user’s unique id. When a user authenticate himself/herself user’s both thumb impression are taken and then the above process is applied on the fingerprints. after applying above operations a fingerprint template is generated. This template is matched with the template saved in the database using unique id of the user. This scheme provide security to the fingerprint database using steganography. Security of fingerprint template database is very important to protect. V.
Figure 1. Proposed Scheme Flow
CONCLUSION
This paper presents an approach to secure fingerprint template database using steganography. In this paper we discuused about why security is needed for the system and how template security is useful in reliable authentication. In this paper an approach to increase secutiry of template is presented. In order to increase security of the database steganography is applied in two levels. For increasing reliability two fingerprints of the user are taken and both are used for authentication.
In this method left thumb impression and right thumb impression are used. Fingerprint scanner is used to scan fingerprint of user. Fingerprint template security is done in following steps: (a) Left thumb impression and a key image is used to steganograph the image. (b) Right thumb impression and the key image is used to steganographed the image. (c) Output of these two steganography algorithm is two images. Steganography algorithm is applied on these images considering one image as key image.
VI. REFERENCES [1] Ruifang Wang, Xin Yang, Xia Liu, Sujing Zhou, Peng Li, Kai Cao and Jie Tain, “A Novel Fingerprint Template Protection Scheme Based on Distance
©IJEECS
(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 11 Issue: 02, December 2012
Projection Coding”, 2010 International Conference on Pattern Recognition [2] Rosziati Ibrahim, Teoh Suk Kuan, “ Steganography Algorithm to Hide Secret Message inside an Image”, Computer Technology and Application 2 (2011) 102-108 [3] Dr. M.Umamaheswari, Prof. S. Sivasubramanian, S. Pandiarajan, “Analysis of Different Steganographic Algorithms for Secured Data Hiding”, IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 8, August 2010 [4] Prof. Akhil Khare, Meenu Kumari, Pallavi Khare, “Efficient Algorithm for Digital Image Steganography”, Journal of Information, Knowedge and Research in Computer Science and Applications [5] Chander Kant, Rajender Nath Sheetal Chaudhary, “Biometric Security using Steganography”, International Journal of Security, Volume(2) [6] Shanthini, B. and S. Swamynathan, “ Multimodal Biometric-based Secured Authentication System using Steganography”, Journal of Computer Science 8(7): 1012-1021,2012 [7]Nicholas J. Hopper John Langford, Luis Von Ahn, “Provably Secure Steganography”, CMU-CS-02-149 [8] S.Brindha, Ila. Vennila,”Hiding Fingerprint in Face using Scattered LSB Embedding Steganographic Technique for Smart Card based Authentication system”, International Journal of Computer Application(0975-8887) Volume 26 [9]http://www.scribd.com/doc/48764974/Steganogra phy-Data-hiding-using-LSB-algorithm [10] Anil K. Jain, Arun Ross, Umut Uludag, “Biometric Template Security: Challenges and Solutions”, Proceedings of European Signal Processing Conference(EUSIPCO), September 2005 [11] A.E. Mustafa, A.M.F.ElGamal, M.E. ElAlmi, Ahmed. BD, “A Proposed Algorithm for Steganography in Digital Image Based on Least Significant Bit” [12] Kousik Dasgupta, J.K. Mandal, Paramartha Dutta, “Hash Based Least Significant Bit Technique for Video Steganography(HLSB)”, International Journal of Security, Privacy and Trust Management(IJSPTM), Vol. 1
©IJEECS