(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 11 Issue: 02, December 2012

Fingerprint Template Protection using Steganography Sangam

Manoj Diwakar

Pratibha Sharma

Mody Institute of Technology & Science, Lakshmangarh

Mody Institute of Technology & Science, Lakshmangarh

Mody Institute of Technology & Science, Lakshmangarh

secure. In this approach another fingerprint of human itself is used as key image of steganography. Here both thumb impression of the user are taken. One thumb impression is fingerprint image and another one act as key image for that particular fingerprint image. To increase security fingerprint image is not used directly for steganography. First using a key image one thumb impression is secured. In second step another thumb impression is secured using the key image. In third step one thumb impression is act as image and another one is act as key image. As fingerprint of human are unique so in this security process fingerprint template and the key image both are unique. It increases security of the fingerprint template database and make authentication reliable. In this approach LSB algorithm with slight modification is used.

Abstract- Fingerprint is considered as unique id of human being. A fingerprint authentication system should be vulnerable to variety of attacks. In fingerprint authentication system the key element in which security is needed is fingerprint template database. In this paper we propose a scheme to secure fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make authentication of user reliable.

I. INTRODUCTION Authentication of user is very important task in today’s web enabled world. Reliable authentication of user is very much needed. Error in authentication of user means recognizing user incorrectly undermine system integrity. For example applications like airport security, international border security, internet banking, driving license delivery etc, hence for maintaining system integrity correct authentication of user is important. There are several methods for user authentication like password protection, unique ID, biometric authentication. Among all these methods biometric authentication is considered as most reliable. Biometric authentication includes fingerprint authentication, iris authentication etc. In recent days fingerprint authentication is used very vastly as fingerprint authentication is considered as one of the most reliable security systems. To increase reliability of fingerprint authentication system security of fingerprint template database is needed. Fingerprint template database security has main difficulty of fuzziness as it is not exact, so cryptographic techniques are difficult to apply. To secure fingerprint template steganography can be used. In steganography security fingerprint image is encoded with a key image. Fingerprint image is hiding into a key image. In steganography security the main key element is the key image. So the key image should be

II.

FINGERPRINT TEMPLATE INFORMATION A template is set of salient feature. A fingerprint template consists of salient features of fingerprint. It summarizes the data of fingerprint. Template is in compact form and contains all information about the fingerprint of user. As it is in compact form generally it is assumed that it does not contain all information. Template contains all information in compact form so it is easy to maintain a template instead of fingerprint image. In fingerprint authentication system, there is a database which store fingerprint template of all users with their unique id. Security of this database is an crucial task in fingerprint authentication system. To secure the database templates are not stored directly, some security operations are applied on it. Several methods are available for template security such encryption, watermarking, steganography. In this system steganography is applied on templates for security, to enhance security of system

©IJEECS

(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 11 Issue: 02, December 2012

steganography is applied two times. Steganographed templates are difficult to analyze by attacker.

palette color should be minimum. Another solution for this problem is to add more palettes of almost visually same to existing colors. After adding more template cover image can be chosen easily but if there is any tempering with palette, it becomes very easy to detect. To overcome this problem grey scale images should be used. In an 8-bit gray scale image changes in color is very gradual so it is very hard to detect. There are many approaches to perform LSB, most simplest is OPA(optimum pixel adjustment). Steps of OPA are as follows: (1) Few LSB bits of image to be hidden are substituted. (2) To minimize the error pixels are arranged by putting hidden bits before the pixels of cover image. (3) For adjustment in pixels: if(d1~d2)<=(2^n)/2 then no adjustment else if(d1

Fingerprint Template Protection using Steganography

fingerprint authentication system the key element in ... fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make .... Management(IJSPTM), Vol. 1.

47KB Sizes 0 Downloads 306 Views

Recommend Documents

Steganography Using The Twelve Square Substitution Cipher.pdf ...
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Steganograph ... n Cipher.pdf. Steganograph ... n Cipher.pdf. Open. Extract. Open with. Sign I

Fingerprint Indexing Using Ridge Invariants
Indexing large fingerprint databases is an ... fingerprint in the database with M fingerprints. When ..... Analysis and Machine Intelligence, 1999, 21 (4), pp.

FM Model Based Fingerprint Reconstruction from Minutiae Template
Michigan State University. {jfeng ... been evaluated with respect to the success rates of type-I attack (match the recon- structed fingerprint .... cal goal is to estimate the FM representation of the original fingerprint, cos(Ψ(x, y)). To obtain th

Fingerprint matching using ridges
(2) The solid-state sensors are increasingly used, which capture only a portion ... file is small. We have ... the ridge-based system will not degrade dramatically.

Video steganography
Jul 11, 2003 - ing, resampling, conversion from digital to analog and back again, etc. ...... 855-884. Pitas et al., “Applying Signatures on Digital Images,” IEEE.

Video steganography
Jul 11, 2003 - Design of Hidden Transmission,” Radioengineering, vol. 4,. No. 2, Jun. .... Communications—a Tutorial RevieW—Part I,” IEEE Com munications .... [ASSIGN EITHER A 0 OR A I TO EACH CROSS-CORRELATION RESULT.

Implementation of Audio Steganography over Two Level LSB Using ...
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63. Anil Soni, IJRIT. 56 ..... Systems Journal, Volume 39 , Issue 3-4, July 2000, pp. 547 – 568. [5] W Bender, D Gruhl, N Morimoto, A Lu, Tech

Fingerprint Recognition Using Minutiae Score Matching
speech, gait, signature) characteristics, called biometric identifiers or traits or .... lies in the pre processing of the bad quality of fingerprint images which also add to the low ... Images Using Oriented Diffusion”, IEEE Computer Society on Di

Review on Fingerprint Recognition System Using Minutiae ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, ... it a personal identification and ,thus have a number of disadvantages like tokens.

Lightpath Protection using Genetic Algorithm ... - Semantic Scholar
virtual topology onto the physical topology so as to minimize the failure ... applications and high speed computer networks because of huge bandwidth of optical ...

Lightpath Protection using Genetic Algorithm ... - Semantic Scholar
connectivity between two nodes in the network following a failure by mapping ... applications and high speed computer networks because of huge bandwidth of ...

pdf steganography techniques
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf steganography techniques. pdf steganography techniques.

CycleGAN, a Master of Steganography
Dec 16, 2017 - strate an intriguing property of the model: CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high- frequency signal. This trick ensures that the generator can recove

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

Fingerprint Authentication in Action - GitHub
My name is Ben Oberkfell, I'm an Android developer at American Express on the US ... developer.android.com/resources/dashboard/screens.html ... Page 10 ...

FBI Fingerprint Waiver.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Emulsion products and imagery employing steganography
Nov 22, 2005 - AND DIGITAL SPACING OF ORIGINAL DIGITAL SIGNAL OR IMAGE ..... Bors et al., “Embedding Parametric Digital Signatures in. Images ...

steganography Art of Covert Communications, Streetman.pdf ...
Whoops! There was a problem loading more pages. steganography Art of Covert Communications, Streetman.pdf. steganography Art of Covert Communications ...

Tightening DGNSS Protection Levels Using Direct ...
(9). Using equation (9) introduces additional conservatism with each convolution. It seems plausible that, for non-Gaussian distributions, a tighter bound might .... ¯pdP DB(Ex). This overbound, plotted as a solid line in. Figure 2, has a smaller st

Lightpath Protection using Genetic Algorithm through ...
... Jadavpur University, Kolkata – 700032, India. *Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata – 700032, India.