Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29414


Select areas to restrict search in scientific publication database:
9998782
Biometric Steganography Using Variable Length Embedding
Abstract:
Recent growth in digital multimedia technologies has presented a lot of facilities in information transmission, reproduction and manipulation. Therefore, the concept of information security is one of the superior articles in the present day situation. The biometric information security is one of the information security mechanisms. It has the advantages as well as disadvantages. The biometric system is at risk to a range of attacks. These attacks are anticipated to bypass the security system or to suspend the normal functioning. Various hazards have been discovered while using biometric system. Proper use of steganography greatly reduces the risks in biometric systems from the hackers. Steganography is one of the fashionable information hiding technique. The goal of steganography is to hide information inside a cover medium like text, image, audio, video etc. through which it is not possible to detect the existence of the secret information. Here in this paper a new security concept has been established by making the system more secure with the help of steganography along with biometric security. Here the biometric information has been embedded to a skin tone portion of an image with the help of proposed steganographic technique.
Digital Object Identifier (DOI):

References:

[1] Eskicioglu, A.M.; Litwin, L."Cryptography", Potentials, IEEE (Volume: 20, Issue:1), Feb/Mar 2001, Page(s): 36 - 38, ISSN : 0278-6648.
[2] Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng WANG, "Dual-watermarking by QR-code Applications in Image Processing", 2012 9thInternational Conference on Ubiquitous Intelligence and Computing.
[3] Kaminsky, A. ; Kurdziel, M. ; Radziszowski, S."An overview of cryptanalysis research for the advanced encryption standard", Military Communications Conference, 2010 - MILCOM 2010,San Jose, CA , Oct.31 2010-Nov.3 2010, Page(s): 1310 - 1316, ISSN : 2155-7578
[4] Wenjun Zeng ; Liu, B."A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images" Image Processing, IEEE Transactions on (Volume:8 ,Issue: 11 ), Nov 1999, Page(s):1534 - 1548, ISSN : 1057-7149.
[5] N.N. EL-Emam, "Hiding a large amount of data with high security using steganography algorithm,” Journal of Computer Science, vol. 3, no. 4, pp.223-232, April 2007.
[6] Krista Bennett (2004). "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text". CERIAS TR 2004-13.
[7] Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "An Approach of Quantum Steganography through Special SSCE Code", International Journal of Computer and Information Engineering (WASET), Vol:5, No:8, Year:2011.
[8] V.Sathyal, K.Balasuhramaniyam, N.Murali, M.Rajakumaran, Vigneswari, "Data Hiding In Audio Signal, Video Signal Text And Jpeg Images", IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012)March 2012. 741-746.
[9] Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal, "A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier", Journal of Global Research in Computer Science(JGRCS), Volume 2, No. 4, April 2011.
[10] Souvik Bhattacharyya and Gautam Sanyal, "A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method" International Journal of Computer and Information Engineering (WASET), Vol:4, No:8, Year:2010.
[11] Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. "Hiding & Analyzing Data in Image Using Extended PMM”. In Proceedings of Computational Intelligence: Modeling, Techniques and Applications (CIMTA- 2013), Kalyani University, Kalyani, West Bengal, India, September 27-28, 2013. Proceedings published in "Procedia Technology, Elsevier".
[12] Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "Study and Analysis of Steganography with Pixel Factor Mapping (PFM) Method", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 8, August 2013.
[13] Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "Robust image steganography with pixel factor mapping (PFM) technique", Computing for Sustainable Global Development (INDIACom), 2014 International Conference on 5-7 March 2014. Page(s): 692 - 698, Print ISBN: 978-93-80544-10-6. Publisher: IEEE Xplore Digital Library.
[14] Jain.A.K, Hong.L, Pankanti.S: Biometric identification. Communications of the ACM 43 (2000) P. 91-98.
[15] A. K. Jain, A. Ross and S. Pankanti, Biometrics: A tool for information security, IEEE Transactions on Information Forensics and Security, vol.1, no.2, pp.125-143, 2006.
[16] K. A. Rhodes, Information Security: Challenges in Using Biometrics, United States General Accounting Office, 2003.
[17] A. K. Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Transactions on Circuits and Systems for Video Technology, vol.14, no.1, pp.4-20, 2004.
[18] S. Prabhakar, S. Pankanti and A. K. Jain, Biometric recognition: Security and privacy concerns, IEEE Security and Privacy, vol.1, no.2, pp.33-42, 2003.
[19] A. K. Jain and A. Kumar, Biometrics of next generation: An overview, The 2nd Generation Biometrics, 2010.
[20] Y.K.Lee. & L.H.Chen."High capacity image steganographic model". IEEE Proc.-Vision, Image and Signal Processing,147:288–294, 2000.
[21] D.C. Wu. and W.H. Tsai. "A steganographic method for images by pixel value differencing”. Pattern Recognition Letters, 24:1613–1626, 2003.
[22] P Huang. K.C. Chang., C.P Chang and T.M Tu. "A novel image steganography method using tri-way pixel value differencing”. Journal of Multimedia, 3, 2008.
[23] Potdar V.and Chang E. "Gray level modification steganography for secret communication”. In IEEE International Conference on Industria Informatics., pages 355–368, Berlin, Germany, 2004.
[24] Wien Hong and Tung-Shou Chen, "A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.” IEEE Transactions on Information Forensics And Security, Vol.7, No.1, Feb 2012, 176-184.
[25] Osman, H.;Mahjoup, W. ; Nabih, A. ; Aly, G.M. "JPEG encoder for low-cost FPGAs" Published in Computer Engineering & Systems, 2007. ICCES '07. International Conference on 27-29 Nov. 2007.
[26] Kobayashi, H., Y. Noguchi and H. Kiya (1999). "A method of embedding binary data into JPEG bitstreams”. IEICE Trans. Information and Systems, J83-D-II, 1469–1476.
[27] N. Provos and P. Honeyman "Hide and seek: An introduction to steganography,” IEEE Security and Privacy, vol. 1, no. 3, pp. 32-43, 2003.
[28] M. Titchener, "Technical note: Digital encoding by way of new T-codes,” IEE Proceedings - Computers and Digital Techniques, vol. 131, no. 4, pp. 151-153, 1984.
[29] K. B. Raja, Vikas, Venugopal K. R and L. M. Patnaik, "High Capacity Lossless Secure Image Steganography using Wavelets,”International Conference on Advances Computing and Communications, pp. 230 – 235, 2006.
[30] Radovan Ridzon, Dushan Levisky and Tomas Kanocz, "Information Hiding within Still Images Based on the DCT Coefficients Flipping and Encryption,” 52nd International Symposium, pp.147–150, September 2010.
[31] Chang, C.C., T.S. Chen and L.Z. Chung (2002). "A steganographic method based upon JPEG and quantization table modification”. Information Sciences, 141, 123–138.
[32] J. Pedraza, M. A. Patricio, A. de Asís, and J. M. Molina, "Privacy and legal requirements for developing biometric identification software in context-based applications,” International Journal of Bio-Science and Bio-Technology, vol. 2, no. 1, pp. 13–24, 2010.
[33] Subhra Mazumdar; Venkata Dhulipala. "Biometric Security Using Finger Print Recognition". University of California, San Diego. p. 3. Retrieved 30 August 2010.
[34] Retina and Iris Scans. Encyclopedia of Espionage, Intelligence, and Security. Copyright © 2004 by The Gale Group, Inc.
[35] R. Brunelli, Template Matching Techniques in Computer Vision: Theory and Practice, Wiley, ISBN 978-0-470-51706-2, 2009.
[36] Miroslav Bača; Petra Grd and Tomislav Fotak (2012). "4: Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics". New Trends and Developments in Biometrics. InTech. Retrieved 1st December 2013.
[37] Shangling Song; Kazuhiko Ohnuma; Zhi Liu; Liangmo Mei; Akira Kawada; Tomoyuki Monma "Novel biometrics based on nose pore recognition" 2009.
[38] Surya Prakash, Umarani Jayaraman & Phalguni Gupta, A Skin-Color and Template Based Technique for Automatic Ear Detection, Proceedings of 7th International Conference on Advances in Pattern Recognition (ICAPR 2009), pp. 213-216, Kolkata, India, February 2009.
[39] Yeung, D; H., Xiong, Y., George, S., Kashi, R., Matsumoto, T., Rigoll, G; "SVC2004: First international signature verification competition". Lecture Notes in Computer Science. LNCS-3072: 16–22. 2004.
[40] Probing the uniqueness and randomness of IrisCodes: Results from 200 billion iris pair comparisons." Proceedings of the IEEE, vol. 94 (11), 2006, pp. 1927-1935.
[41] Homayoon Beigi, Speaker Recognition, Biometrics / Book 1, Jucheng Yang (ed.), Intech Open Access Publisher, 2011, pp. 3-28, ISBN 978-953-307-618-8.
[42] Wang, L.-Y., G. Leedham, and D. S.-Y. Cho, Infrared Imaging of Hand Vein Patterns for Biometric Purposes, The Institution of Engineering and Technology, Computer Vision, Vol. 1, pp. 113-122, 2007.
[43] Kumar, A., K. and K., V. Prathyusha, Personal authentication using hand vein triangulation, IEEE Trans. Image Process., Vol. 38, pp. 2127-2136, 2009.
[44] Yusra A. Y. Al-Najjar, Dr. Der Chen Soong, "Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI", International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2012 ISSN 2229-5518
[45] Guillermito(2004)."Steganography: a few tools to discover hidden data”. Retrieved September, 2007, from http://www.guillermito2.net/stegano/tools/index.html
[46] J.L.Rodgers, J.L. and W.A.Nicewander, "Thirteen Ways to Look at the Correlation Coefficient", American Statistician 42, 59-66 (1995).
[47] Lehmann, E. L.; Casella, George (1998). "Theory of Point Estimation (2nd ed.)”. New York: Springer. ISBN 0-387-98502-6.
[48] Pedro J. Moreno, Purdy Ho, Nuno Vasconcelos "A Kullback-Leibler Divergence Based Kernel for SVM Classification in Multimedia Applications" Conference: Neural Information Processing Systems - NIPS , 2003
[49] Claude E. Shannon, "A mathematical theory of communication", The Bell System Technical Journal., 27:379–423.
[50] Patricia R. Pereira. Andr R.S. Maral. "A steganographic method for digital images robust to rs steganalysis”. Springer Lecture Notes in Computer Science, Vol. 3656., pages 1192–1199, 2005.
[51] S. Dumitrescu, X. Wu, and N. D. Memon. "On steganalysis of random LSB embedding in continuous-tone images”. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, pages 324–339, Rochester, NY, September 22–25, 2002.
[52] Amritha.G, Meethu Verkey. "Biometric Steganographic Technique Using DWT and Encryption” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, ISSN: 2277 128X.
[53] Kousik Dasgupta, J.K. Mandal and Paramartha Dutta. "Hash Based Least Significant Bit Technique for Video Steganography”. International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 1, No 2, April 2012.
[54] Gabriel Macharia Kamau, Stephen Kimani, Waweru Mwangi. "An enhanced Least Significant Bit Steganographic Method for Information Hiding”. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol 2, No.9, 2012.
Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007