Biometric Authentication using Steganography via Chaotic Encryption and Data Hiding

被引:0
|
作者
Bharathi, M. K. [1 ]
Nagarajan, E. [1 ]
机构
[1] Sathyabama Univ, Dept Comp Sci, Madras 600119, Tamil Nadu, India
关键词
Seganography; Chaotic encryption; QSWT; Biometrics;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Wireless network becomes omes more popular in transferring sensitive information since it provides many security features such was Protected Access and Wired Equivalent Privacy protocols. Though, it is critical due to many threats such as MAC spoofing, man-in-the-middle attacks, Denial of service, Network injection, Caffe Latte attack, etc. In order to safeguard the information transferred via wireless network, we proposed a method of steganography using chaotic encryption and Qualified Significant wavelet tree (QSWT) concepts. In our proposed system, user gives their face and biometrics (i.e. fingerprint) for authentication. The biometric signal is encrypted and then it is hided into the human face using QSWT technique to produce the stegnoobject. It is then compressed and sent to the server. It aims to prove a) robustness against noise and compression, b) good encryption scheme and c) easy implementation.
引用
收藏
页码:277 / 283
页数:7
相关论文
共 50 条
  • [1] Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching
    Agrawal, Neha
    Savvides, Marios
    [J]. 2009 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPR WORKSHOPS 2009), VOLS 1 AND 2, 2009, : 702 - 709
  • [2] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Ben Tarif, Eyad
    Wibowo, Santoso
    Wasimi, Saleh
    Tareef, Afaf
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2485 - 2503
  • [3] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Eyad Ben Tarif
    Santoso Wibowo
    Saleh Wasimi
    Afaf Tareef
    [J]. Multimedia Tools and Applications, 2018, 77 : 2485 - 2503
  • [4] Using steganography techniques for implicit authentication to enhance sensitive data hiding
    Kadhum, Rafal Najeh
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3973 - 3983
  • [5] Protect biometric data with compound chaotic encryption
    Liew, Charles Z.
    Shaw, Raymond
    Li, Lanlan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1928 - 1943
  • [6] Biometric Data Encryption using 3-D Chaotic System
    Mehta, Garima
    Dutta, Malay Kishore
    SooKim, Pyung
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2016, : 72 - 75
  • [7] A robust embedded biometric authentication system based on fingerprint and chaotic encryption
    Murillo-Escobar, M. A.
    Cruz-Hernandez, C.
    Abundiz-Perez, F.
    Lopez-Gutierrez, R. M.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 8198 - 8211
  • [8] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [9] Data hiding using video steganography
    Ravichandran, C.
    Vajravelu, Ashok
    Panda, Sankarsan
    Degadwala, Sheshang Dipakkumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 112 - 123
  • [10] Integrating Biometric Cryptosystem with Steganography for Authentication
    Peethala, Manjari Benhar
    Kulkarni, Sujata
    [J]. 2016 IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (IEEE WIECON-ECE 2016), 2016, : 28 - 31