Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data

被引:3
|
作者
Agarwal, Parth [1 ]
Moudgil, Dhruve [1 ]
Priya, S. [1 ]
机构
[1] SRM IST, CSE, Kattankulathur, India
关键词
Cryptography; Steganography; Facial recognition; Face data; Encryption; Security; AES encoding;
D O I
10.1007/978-981-15-0199-9_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In last few years, information security has become a significant part of data communication. In order to address this crucial point in data communication to secure the confidential data, steganography and cryptography can be combined to give better results. Steganography is a practice to hide any confidential or sensitive information into another information that plays as the cover for the information, adding a layer of security on top of science of secret writing, known as cryptography. In this paper, we discuss an improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key. We further propose a platform leveraging cryptographic algorithms and verification using face data in pipeline to help keep data more secure.
引用
收藏
页码:155 / 166
页数:12
相关论文
共 50 条
  • [1] Identity verification using speech and face information
    Sanderson, C
    Paliwal, KK
    [J]. DIGITAL SIGNAL PROCESSING, 2004, 14 (05) : 449 - 480
  • [2] Secure data transmission for multibiometric identity verification systems using steganography and encryption
    Killioglu, Mehmet
    Taskiran, Murat
    Kahraman, Nihan
    [J]. PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2018, 24 (02): : 173 - 179
  • [3] Steganography Technique to Secure Patient Confidential information using ECG Signal
    Sankari, V.
    Nandhini, K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [4] Hiding encrypted speech using steganography
    Al-Najjar, Atef J.
    Alvi, Aleem K.
    Idrees, Syed U.
    Al-Manea, Abdul-Rahman M.
    [J]. LECTURE NOTES IN SIGNAL SCIENCE, INTERNET AND EDUCATION (SSIP'07/MIV'07/DIWEB'07), 2007, : 275 - +
  • [5] Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System
    Dey, Somdip
    Nath, Asoke
    Agarwal, Shalabh
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 512 - 517
  • [6] Adaptive steganography technique to secure patient confidential information using ECG signal
    Liem Dao Duy
    Thy Nguyen Thi Minh
    Tu Huynh Thanh
    [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 336 - 340
  • [7] Printed steganography applied for the authentication of identity photos in face verification
    Kasprzak, Wlodzimierz
    Stefanczyk, Maciej
    Wilkowski, Artur
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 512 - 517
  • [8] Image steganography using exploiting modification direction for compressed encrypted data
    Younus, Zeyad Safaa
    Hussain, Mohammed Khaire
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) : 2951 - 2963
  • [9] Encrypted Rich-data Steganography using Generative Adversarial Networks
    Shu, Dule
    Cong, Weilin
    Chai, Jiaming
    Tucker, Conrad S.
    [J]. PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, : 55 - 60
  • [10] The Application Of LSB Steganography For Secure Text and Hiding Confidential Information Using AES Cryptography
    Ahyuna, Ahyuna
    Syamsuddin, Sadly
    Hasriani, Hasriani
    Ardimansyah, Ardimansyah
    Irmawati, Irmawati
    Wahyuni, Sri
    [J]. 3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 356 - 362