A safe and secured iris template using steganography and cryptography

被引:0
|
作者
Oluwakemi Christiana Abikoye
Umar Abdulraheem Ojo
Joseph Bamidele Awotunde
Roseline Oluwaseun Ogundokun
机构
[1] University of Ilorin,
[2] FCT College of Education,undefined
[3] Landmark University,undefined
来源
关键词
Iris recognition; Cryptography; Steganography; Algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.
引用
收藏
页码:23483 / 23506
页数:23
相关论文
共 50 条
  • [1] A safe and secured iris template using steganography and cryptography
    Abikoye, Oluwakemi Christiana
    Ojo, Umar Abdulraheem
    Awotunde, Joseph Bamidele
    Ogundokun, Roseline Oluwaseun
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 23483 - 23506
  • [2] Secured Transmission of Sensitive Images of Skin Diseases Using Steganography and Cryptography
    Hossain, Kunal
    Jana, Susovan
    Mukherjee, Saswati
    Parekh, Ranjan
    [J]. 2017 IEEE CALCUTTA CONFERENCE (CALCON), 2017, : 95 - 99
  • [3] Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
    Reddy, M. Indra Sena
    Kumar, A. P. Siva
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 62 - 69
  • [4] A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography
    Devi, Anitha M. D.
    Kumar, K. B. Shiva
    [J]. INTERNATIONAL CONFERENCE ON MATERIALS, ALLOYS AND EXPERIMENTAL MECHANICS (ICMAEM-2017), 2017, 225
  • [5] A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography
    Ogundokun, Roseline Oluwaseun
    Abikoye, Oluwakemi Christiana
    [J]. INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2021, 2021
  • [6] Performance analysis of image steganography using wavelet transform for safe and secured transaction
    Guru Vimal Kumar Murugan
    Ragupathy Uthandipalayam Subramaniyam
    [J]. Multimedia Tools and Applications, 2020, 79 : 9101 - 9115
  • [7] Performance analysis of image steganography using wavelet transform for safe and secured transaction
    Murugan, Guru Vimal Kumar
    Subramaniyam, Ragupathy Uthandipalayam
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (13-14) : 9101 - 9115
  • [8] Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography
    Usha, S.
    Kuppuswami, S.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 147 - 158
  • [9] Secured Routing Using Quantum Cryptography
    Anand, M. Vijay
    Jayakumar, C.
    [J]. GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 714 - +
  • [10] Cryptography and steganography
    [J]. 2018, Institute of Telecommunications Professionals (12):