A safe and secured iris template using steganography and cryptography

被引:0
|
作者
Oluwakemi Christiana Abikoye
Umar Abdulraheem Ojo
Joseph Bamidele Awotunde
Roseline Oluwaseun Ogundokun
机构
[1] University of Ilorin,
[2] FCT College of Education,undefined
[3] Landmark University,undefined
来源
关键词
Iris recognition; Cryptography; Steganography; Algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.
引用
收藏
页码:23483 / 23506
页数:23
相关论文
共 50 条
  • [21] A Smart Strategy for Data Hiding using Cryptography and Steganography
    Srinivasarao, Tumma
    Yannam, Adilakshmi
    Markapudi, Baburao
    Chaduvula, Kavitha
    Allada, Apparna
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2023, 82 (05): : 546 - 551
  • [22] Two New Approaches for Image Steganography Using Cryptography
    Sharma, Vipul
    Madhusudan
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 202 - 207
  • [23] High Payload Capacity using Steganography Combined with Cryptography
    Deepak, Tatavarthi Sai
    Enireddy, Vamsidhar
    [J]. PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1448 - 1453
  • [24] Data hiding on web using combination of Steganography and Cryptography
    Kothari, Lipi
    Thakkar, Rikin
    Khara, Satvik
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 448 - 452
  • [25] An Access Control System using Visual Cryptography and Steganography
    Bhase, Gargee
    Mangrulkar, Ramchandra S.
    [J]. 2018 FOURTEENTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICINPRO) - 2018, 2018, : 49 - 54
  • [26] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [27] Secured Communication using Steganography Framework with Sample RTF Implementation
    Ganeshkumar, Vijayaratnam
    Koggalage, Ravindra L. W.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, 2009, : 15 - 21
  • [28] A Secured Word by Word Graph Steganography using Huffman Encoding
    Akhter, Fatema
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [29] A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
    Chen, Tien-ho
    Yeh, Hsiu-lien
    Liu, Pin-chuan
    Hsiang, Han-chen
    Shih, Wei-kuan
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 46 - 55
  • [30] CASCADED DNA CRYPTOGRAPHY AND STEGANOGRAPHY
    Shweta
    Indora, Sanjeev
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 104 - 107