A safe and secured iris template using steganography and cryptography

被引:0
|
作者
Oluwakemi Christiana Abikoye
Umar Abdulraheem Ojo
Joseph Bamidele Awotunde
Roseline Oluwaseun Ogundokun
机构
[1] University of Ilorin,
[2] FCT College of Education,undefined
[3] Landmark University,undefined
来源
关键词
Iris recognition; Cryptography; Steganography; Algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.
引用
收藏
页码:23483 / 23506
页数:23
相关论文
共 50 条
  • [31] A New Model of Securing Iris Authentication Using Steganography
    Abidin, Zaheera Zainal
    Manaf, Mazani
    Shibghatullah, Abdul Samad
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 1, 2011, 179 : 547 - +
  • [32] Optical ghost cryptography and steganography
    Liu, Hong-Chao
    Chen, Wen
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 130
  • [33] Development of a Secured Web Page of CAAP SIS using Cryptography
    Eder, Marylene S.
    [J]. MINDANAO JOURNAL OF SCIENCE AND TECHNOLOGY, 2014, 12 : 86 - 108
  • [34] CLOUD COMPUTING IN CRYPTOGRAPHY AND STEGANOGRAPHY
    Zadiraka, V. K.
    Kudin, A. M.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2013, 49 (04) : 584 - 588
  • [35] Biometric Template Privacy Using Visual Cryptography
    Ibjaoun, Sana
    Abou El Kalam, Anas
    Poirriez, Vincent
    Ouahman, Abdellah Ait
    [J]. INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 309 - 317
  • [36] An Improved Lsb Data Steganography Using Elliptic Cuve Cryptography
    Ravivarma, G.
    Gavaskar, K.
    Kavitha, N. S.
    Banu, K. Shahanas
    Asha, K. G.
    Aarthi, S.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 06 - 11
  • [37] Multilayer Security Using RSA Cryptography and Dual Audio Steganography
    Bangera, Kripa N.
    Paddambail, Yashika
    Reddy, N. V. Subba
    Shivaprasad, G.
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 492 - 495
  • [38] An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission
    Sriram, S.
    Karthikeyan, B.
    Vaithiyanathan, V.
    Raj, Anishin M. M.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 127 - 130
  • [39] Secured Biometric Template
    Mohapatra, Amar Kumar
    Prakash, Nupur
    Aggarwal, Sonali
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 545 - +
  • [40] High capacity and secured methodologies for steganography
    Tiwari, Rajesh Kumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 1 - 18