A safe and secured iris template using steganography and cryptography

被引:0
|
作者
Oluwakemi Christiana Abikoye
Umar Abdulraheem Ojo
Joseph Bamidele Awotunde
Roseline Oluwaseun Ogundokun
机构
[1] University of Ilorin,
[2] FCT College of Education,undefined
[3] Landmark University,undefined
来源
关键词
Iris recognition; Cryptography; Steganography; Algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.
引用
收藏
页码:23483 / 23506
页数:23
相关论文
共 50 条
  • [41] AN EFFICIENT STEGANOGRAPHY ALGORITHM USING VISUAL CRYPTOGRAPHY AND AES ENCRYPTION
    Andi, Velumurugan
    Edeswaran, Logashanmugam
    [J]. IIOAB JOURNAL, 2016, 7 (10) : 22 - 25
  • [42] LSB Based Image Steganography Using Dynamic Key Cryptography
    Patel, Nikhil
    Meena, Shweta
    [J]. 2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMMUNICATION TECHNOLOGIES (ETCT), 2016,
  • [43] Digital Image Steganography Using Modified LSB and AES Cryptography
    Panwar, Subhash
    Kumar, Mukesh
    Sharma, Sakshi
    [J]. 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 366 - 375
  • [44] A Secure Triple Level Encryption Method Using Cryptography and Steganography
    Usha, S.
    Kumar, G. A. Sathish
    Boopathybagan, K.
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1017 - 1020
  • [45] SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
    Abood, May Hattim
    Taha, Zahraa Khudhair
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1434 - 1450
  • [46] Iris Biometric Security using Watermarking and Visual Cryptography
    Swathi, B.
    Kumari, T. Madhavi
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1218 - 1220
  • [47] Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing
    Kanwal, Nadia
    Asghar, Mamoona Naveed
    Ansari, Mohammad Samar
    Lee, Brian
    Fleury, Martin
    Herbst, Marco
    Qiao, Yuansong
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 257 - 264
  • [48] ECG Steganography Using Contourlet Transform For Transmission of Secured Patient Identity
    Sam Jeeva Raj, Edward Jero
    Ramu, Palaniappan
    [J]. PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 131 - 138
  • [49] Secured Data Communication System Using RSA with Mersenne Primes and Steganography
    Pund-Dange, Shilpa
    Desai, Chitra G.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1306 - 1310
  • [50] Secured High Capacity Steganography using Distribution Technique with Validity and Reliability
    Tyagi, Sanjive
    Sexena, Ashendra
    Garg, Sohan
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 109 - 114