Hiding fingerprints in facial features using DCT
DOI:
https://doi.org/10.32792/jeps.v12i1.150Keywords:
face recognition, Steganography, face features, minutiae finger print, DCT.Abstract
The need to use a biometric authentication systems in many applications because we need to provide
adequate protection for the sensitive personal data that the systems deal with increases to prevent
potential attacks that could harm the widespread use of biometric systems.
The goal of this research is to provide a high level of biometric data security for a face and ten
fingerprint biometric system. All cloaking techniques that deal with the face image hide the fingerprint
data at the image level and produce a stego-image. The researcher proposes a new methodology to hide
the data of ten fingerprints in templates .The face is at the feature level rather than the image level.And
also a new encryption algorithm based on the idea of MESR combined with DCT to encrypt the details of
the fingerprint before hiding it. As a result, alternative methods such as encryption are required to
safeguard the features, which necessitates the creation of extra accounts .The researcher proposes the
following solutions to alleviate these disadvantages Where the output was extracted using the proposed
method of DCT(Discrete cosine transform) and MESR(maximally stable extremal regions) to hide
fingerprints in the features of the face, as well as used the proposed method for de-masking using IDCT,
and the results were 100% identical when de-hiding.
References
Meng, W.; Wong, D.S.; Furnell, S.; Zhou, J. Surveying the development of biometric user
authentication on mobile phones. IEEE Commun. Surv. Tutor. 2015, 17, 1268–1293.
Campisi, P. Security and Privacy in Biometrics; Springer: Berlin/Heidelberg, Germany, 2013;
Volume 24.
Marqués, I.; Grana, M. Image security and biometrics: A review. In International Conference on
Hybrid Artificial Intelligence Systems; Springer: Berlin/Heidelberg, Germany, 2012; pp. 436–447.
Sirull, E. What Is the Dark Web? 2018. (accessed on 11 May 2018).
Stack, B. Here‟S How Much Your Personal Information Is Selling for on The Dark Web. 2018.
(accessed on 11 May 2018).
Hillman, S. Physical security 101: Evolving „defense in depth‟. InTech Magazine, May/June 2011.
Xiao, Q., 2004. A biometric authentication approach for high security ad-hoc networks. Proceedings
of the 5th Annual IEEE SMC Information Assurance Workshop, Jun. 10-11, IEEE Xplore Press, pp:
-256. DOI: 10.1109/IAW.2004.1437824.
Kwon, T. and H. Moon, 2008. Biometric authentication for border control applications. IEEE Trans.
Knowl. Data Eng., 20: 1091-1096. DOI: 10.1109/TKDE.2007.190716.
Sasidhar, K., V.L. Kakulapati, K. Ramakrishna and K.K. Rao, 2010. Multimodal biometric systemsstudy
to improve accuracy and performance. Int. J. Comput. Sci. Eng. Survey, 1: 54-61. DOI:
5121/ijcses.2010.1205.
Jagadeesan, A., T. Thillaikkarasi and K. Duraiswamy, 2010. Cryptographic key generation from
multiple biometric modalities: Fusing minutiae with iris feature. Int. J. Comput. Appli., 2: 975-
Guo-Shiang Lin, Yi-Ting Chang, and Wen-Nung Lie “A Framework of Enhancing Image
Steganography with Picture Quality Optimization and Anti-Steganalysis Based on Simulated
Annealing Algorithm” IEEE Transactions on Multimedia, August 2010.
Masoud Afrakhteh and Subariah Ibrahim “Enhanced Least Significant Bit Scheme Robust Against
Chi-Squared Attack” Fourth Asia International Conference on Mathematical/Analytical Modeling
and Computer Simulation 2010.
Alok Kumar Vishwakarma1 and Atul Kumar “A Novel Approach for Secure MobileVoting using
Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme” International Journal of
Technology and Engineering Systems, March 2011.
Nabin Ghoshal, J. K. Mandal “A Steganographic Scheme for Colour Image Authentication
(SSCIA)” IEEE-International Conference on Recent Trends in Information Technology, June 3-5,
Ali Hussein Jazi.”An improved scheme for multi-biomtric authentication”2018.
ITU-T Recommendation H.263, "Video Coding for Low Bit-Rate Communications,"
Telecommunication Standardization Sector of ITU (03/96)(2012).
Downloads
Published
Issue
Section
License
The Authors understand that, the copyright of the articles shall be assigned to Journal of education for Pure Science (JEPS), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (JEPS), University of Thi-Qar.
Journal of education for Pure Science (JEPS), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (JEPS), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.