Hiding fingerprints in facial features using DCT

Authors

  • 1, 2Computer Science Department, College of Education for Pure Science, Thi- Qar University Nassiriya, Iraq.
  • Department of Computer Science, College of Education for Pure Science, University of ThiQar, Nassiriya, Iraq.

Keywords:

face recognition, Steganography, face features, minutiae finger print, DCT.

Abstract

The need to use a biometric authentication systems in many applications because we need to provide
adequate protection for the sensitive personal data that the systems deal with increases to prevent
potential attacks that could harm the widespread use of biometric systems.
The goal of this research is to provide a high level of biometric data security for a face and ten
fingerprint biometric system. All cloaking techniques that deal with the face image hide the fingerprint
data at the image level and produce a stego-image. The researcher proposes a new methodology to hide
the data of ten fingerprints in templates .The face is at the feature level rather than the image level.And
also a new encryption algorithm based on the idea of MESR combined with DCT to encrypt the details of
the fingerprint before hiding it. As a result, alternative methods such as encryption are required to
safeguard the features, which necessitates the creation of extra accounts .The researcher proposes the
following solutions to alleviate these disadvantages Where the output was extracted using the proposed
method of DCT(Discrete cosine transform) and MESR(maximally stable extremal regions) to hide
fingerprints in the features of the face, as well as used the proposed method for de-masking using IDCT,
and the results were 100% identical when de-hiding.

References

Meng, W.; Wong, D.S.; Furnell, S.; Zhou, J. Surveying the development of biometric user

authentication on mobile phones. IEEE Commun. Surv. Tutor. 2015, 17, 1268–1293.

Campisi, P. Security and Privacy in Biometrics; Springer: Berlin/Heidelberg, Germany, 2013;

Volume 24.

Marqués, I.; Grana, M. Image security and biometrics: A review. In International Conference on

Hybrid Artificial Intelligence Systems; Springer: Berlin/Heidelberg, Germany, 2012; pp. 436–447.

Sirull, E. What Is the Dark Web? 2018. (accessed on 11 May 2018).

Stack, B. Here‟S How Much Your Personal Information Is Selling for on The Dark Web. 2018.

(accessed on 11 May 2018).

Hillman, S. Physical security 101: Evolving „defense in depth‟. InTech Magazine, May/June 2011.

Xiao, Q., 2004. A biometric authentication approach for high security ad-hoc networks. Proceedings

of the 5th Annual IEEE SMC Information Assurance Workshop, Jun. 10-11, IEEE Xplore Press, pp:

-256. DOI: 10.1109/IAW.2004.1437824.

Kwon, T. and H. Moon, 2008. Biometric authentication for border control applications. IEEE Trans.

Knowl. Data Eng., 20: 1091-1096. DOI: 10.1109/TKDE.2007.190716.

Sasidhar, K., V.L. Kakulapati, K. Ramakrishna and K.K. Rao, 2010. Multimodal biometric systemsstudy

to improve accuracy and performance. Int. J. Comput. Sci. Eng. Survey, 1: 54-61. DOI:

5121/ijcses.2010.1205.

Jagadeesan, A., T. Thillaikkarasi and K. Duraiswamy, 2010. Cryptographic key generation from

multiple biometric modalities: Fusing minutiae with iris feature. Int. J. Comput. Appli., 2: 975-

Guo-Shiang Lin, Yi-Ting Chang, and Wen-Nung Lie “A Framework of Enhancing Image

Steganography with Picture Quality Optimization and Anti-Steganalysis Based on Simulated

Annealing Algorithm” IEEE Transactions on Multimedia, August 2010.

Masoud Afrakhteh and Subariah Ibrahim “Enhanced Least Significant Bit Scheme Robust Against

Chi-Squared Attack” Fourth Asia International Conference on Mathematical/Analytical Modeling

and Computer Simulation 2010.

Alok Kumar Vishwakarma1 and Atul Kumar “A Novel Approach for Secure MobileVoting using

Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme” International Journal of

Technology and Engineering Systems, March 2011.

Nabin Ghoshal, J. K. Mandal “A Steganographic Scheme for Colour Image Authentication

(SSCIA)” IEEE-International Conference on Recent Trends in Information Technology, June 3-5,

Ali Hussein Jazi.”An improved scheme for multi-biomtric authentication”2018.

ITU-T Recommendation H.263, "Video Coding for Low Bit-Rate Communications,"

Telecommunication Standardization Sector of ITU (03/96)(2012).

Downloads

Published

2023-01-16