Hiding fingerprints in facial features using DCT
DOI:
https://doi.org/10.32792/jeps.v12i1.150Keywords:
face recognition, Steganography, face features, minutiae finger print, DCT.Abstract
The need to use a biometric authentication systems in many applications because we need to provide
adequate protection for the sensitive personal data that the systems deal with increases to prevent
potential attacks that could harm the widespread use of biometric systems.
The goal of this research is to provide a high level of biometric data security for a face and ten
fingerprint biometric system. All cloaking techniques that deal with the face image hide the fingerprint
data at the image level and produce a stego-image. The researcher proposes a new methodology to hide
the data of ten fingerprints in templates .The face is at the feature level rather than the image level.And
also a new encryption algorithm based on the idea of MESR combined with DCT to encrypt the details of
the fingerprint before hiding it. As a result, alternative methods such as encryption are required to
safeguard the features, which necessitates the creation of extra accounts .The researcher proposes the
following solutions to alleviate these disadvantages Where the output was extracted using the proposed
method of DCT(Discrete cosine transform) and MESR(maximally stable extremal regions) to hide
fingerprints in the features of the face, as well as used the proposed method for de-masking using IDCT,
and the results were 100% identical when de-hiding.
References
Meng, W.; Wong, D.S.; Furnell, S.; Zhou, J. Surveying the development of biometric user
authentication on mobile phones. IEEE Commun. Surv. Tutor. 2015, 17, 1268–1293.
Campisi, P. Security and Privacy in Biometrics; Springer: Berlin/Heidelberg, Germany, 2013;
Volume 24.
Marqués, I.; Grana, M. Image security and biometrics: A review. In International Conference on
Hybrid Artificial Intelligence Systems; Springer: Berlin/Heidelberg, Germany, 2012; pp. 436–447.
Sirull, E. What Is the Dark Web? 2018. (accessed on 11 May 2018).
Stack, B. Here‟S How Much Your Personal Information Is Selling for on The Dark Web. 2018.
(accessed on 11 May 2018).
Hillman, S. Physical security 101: Evolving „defense in depth‟. InTech Magazine, May/June 2011.
Xiao, Q., 2004. A biometric authentication approach for high security ad-hoc networks. Proceedings
of the 5th Annual IEEE SMC Information Assurance Workshop, Jun. 10-11, IEEE Xplore Press, pp:
-256. DOI: 10.1109/IAW.2004.1437824.
Kwon, T. and H. Moon, 2008. Biometric authentication for border control applications. IEEE Trans.
Knowl. Data Eng., 20: 1091-1096. DOI: 10.1109/TKDE.2007.190716.
Sasidhar, K., V.L. Kakulapati, K. Ramakrishna and K.K. Rao, 2010. Multimodal biometric systemsstudy
to improve accuracy and performance. Int. J. Comput. Sci. Eng. Survey, 1: 54-61. DOI:
5121/ijcses.2010.1205.
Jagadeesan, A., T. Thillaikkarasi and K. Duraiswamy, 2010. Cryptographic key generation from
multiple biometric modalities: Fusing minutiae with iris feature. Int. J. Comput. Appli., 2: 975-
Guo-Shiang Lin, Yi-Ting Chang, and Wen-Nung Lie “A Framework of Enhancing Image
Steganography with Picture Quality Optimization and Anti-Steganalysis Based on Simulated
Annealing Algorithm” IEEE Transactions on Multimedia, August 2010.
Masoud Afrakhteh and Subariah Ibrahim “Enhanced Least Significant Bit Scheme Robust Against
Chi-Squared Attack” Fourth Asia International Conference on Mathematical/Analytical Modeling
and Computer Simulation 2010.
Alok Kumar Vishwakarma1 and Atul Kumar “A Novel Approach for Secure MobileVoting using
Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme” International Journal of
Technology and Engineering Systems, March 2011.
Nabin Ghoshal, J. K. Mandal “A Steganographic Scheme for Colour Image Authentication
(SSCIA)” IEEE-International Conference on Recent Trends in Information Technology, June 3-5,
Ali Hussein Jazi.”An improved scheme for multi-biomtric authentication”2018.
ITU-T Recommendation H.263, "Video Coding for Low Bit-Rate Communications,"
Telecommunication Standardization Sector of ITU (03/96)(2012).
Downloads
Published
Issue
Section
License
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/