Secure data transmission for multibiometric identity verification systems using steganography and encryption

被引:1
|
作者
Killioglu, Mehmet [1 ]
Taskiran, Murat [1 ]
Kahraman, Nihan [1 ]
机构
[1] Yildiz Tekn Univ, Elekt Elekt Fak, Elekt & Haberlesme Muhendisligi Bolumu, Istanbul, Turkey
关键词
Steganography; Fingerprint; Thermal image; Advanced encryption standard (AES); RSA;
D O I
10.5505/pajes.2016.39225
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Effort on biometric data security in recent years in order to secure the transmission of biometric data along with the spread of biometric systems and can not be seized by any person other than the user is increasing rapidly. In this work, Advanced Encryption Standard (AES) and RSA (Rivest, Shamir, Adleman) algorithms were intended to ensure the security of biometric data using the algorithm. First fingerprint biometric data to be provided as security image is obtained. The noise in background of the resulting fingerprint image has been cleared using morphological operations. Thinning is applied to fingerprint image that background noise is cleared and the secondary feature vectors (minutiae points such as bifurcations and ridge endings) has obtained. The region of interest near the center of the fingerprint image is determined as the area of interest (ROI), the positions of the bifurcation and the ridge endings in this region along the x and y axes, as well as three angles for the bifurcation and one for the ridge endings in feature vectors. Each vector element has converted to 16 bit and then encoded by 128 bits blocks using AES. These encoded bits were embedded to least significant bits of red layer of the thermal image. Which pixels of the thermal image are to be replaced is determined by the information used for addressing in the green layer. In order to to obtain biometric data on the thermal image by the receiver side, the first used AES key was transmitted to the receiving side encrypted with RSA algorithm. Finally, original thermal image and biometric data embedded thermal image using steganography are compared by analyses.
引用
收藏
页码:173 / 179
页数:7
相关论文
共 50 条
  • [1] Secure patients data transmission using XOR ciphering encryption and ECG steganography
    Patel, Shaheen S.
    Sankpal, S. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1311 - 1315
  • [2] Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography
    Pandey, Hari Mohan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 (111): : 213 - 225
  • [3] Advancements in optical steganography for secure medical data transmission in telehealth systems
    Patange, Aparna
    Mahesan, K. V.
    Manjula, C.
    Donald, Cecil
    Babu, Suresh
    Peroumal, Vijayakumar
    Arumugam, Mahendran
    OPTICAL AND QUANTUM ELECTRONICS, 2023, 55 (09)
  • [4] Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography
    Hashim, M. M.
    Taha, Mustafa Sabah
    Aman, Azana Hafizah Mohd
    Hashim, Ai Sha Hassan Abdalla
    Rahim, Mohd Shafry Mohd
    Islam, Shayla
    2019 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING (ICOM), 2019, : 48 - 53
  • [5] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [6] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [7] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [8] A Secure Data Transmission Approach Using B plus trees In Steganography
    Shelare, Tanushree
    Powar, Varsha
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 947 - 951
  • [9] Data Encryption & Decryption Using Steganography
    Manohar, N.
    Kumar, Peetla Vijay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 697 - 702
  • [10] Assessment of Encryption and Decryption Schemes for Secure Data Transmission in Healthcare Systems
    Adedeji, Kazeem B.
    Nwulu, Nnamdi I.
    Aigbavboa, Clinton
    Gbadamosi, Saheed L.
    2019 IEEE AFRICON, 2019,