Secure data transmission for multibiometric identity verification systems using steganography and encryption

被引:1
|
作者
Killioglu, Mehmet [1 ]
Taskiran, Murat [1 ]
Kahraman, Nihan [1 ]
机构
[1] Yildiz Tekn Univ, Elekt Elekt Fak, Elekt & Haberlesme Muhendisligi Bolumu, Istanbul, Turkey
来源
PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI | 2018年 / 24卷 / 02期
关键词
Steganography; Fingerprint; Thermal image; Advanced encryption standard (AES); RSA;
D O I
10.5505/pajes.2016.39225
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Effort on biometric data security in recent years in order to secure the transmission of biometric data along with the spread of biometric systems and can not be seized by any person other than the user is increasing rapidly. In this work, Advanced Encryption Standard (AES) and RSA (Rivest, Shamir, Adleman) algorithms were intended to ensure the security of biometric data using the algorithm. First fingerprint biometric data to be provided as security image is obtained. The noise in background of the resulting fingerprint image has been cleared using morphological operations. Thinning is applied to fingerprint image that background noise is cleared and the secondary feature vectors (minutiae points such as bifurcations and ridge endings) has obtained. The region of interest near the center of the fingerprint image is determined as the area of interest (ROI), the positions of the bifurcation and the ridge endings in this region along the x and y axes, as well as three angles for the bifurcation and one for the ridge endings in feature vectors. Each vector element has converted to 16 bit and then encoded by 128 bits blocks using AES. These encoded bits were embedded to least significant bits of red layer of the thermal image. Which pixels of the thermal image are to be replaced is determined by the information used for addressing in the green layer. In order to to obtain biometric data on the thermal image by the receiver side, the first used AES key was transmitted to the receiving side encrypted with RSA algorithm. Finally, original thermal image and biometric data embedded thermal image using steganography are compared by analyses.
引用
收藏
页码:173 / 179
页数:7
相关论文
共 50 条
  • [21] The New Method of Secure Data Transmission on the Indirect Steganography Basis
    Bekirov, Ali
    Barannik, Dmitry
    Frolov, Oleg
    Suprun, Oleh
    PROCEEDINGS OF 2016 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2016,
  • [22] Secure and efficient multibiometric fusion-based cryptosystem using blind separation encryption algorithm
    Divya, R.
    Vijayalakshmi, V.
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2016, 8 (02) : 97 - 114
  • [23] Secure Transmission with Matrix Encryption and Data Compression Mechanism
    Fazulullah, Abul Hasan
    Vansia, Purva
    Patel, Kartavi
    Patel, Dipesh
    Abuzneid, Abdel-Shakour A.
    2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [24] Dynamic Encryption and Secure Transmission of Terminal Data Files
    Jia, Ruchun
    Xin, Yang
    Liu, Bo
    Qin, Qin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01): : 1221 - 1232
  • [25] Secure transmission of medical records using high capacity steganography
    Srinivasan, Y
    Nutter, B
    Mitra, S
    Phillips, B
    Ferris, D
    17TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, 2004, : 122 - 127
  • [26] Secure Transmission of Medical Information Using IRIS Recognition and Steganography
    Barkathunisha, S.
    Meenakumari, R.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC 2013), 2013, : 89 - 92
  • [27] An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission
    Sriram, S.
    Karthikeyan, B.
    Vaithiyanathan, V.
    Raj, Anishin M. M.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 127 - 130
  • [28] Highly Secure Image Steganography Algorithm using Curvelet Transform and DCT Encryption
    ElSayed, Ahmed
    Elleithy, Abdelrahman
    Thunga, Prasanthi
    Wu, Zhengping
    2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [29] Secure and efficient data transmission by video steganography in medical imaging system
    Balu, S.
    Babu, C. Nelson Kennedy
    Amudha, K.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S4057 - S4063
  • [30] Secure and efficient data transmission by video steganography in medical imaging system
    S. Balu
    C. Nelson Kennedy Babu
    K. Amudha
    Cluster Computing, 2019, 22 : 4057 - 4063