Secure data transmission for multibiometric identity verification systems using steganography and encryption

被引:1
|
作者
Killioglu, Mehmet [1 ]
Taskiran, Murat [1 ]
Kahraman, Nihan [1 ]
机构
[1] Yildiz Tekn Univ, Elekt Elekt Fak, Elekt & Haberlesme Muhendisligi Bolumu, Istanbul, Turkey
关键词
Steganography; Fingerprint; Thermal image; Advanced encryption standard (AES); RSA;
D O I
10.5505/pajes.2016.39225
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Effort on biometric data security in recent years in order to secure the transmission of biometric data along with the spread of biometric systems and can not be seized by any person other than the user is increasing rapidly. In this work, Advanced Encryption Standard (AES) and RSA (Rivest, Shamir, Adleman) algorithms were intended to ensure the security of biometric data using the algorithm. First fingerprint biometric data to be provided as security image is obtained. The noise in background of the resulting fingerprint image has been cleared using morphological operations. Thinning is applied to fingerprint image that background noise is cleared and the secondary feature vectors (minutiae points such as bifurcations and ridge endings) has obtained. The region of interest near the center of the fingerprint image is determined as the area of interest (ROI), the positions of the bifurcation and the ridge endings in this region along the x and y axes, as well as three angles for the bifurcation and one for the ridge endings in feature vectors. Each vector element has converted to 16 bit and then encoded by 128 bits blocks using AES. These encoded bits were embedded to least significant bits of red layer of the thermal image. Which pixels of the thermal image are to be replaced is determined by the information used for addressing in the green layer. In order to to obtain biometric data on the thermal image by the receiver side, the first used AES key was transmitted to the receiving side encrypted with RSA algorithm. Finally, original thermal image and biometric data embedded thermal image using steganography are compared by analyses.
引用
收藏
页码:173 / 179
页数:7
相关论文
共 50 条
  • [31] Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps
    Singh, Deep
    Kumar, Sandeep
    Verma, Chaman
    Illes, Zoltan
    Kumar, Neerendra
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (10)
  • [32] Secure Image Transmission in Wireless OFDM Systems Using Secure Block Compression-Encryption and Symbol Scrambling
    Wang, Zhongpeng
    IEEE ACCESS, 2019, 7 : 126985 - 126997
  • [33] Blockchain Data Secure Transmission Method Based on Homomorphic Encryption
    Peng, Sheng
    Cai, Zhiming
    Liu, Wenjian
    Wang, Wennan
    Li, Guang
    Sun, Yutin
    Zhu, Linkai
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [34] Analysis of Encryption and Lossless Compression Techniques for Secure Data Transmission
    Singh, Siddharth
    Devgon, Raaghavv
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 120 - 124
  • [35] An Encryption-based Secure Framework for Data Transmission in IoT
    Chaudhry, Shikha
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 743 - 747
  • [36] Secure Perceptual Hashing of Data using Encryption
    Sahana, M. S.
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 524 - 528
  • [37] Privacy Preserving Data Mining using Visual Steganography and Encryption
    Sah, Hare Ram
    Gunasekaran, G.
    10TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2015), 2015, : 154 - 158
  • [38] A secure communication system using biometric identity verification
    Yamazaki, Y
    Komatsu, N
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (07) : 879 - 884
  • [39] Data Security Using Extended ECS (Encryption, Compression, Steganography)
    Verma, Surbhi
    Kaur, Gagandeep
    Garg, Deepak
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 816 - 826
  • [40] Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
    Gokhale, Hrishikesh
    Satapathy, Chirag
    Syed, Ali Zoya
    INTERNET OF THINGS, GIOTS 2022, 2022, 13533 : 292 - 301