Secure data transmission for multibiometric identity verification systems using steganography and encryption

被引:1
|
作者
Killioglu, Mehmet [1 ]
Taskiran, Murat [1 ]
Kahraman, Nihan [1 ]
机构
[1] Yildiz Tekn Univ, Elekt Elekt Fak, Elekt & Haberlesme Muhendisligi Bolumu, Istanbul, Turkey
关键词
Steganography; Fingerprint; Thermal image; Advanced encryption standard (AES); RSA;
D O I
10.5505/pajes.2016.39225
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Effort on biometric data security in recent years in order to secure the transmission of biometric data along with the spread of biometric systems and can not be seized by any person other than the user is increasing rapidly. In this work, Advanced Encryption Standard (AES) and RSA (Rivest, Shamir, Adleman) algorithms were intended to ensure the security of biometric data using the algorithm. First fingerprint biometric data to be provided as security image is obtained. The noise in background of the resulting fingerprint image has been cleared using morphological operations. Thinning is applied to fingerprint image that background noise is cleared and the secondary feature vectors (minutiae points such as bifurcations and ridge endings) has obtained. The region of interest near the center of the fingerprint image is determined as the area of interest (ROI), the positions of the bifurcation and the ridge endings in this region along the x and y axes, as well as three angles for the bifurcation and one for the ridge endings in feature vectors. Each vector element has converted to 16 bit and then encoded by 128 bits blocks using AES. These encoded bits were embedded to least significant bits of red layer of the thermal image. Which pixels of the thermal image are to be replaced is determined by the information used for addressing in the green layer. In order to to obtain biometric data on the thermal image by the receiver side, the first used AES key was transmitted to the receiving side encrypted with RSA algorithm. Finally, original thermal image and biometric data embedded thermal image using steganography are compared by analyses.
引用
收藏
页码:173 / 179
页数:7
相关论文
共 50 条
  • [41] Secure communication in a distributed system using identity based encryption
    Stading, T
    CCGRID 2003: 3RD IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, PROCEEDINGS, 2003, : 414 - 420
  • [42] A High Secure Speech Transmission Using Audio Steganography and Duffing Oscillator
    Abbas Salman Hameed
    Wireless Personal Communications, 2021, 120 : 499 - 513
  • [43] Secure non real time image encryption algorithm development using cryptography & Steganography
    Mukhedkar, Moresh
    Powar, Prajkta
    Gaikwad, Peter
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [44] A secure image protection algorithm by steganography and encryption using the 2D-TSCC
    李琦
    王兴元
    王赫
    叶晓林
    周双
    高锁
    施云庆
    Chinese Physics B, 2021, 30 (11) : 149 - 160
  • [45] A High Secure Speech Transmission Using Audio Steganography and Duffing Oscillator
    Hameed, Abbas Salman
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 499 - 513
  • [46] A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    Li, Qi
    Wang, Xingyuan
    Wang, He
    Ye, Xiaolin
    Zhou, Shuang
    Gao, Suo
    Shi, Yunqing
    CHINESE PHYSICS B, 2021, 30 (11)
  • [47] A SECURE APPROACH FOR DATA TRANSMISSION IN COMPUTER NETWORKS USING MODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM
    Reddy, M. Indrasena
    Kumar, A. P. Siva
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 14 - 28
  • [48] A New Hybrid Method for Secure Data Transmission Using Watermarking based on Fuzzy Encryption in IoT
    Mohammadi, Hossein
    Ghaderzadeh, Abdulbaghi
    Sheikhahmadi, Amir
    IETE JOURNAL OF RESEARCH, 2024, 70 (04) : 3493 - 3514
  • [49] Secure Remote Data Collection System Using Data Encryption
    Rodrigues, Bruno
    Cardoso, Alberto
    Bernardino, Jorge
    Simoes, Nuno
    Marques, Jose
    IFAC PAPERSONLINE, 2019, 52 (27): : 400 - 405
  • [50] ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems
    Bacem Mbarek
    Nafaâ Jabeur
    Ansar-Ul-Haque Yasar
    Personal and Ubiquitous Computing, 2019, 23 : 793 - 799