SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Biometric
steganography



By –
Manoj Kumar Mohanty
Department of Computer
Science and Engineering
NIT Rourkela
2          19/3/2012




Outline
 Introduction

 Application    Scenarios
 LSB   Insertion method
 Amplitude   modulation-based hiding
 Conclusion
3                 19/3/2012




Introduction
 Biometrics data provides uniqueness but
  do not provide secrecy.
 For wide spread utilization of biometric
  techniques, security of biometric data is
  essential.
4                   19/3/2012




Biometric data security
                             Steganography

Cryptography

               BIOMETRICS
                  DATA




                       Watermarking
5                 19/3/2012




Application Scenario
 Biometric data, such as fingerprint
  minutiae is hidden in a cover image and is
  transmitted.
 The function of the host or cover image is
  only to carry the data and it need not be
  related to the data in any way.
6               19/3/2012




Cover Images




Synthetic     Face    Arbitrary
Fingerprint   image   image
image
7        19/3/2012




Synthetic Fingerprint
8                    19/3/2012




                   Cover
                   Image


Minutiae         Watermark             Secret
 Data             Encoder               Key


                Stego Image

                        Communication Channel

                 Watermark             Secret
                  Decoder               Key


           Extracted Minutiae Data

  Steganography-based minutiae hiding
9                   19/3/2012




LSB Insertion Method
 Take  the binary representation of the
  biometric data and replace it over the
  least significant bit(LSB) of each byte
  within the cover image.
 In 24 bit color image, the amount of
  change will be minimal and difficult to
  detect.
10                19/3/2012




LSB Insertion cont.
 Consider  three adjacent pixels (9 bytes)
 with the RGB encoding as follows
  11110101 11001101 10101001
  10100110 11001111 11001010
  10101111 00010011 11001000
 Suppose the data to be hidden in binary
 is (101101101).
11            19/3/2012




LSB Insertion Cont.
      11110101 11001100 10101001
      10100111 11001110 11001011
      10101111 00010011 11001000

 9 bits successfully hidden by only
changing 4 bits.
12                 19/3/2012




LSB Insertion Method:
Advantages
 If message bit is same as the pixel’s least
  significant bit then no change is required
  for that pixel value.
 If pixel value is different from message bit
  then effective change in pixel value is still
  invisible to human eye.
13                19/3/2012




LSB Insertion Method:
Disadvantages
 Message    can be easily removed by an
  intruder as message is in the least
  significant bit.
 Further intruder can modify the least
  significant bit of all the image pixels.
 The least significant bit may get corrupted

  by hardware imperfections or noise.
14                19/3/2012




Amplitude-modulation based
hiding technique
 Convert   the minutiae data into a bit
  stream.
 Every field of individual minutiae is
  converted to a 9-bit binary
  representation.
 A random number generator initialized
  with the secret key generates locations of
  the host image pixels to be watermarked.
15   19/3/2012
16   19/3/2012
17   19/3/2012
18               19/3/2012




 Every watermark bit with the value s is
  embedded in multiple locations to ensure
  better decoding rate of the embedded
  information.
 Along with the binary minutiae data, two
  reference bits, 0 and 1 are also
  embedded to the image.
 These help in calculating an adaptive
  threshold in determining the minutiae bit
  values during decoding.
19   19/3/2012




Decoding
20   19/3/2012
21   19/3/2012
22                19/3/2012




 From  decoded watermark bits, the
  minutiae data hidden in the host image is
  extracted.
 This data hiding model is robust and can
  handle attacks such as image cropping,
  and JPEG compression.
23                   19/3/2012




Conclusion
   The ability of biometrics-based personal
    identification techniques to efficiently
    differentiate between an authorized person and
    an impostor is one of the main reasons for their
    popularity in contrast to the traditional security
    techniques.
   However, the security and integrity of the
    biometric data itself are important issues.
    Application of steganography is a possible
    techniques to secure biometric data. Currently
    research is going on to increase the data hiding
    capacity of the host images and methods for
    combining watermarking schemes to achieve
    better result.
24                            19/3/2012




References
[1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, in
Proc. AutoID02, NY, March 2002

[2] Chander Kant, Rajender Nath, Sheetal Chaudhary:
“Biometrics Security using Steganography”, in CSC online Journal
“International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008.

[3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical Access
Control Enhanced by Use of Steganography Over Secured
Transmission Channel", in IEEE International Conference on Intelligent
Data Acquisition and Advanced Computing Systems: Technology and
Applications, September 2011.

[4] http://biolab.csr.unibo.it/
   Biometric System Laboratory, University of Bologna, Italy
25   19/3/2012

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methodsKrish_ver2
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital SignatureSou Jana
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesHarshita Ved
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Data mining Measuring similarity and desimilarity
Data mining Measuring similarity and desimilarityData mining Measuring similarity and desimilarity
Data mining Measuring similarity and desimilarityRushali Deshmukh
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detectionPartnered Health
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Amoeba distributed operating System
Amoeba distributed operating SystemAmoeba distributed operating System
Amoeba distributed operating SystemSaurabh Gupta
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 CertificatesSou Jana
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networksTouradj Ebrahimi
 

Was ist angesagt? (20)

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methods
 
Voice assistant ppt
Voice assistant pptVoice assistant ppt
Voice assistant ppt
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & Databases
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Data mining Measuring similarity and desimilarity
Data mining Measuring similarity and desimilarityData mining Measuring similarity and desimilarity
Data mining Measuring similarity and desimilarity
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Steganography
Steganography Steganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Amoeba distributed operating System
Amoeba distributed operating SystemAmoeba distributed operating System
Amoeba distributed operating System
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networks
 
Kerberos
KerberosKerberos
Kerberos
 

Andere mochten auch

Startup Launch Pad 2011
Startup Launch Pad 2011 Startup Launch Pad 2011
Startup Launch Pad 2011 kommaraj
 
Brochure_Application Outsourcing
Brochure_Application OutsourcingBrochure_Application Outsourcing
Brochure_Application OutsourcingStefan Forssman
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...IDES Editor
 
Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combinesiva23143
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 

Andere mochten auch (19)

NNIT
NNITNNIT
NNIT
 
Startup Launch Pad 2011
Startup Launch Pad 2011 Startup Launch Pad 2011
Startup Launch Pad 2011
 
Brochure_Application Outsourcing
Brochure_Application OutsourcingBrochure_Application Outsourcing
Brochure_Application Outsourcing
 
Copenhagen Capacity 'Invitation'
Copenhagen Capacity 'Invitation'Copenhagen Capacity 'Invitation'
Copenhagen Capacity 'Invitation'
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
 
Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combine
 
Biometric
BiometricBiometric
Biometric
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
rm ppt 2
rm ppt 2rm ppt 2
rm ppt 2
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Biometric steganography

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitYogeshIJTSRD
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...IJECEIAES
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 

Ähnlich wie Biometric steganography (20)

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
It3116411644
It3116411644It3116411644
It3116411644
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
C010511420
C010511420C010511420
C010511420
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
167 171
167 171167 171
167 171
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 

Mehr von Piyush Mittal

Mehr von Piyush Mittal (20)

Power mock
Power mockPower mock
Power mock
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorial
 
Reflection
ReflectionReflection
Reflection
 
Gpu archi
Gpu archiGpu archi
Gpu archi
 
Cuda Architecture
Cuda ArchitectureCuda Architecture
Cuda Architecture
 
Intel open mp
Intel open mpIntel open mp
Intel open mp
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computing
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manual
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDA
 
Channel coding
Channel codingChannel coding
Channel coding
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Java cheat sheet
Java cheat sheetJava cheat sheet
Java cheat sheet
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheet
 
Git cheat sheet
Git cheat sheetGit cheat sheet
Git cheat sheet
 
Vi cheat sheet
Vi cheat sheetVi cheat sheet
Vi cheat sheet
 
Css cheat sheet
Css cheat sheetCss cheat sheet
Css cheat sheet
 
Cpp cheat sheet
Cpp cheat sheetCpp cheat sheet
Cpp cheat sheet
 
Ubuntu cheat sheet
Ubuntu cheat sheetUbuntu cheat sheet
Ubuntu cheat sheet
 
Php cheat sheet
Php cheat sheetPhp cheat sheet
Php cheat sheet
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheet
 

Kürzlich hochgeladen

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxEasyPrinterHelp
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 

Kürzlich hochgeladen (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 

Biometric steganography

  • 1. Biometric steganography By – Manoj Kumar Mohanty Department of Computer Science and Engineering NIT Rourkela
  • 2. 2 19/3/2012 Outline  Introduction  Application Scenarios  LSB Insertion method  Amplitude modulation-based hiding  Conclusion
  • 3. 3 19/3/2012 Introduction  Biometrics data provides uniqueness but do not provide secrecy.  For wide spread utilization of biometric techniques, security of biometric data is essential.
  • 4. 4 19/3/2012 Biometric data security Steganography Cryptography BIOMETRICS DATA Watermarking
  • 5. 5 19/3/2012 Application Scenario  Biometric data, such as fingerprint minutiae is hidden in a cover image and is transmitted.  The function of the host or cover image is only to carry the data and it need not be related to the data in any way.
  • 6. 6 19/3/2012 Cover Images Synthetic Face Arbitrary Fingerprint image image image
  • 7. 7 19/3/2012 Synthetic Fingerprint
  • 8. 8 19/3/2012 Cover Image Minutiae Watermark Secret Data Encoder Key Stego Image Communication Channel Watermark Secret Decoder Key Extracted Minutiae Data Steganography-based minutiae hiding
  • 9. 9 19/3/2012 LSB Insertion Method  Take the binary representation of the biometric data and replace it over the least significant bit(LSB) of each byte within the cover image.  In 24 bit color image, the amount of change will be minimal and difficult to detect.
  • 10. 10 19/3/2012 LSB Insertion cont.  Consider three adjacent pixels (9 bytes) with the RGB encoding as follows 11110101 11001101 10101001 10100110 11001111 11001010 10101111 00010011 11001000  Suppose the data to be hidden in binary is (101101101).
  • 11. 11 19/3/2012 LSB Insertion Cont. 11110101 11001100 10101001 10100111 11001110 11001011 10101111 00010011 11001000  9 bits successfully hidden by only changing 4 bits.
  • 12. 12 19/3/2012 LSB Insertion Method: Advantages  If message bit is same as the pixel’s least significant bit then no change is required for that pixel value.  If pixel value is different from message bit then effective change in pixel value is still invisible to human eye.
  • 13. 13 19/3/2012 LSB Insertion Method: Disadvantages  Message can be easily removed by an intruder as message is in the least significant bit.  Further intruder can modify the least significant bit of all the image pixels.  The least significant bit may get corrupted by hardware imperfections or noise.
  • 14. 14 19/3/2012 Amplitude-modulation based hiding technique  Convert the minutiae data into a bit stream.  Every field of individual minutiae is converted to a 9-bit binary representation.  A random number generator initialized with the secret key generates locations of the host image pixels to be watermarked.
  • 15. 15 19/3/2012
  • 16. 16 19/3/2012
  • 17. 17 19/3/2012
  • 18. 18 19/3/2012  Every watermark bit with the value s is embedded in multiple locations to ensure better decoding rate of the embedded information.  Along with the binary minutiae data, two reference bits, 0 and 1 are also embedded to the image.  These help in calculating an adaptive threshold in determining the minutiae bit values during decoding.
  • 19. 19 19/3/2012 Decoding
  • 20. 20 19/3/2012
  • 21. 21 19/3/2012
  • 22. 22 19/3/2012  From decoded watermark bits, the minutiae data hidden in the host image is extracted.  This data hiding model is robust and can handle attacks such as image cropping, and JPEG compression.
  • 23. 23 19/3/2012 Conclusion  The ability of biometrics-based personal identification techniques to efficiently differentiate between an authorized person and an impostor is one of the main reasons for their popularity in contrast to the traditional security techniques.  However, the security and integrity of the biometric data itself are important issues. Application of steganography is a possible techniques to secure biometric data. Currently research is going on to increase the data hiding capacity of the host images and methods for combining watermarking schemes to achieve better result.
  • 24. 24 19/3/2012 References [1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, in Proc. AutoID02, NY, March 2002 [2] Chander Kant, Rajender Nath, Sheetal Chaudhary: “Biometrics Security using Steganography”, in CSC online Journal “International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008. [3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical Access Control Enhanced by Use of Steganography Over Secured Transmission Channel", in IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, September 2011. [4] http://biolab.csr.unibo.it/ Biometric System Laboratory, University of Bologna, Italy
  • 25. 25 19/3/2012