Biometric steganography
Upcoming SlideShare
Loading in...5
×
 

Biometric steganography

on

  • 776 views

 

Statistics

Views

Total Views
776
Views on SlideShare
740
Embed Views
36

Actions

Likes
0
Downloads
23
Comments
0

3 Embeds 36

http://www.piyushmittal.in 23
http://www.binary-beans.com 11
http://2501120322128564119_dbb7c8de0ae54dd6e61878b7a99ab96bb05126d3.blogspot.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Biometric steganography Biometric steganography Presentation Transcript

  • BiometricsteganographyBy –Manoj Kumar MohantyDepartment of ComputerScience and EngineeringNIT Rourkela
  • 2 19/3/2012Outline Introduction Application Scenarios LSB Insertion method Amplitude modulation-based hiding Conclusion
  • 3 19/3/2012Introduction Biometrics data provides uniqueness but do not provide secrecy. For wide spread utilization of biometric techniques, security of biometric data is essential.
  • 4 19/3/2012Biometric data security SteganographyCryptography BIOMETRICS DATA Watermarking
  • 5 19/3/2012Application Scenario Biometric data, such as fingerprint minutiae is hidden in a cover image and is transmitted. The function of the host or cover image is only to carry the data and it need not be related to the data in any way.
  • 6 19/3/2012Cover ImagesSynthetic Face ArbitraryFingerprint image imageimage
  • 7 19/3/2012Synthetic Fingerprint
  • 8 19/3/2012 Cover ImageMinutiae Watermark Secret Data Encoder Key Stego Image Communication Channel Watermark Secret Decoder Key Extracted Minutiae Data Steganography-based minutiae hiding
  • 9 19/3/2012LSB Insertion Method Take the binary representation of the biometric data and replace it over the least significant bit(LSB) of each byte within the cover image. In 24 bit color image, the amount of change will be minimal and difficult to detect.
  • 10 19/3/2012LSB Insertion cont. Consider three adjacent pixels (9 bytes) with the RGB encoding as follows 11110101 11001101 10101001 10100110 11001111 11001010 10101111 00010011 11001000 Suppose the data to be hidden in binary is (101101101).
  • 11 19/3/2012LSB Insertion Cont. 11110101 11001100 10101001 10100111 11001110 11001011 10101111 00010011 11001000 9 bits successfully hidden by onlychanging 4 bits.
  • 12 19/3/2012LSB Insertion Method:Advantages If message bit is same as the pixel’s least significant bit then no change is required for that pixel value. If pixel value is different from message bit then effective change in pixel value is still invisible to human eye.
  • 13 19/3/2012LSB Insertion Method:Disadvantages Message can be easily removed by an intruder as message is in the least significant bit. Further intruder can modify the least significant bit of all the image pixels. The least significant bit may get corrupted by hardware imperfections or noise.
  • 14 19/3/2012Amplitude-modulation basedhiding technique Convert the minutiae data into a bit stream. Every field of individual minutiae is converted to a 9-bit binary representation. A random number generator initialized with the secret key generates locations of the host image pixels to be watermarked.
  • 15 19/3/2012
  • 16 19/3/2012
  • 17 19/3/2012
  • 18 19/3/2012 Every watermark bit with the value s is embedded in multiple locations to ensure better decoding rate of the embedded information. Along with the binary minutiae data, two reference bits, 0 and 1 are also embedded to the image. These help in calculating an adaptive threshold in determining the minutiae bit values during decoding.
  • 19 19/3/2012Decoding
  • 20 19/3/2012
  • 21 19/3/2012
  • 22 19/3/2012 From decoded watermark bits, the minutiae data hidden in the host image is extracted. This data hiding model is robust and can handle attacks such as image cropping, and JPEG compression.
  • 23 19/3/2012Conclusion The ability of biometrics-based personal identification techniques to efficiently differentiate between an authorized person and an impostor is one of the main reasons for their popularity in contrast to the traditional security techniques. However, the security and integrity of the biometric data itself are important issues. Application of steganography is a possible techniques to secure biometric data. Currently research is going on to increase the data hiding capacity of the host images and methods for combining watermarking schemes to achieve better result.
  • 24 19/3/2012References[1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, inProc. AutoID02, NY, March 2002[2] Chander Kant, Rajender Nath, Sheetal Chaudhary:“Biometrics Security using Steganography”, in CSC online Journal“International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008.[3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical AccessControl Enhanced by Use of Steganography Over SecuredTransmission Channel", in IEEE International Conference on IntelligentData Acquisition and Advanced Computing Systems: Technology andApplications, September 2011.[4] http://biolab.csr.unibo.it/ Biometric System Laboratory, University of Bologna, Italy
  • 25 19/3/2012