SlideShare a Scribd company logo
1 of 25
Biometric
steganography



By –
Manoj Kumar Mohanty
Department of Computer
Science and Engineering
NIT Rourkela
2          19/3/2012




Outline
 Introduction

 Application    Scenarios
 LSB   Insertion method
 Amplitude   modulation-based hiding
 Conclusion
3                 19/3/2012




Introduction
 Biometrics data provides uniqueness but
  do not provide secrecy.
 For wide spread utilization of biometric
  techniques, security of biometric data is
  essential.
4                   19/3/2012




Biometric data security
                             Steganography

Cryptography

               BIOMETRICS
                  DATA




                       Watermarking
5                 19/3/2012




Application Scenario
 Biometric data, such as fingerprint
  minutiae is hidden in a cover image and is
  transmitted.
 The function of the host or cover image is
  only to carry the data and it need not be
  related to the data in any way.
6               19/3/2012




Cover Images




Synthetic     Face    Arbitrary
Fingerprint   image   image
image
7        19/3/2012




Synthetic Fingerprint
8                    19/3/2012




                   Cover
                   Image


Minutiae         Watermark             Secret
 Data             Encoder               Key


                Stego Image

                        Communication Channel

                 Watermark             Secret
                  Decoder               Key


           Extracted Minutiae Data

  Steganography-based minutiae hiding
9                   19/3/2012




LSB Insertion Method
 Take  the binary representation of the
  biometric data and replace it over the
  least significant bit(LSB) of each byte
  within the cover image.
 In 24 bit color image, the amount of
  change will be minimal and difficult to
  detect.
10                19/3/2012




LSB Insertion cont.
 Consider  three adjacent pixels (9 bytes)
 with the RGB encoding as follows
  11110101 11001101 10101001
  10100110 11001111 11001010
  10101111 00010011 11001000
 Suppose the data to be hidden in binary
 is (101101101).
11            19/3/2012




LSB Insertion Cont.
      11110101 11001100 10101001
      10100111 11001110 11001011
      10101111 00010011 11001000

 9 bits successfully hidden by only
changing 4 bits.
12                 19/3/2012




LSB Insertion Method:
Advantages
 If message bit is same as the pixel’s least
  significant bit then no change is required
  for that pixel value.
 If pixel value is different from message bit
  then effective change in pixel value is still
  invisible to human eye.
13                19/3/2012




LSB Insertion Method:
Disadvantages
 Message    can be easily removed by an
  intruder as message is in the least
  significant bit.
 Further intruder can modify the least
  significant bit of all the image pixels.
 The least significant bit may get corrupted

  by hardware imperfections or noise.
14                19/3/2012




Amplitude-modulation based
hiding technique
 Convert   the minutiae data into a bit
  stream.
 Every field of individual minutiae is
  converted to a 9-bit binary
  representation.
 A random number generator initialized
  with the secret key generates locations of
  the host image pixels to be watermarked.
15   19/3/2012
16   19/3/2012
17   19/3/2012
18               19/3/2012




 Every watermark bit with the value s is
  embedded in multiple locations to ensure
  better decoding rate of the embedded
  information.
 Along with the binary minutiae data, two
  reference bits, 0 and 1 are also
  embedded to the image.
 These help in calculating an adaptive
  threshold in determining the minutiae bit
  values during decoding.
19   19/3/2012




Decoding
20   19/3/2012
21   19/3/2012
22                19/3/2012




 From  decoded watermark bits, the
  minutiae data hidden in the host image is
  extracted.
 This data hiding model is robust and can
  handle attacks such as image cropping,
  and JPEG compression.
23                   19/3/2012




Conclusion
   The ability of biometrics-based personal
    identification techniques to efficiently
    differentiate between an authorized person and
    an impostor is one of the main reasons for their
    popularity in contrast to the traditional security
    techniques.
   However, the security and integrity of the
    biometric data itself are important issues.
    Application of steganography is a possible
    techniques to secure biometric data. Currently
    research is going on to increase the data hiding
    capacity of the host images and methods for
    combining watermarking schemes to achieve
    better result.
24                            19/3/2012




References
[1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, in
Proc. AutoID02, NY, March 2002

[2] Chander Kant, Rajender Nath, Sheetal Chaudhary:
“Biometrics Security using Steganography”, in CSC online Journal
“International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008.

[3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical Access
Control Enhanced by Use of Steganography Over Secured
Transmission Channel", in IEEE International Conference on Intelligent
Data Acquisition and Advanced Computing Systems: Technology and
Applications, September 2011.

[4] http://biolab.csr.unibo.it/
   Biometric System Laboratory, University of Bologna, Italy
25   19/3/2012

More Related Content

What's hot

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
steganography
steganographysteganography
steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
CoAP protocol -Internet of Things(iot)
CoAP protocol -Internet of Things(iot)CoAP protocol -Internet of Things(iot)
CoAP protocol -Internet of Things(iot)
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 

Viewers also liked

Startup Launch Pad 2011
Startup Launch Pad 2011 Startup Launch Pad 2011
Startup Launch Pad 2011
kommaraj
 
Brochure_Application Outsourcing
Brochure_Application OutsourcingBrochure_Application Outsourcing
Brochure_Application Outsourcing
Stefan Forssman
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 

Viewers also liked (19)

NNIT
NNITNNIT
NNIT
 
Startup Launch Pad 2011
Startup Launch Pad 2011 Startup Launch Pad 2011
Startup Launch Pad 2011
 
Brochure_Application Outsourcing
Brochure_Application OutsourcingBrochure_Application Outsourcing
Brochure_Application Outsourcing
 
Copenhagen Capacity 'Invitation'
Copenhagen Capacity 'Invitation'Copenhagen Capacity 'Invitation'
Copenhagen Capacity 'Invitation'
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
 
Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combine
 
Biometric
BiometricBiometric
Biometric
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
rm ppt 2
rm ppt 2rm ppt 2
rm ppt 2
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Biometric steganography

Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 

Similar to Biometric steganography (20)

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
It3116411644
It3116411644It3116411644
It3116411644
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
C010511420
C010511420C010511420
C010511420
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
167 171
167 171167 171
167 171
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 
P017329498
P017329498P017329498
P017329498
 

More from Piyush Mittal (20)

Power mock
Power mockPower mock
Power mock
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorial
 
Reflection
ReflectionReflection
Reflection
 
Gpu archi
Gpu archiGpu archi
Gpu archi
 
Cuda Architecture
Cuda ArchitectureCuda Architecture
Cuda Architecture
 
Intel open mp
Intel open mpIntel open mp
Intel open mp
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computing
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manual
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDA
 
Channel coding
Channel codingChannel coding
Channel coding
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Java cheat sheet
Java cheat sheetJava cheat sheet
Java cheat sheet
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheet
 
Git cheat sheet
Git cheat sheetGit cheat sheet
Git cheat sheet
 
Vi cheat sheet
Vi cheat sheetVi cheat sheet
Vi cheat sheet
 
Css cheat sheet
Css cheat sheetCss cheat sheet
Css cheat sheet
 
Cpp cheat sheet
Cpp cheat sheetCpp cheat sheet
Cpp cheat sheet
 
Ubuntu cheat sheet
Ubuntu cheat sheetUbuntu cheat sheet
Ubuntu cheat sheet
 
Php cheat sheet
Php cheat sheetPhp cheat sheet
Php cheat sheet
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheet
 

Recently uploaded

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Biometric steganography

  • 1. Biometric steganography By – Manoj Kumar Mohanty Department of Computer Science and Engineering NIT Rourkela
  • 2. 2 19/3/2012 Outline  Introduction  Application Scenarios  LSB Insertion method  Amplitude modulation-based hiding  Conclusion
  • 3. 3 19/3/2012 Introduction  Biometrics data provides uniqueness but do not provide secrecy.  For wide spread utilization of biometric techniques, security of biometric data is essential.
  • 4. 4 19/3/2012 Biometric data security Steganography Cryptography BIOMETRICS DATA Watermarking
  • 5. 5 19/3/2012 Application Scenario  Biometric data, such as fingerprint minutiae is hidden in a cover image and is transmitted.  The function of the host or cover image is only to carry the data and it need not be related to the data in any way.
  • 6. 6 19/3/2012 Cover Images Synthetic Face Arbitrary Fingerprint image image image
  • 7. 7 19/3/2012 Synthetic Fingerprint
  • 8. 8 19/3/2012 Cover Image Minutiae Watermark Secret Data Encoder Key Stego Image Communication Channel Watermark Secret Decoder Key Extracted Minutiae Data Steganography-based minutiae hiding
  • 9. 9 19/3/2012 LSB Insertion Method  Take the binary representation of the biometric data and replace it over the least significant bit(LSB) of each byte within the cover image.  In 24 bit color image, the amount of change will be minimal and difficult to detect.
  • 10. 10 19/3/2012 LSB Insertion cont.  Consider three adjacent pixels (9 bytes) with the RGB encoding as follows 11110101 11001101 10101001 10100110 11001111 11001010 10101111 00010011 11001000  Suppose the data to be hidden in binary is (101101101).
  • 11. 11 19/3/2012 LSB Insertion Cont. 11110101 11001100 10101001 10100111 11001110 11001011 10101111 00010011 11001000  9 bits successfully hidden by only changing 4 bits.
  • 12. 12 19/3/2012 LSB Insertion Method: Advantages  If message bit is same as the pixel’s least significant bit then no change is required for that pixel value.  If pixel value is different from message bit then effective change in pixel value is still invisible to human eye.
  • 13. 13 19/3/2012 LSB Insertion Method: Disadvantages  Message can be easily removed by an intruder as message is in the least significant bit.  Further intruder can modify the least significant bit of all the image pixels.  The least significant bit may get corrupted by hardware imperfections or noise.
  • 14. 14 19/3/2012 Amplitude-modulation based hiding technique  Convert the minutiae data into a bit stream.  Every field of individual minutiae is converted to a 9-bit binary representation.  A random number generator initialized with the secret key generates locations of the host image pixels to be watermarked.
  • 15. 15 19/3/2012
  • 16. 16 19/3/2012
  • 17. 17 19/3/2012
  • 18. 18 19/3/2012  Every watermark bit with the value s is embedded in multiple locations to ensure better decoding rate of the embedded information.  Along with the binary minutiae data, two reference bits, 0 and 1 are also embedded to the image.  These help in calculating an adaptive threshold in determining the minutiae bit values during decoding.
  • 19. 19 19/3/2012 Decoding
  • 20. 20 19/3/2012
  • 21. 21 19/3/2012
  • 22. 22 19/3/2012  From decoded watermark bits, the minutiae data hidden in the host image is extracted.  This data hiding model is robust and can handle attacks such as image cropping, and JPEG compression.
  • 23. 23 19/3/2012 Conclusion  The ability of biometrics-based personal identification techniques to efficiently differentiate between an authorized person and an impostor is one of the main reasons for their popularity in contrast to the traditional security techniques.  However, the security and integrity of the biometric data itself are important issues. Application of steganography is a possible techniques to secure biometric data. Currently research is going on to increase the data hiding capacity of the host images and methods for combining watermarking schemes to achieve better result.
  • 24. 24 19/3/2012 References [1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, in Proc. AutoID02, NY, March 2002 [2] Chander Kant, Rajender Nath, Sheetal Chaudhary: “Biometrics Security using Steganography”, in CSC online Journal “International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008. [3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical Access Control Enhanced by Use of Steganography Over Secured Transmission Channel", in IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, September 2011. [4] http://biolab.csr.unibo.it/ Biometric System Laboratory, University of Bologna, Italy
  • 25. 25 19/3/2012