SlideShare a Scribd company logo
1 of 5
Download to read offline
Chander Kant, Ranjender Nath & Sheetal Chaudhary
International Journal of Security, Volume (2) : Issue (1) 1
Biometrics Security using Steganography
Chander Kant ckverma@rediffmail.com
Faculty, Department of Comp. Sc. and Applications
K.U. Kurukshetra, Haryana (INDIA)
Rajender Nath rnath_2k3@rediffmail.com
Faculty, Department of Comp. Sc. and Applications
K.U. Kurukshetra, Haryana (INDIA)
Sheetal Chaudhary sheetalkuk@rediffmail.com
Research Scholar, Department of Comp. Sc. and Applications
K.U. Kurukshetra, Haryana (INDIA)
Abstract
A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the
security afforded by the system or to put off the normal functioning of the system. Various risks
have been discovered while using biometric system. Proper use of cryptography greatly reduces
the risks in biometric systems as the hackers have to find both secret key and template. It is
notified that still fraudrant goes on to some extent. Here in this paper a new idea is presented to
make system more secure by use of steganography. Here the secret key (which is in the form of
pixel intensities) will be merged in the picture itself while encoding, and at decoding end only the
authentic user will be allowed to decode.
Keywords: biometric, steganography, cryptography, encoding, decoding
1. Introduction
There are basically two kinds of biometric systems [1] Automated identification systems, operated
by professionals. The purpose of such systems is to identify an individual to find a criminal of a
crime according to trails left on the crime scene. The operators of these systems do not have any
reason to cheat the system used by ordinary users to gain a privilege or an access right. Securing
such a system is much more complicated task; such systems cannot cope with the situations
when the biometric measurements are disclosed, because biometrics cannot be changed (unless
the user is willing to have an organ transplant). Moreover, the user will not learn that his/her
biometric is disclosed. People leave fingerprints on everything they touch, and the iris can be
observed anywhere they look. Biometrics definitely is sensitive data and therefore should be
properly protected, but they cannot be considered secret. So the security of the system cannot be
Chander Kant, Ranjender Nath & Sheetal Chaudhary
International Journal of Security, Volume (2) : Issue (1) 2
based on knowledge of the biometric characteristics [2]. A solution to this problem presented here
that beside fingerprint template, a secret data is also tagged which is secret [3]. By applying
steganography technique biometric system can enhance user convenience and boost security; it
is also protected to various types of threats.
A typical biometric system comprises of several modules. The sensor module acquires the raw
biometric data of an individual in the form of an image, video, audio or some other signal. The
feature extraction module operates on the biometric signal and extracts a salient set of features to
represent the signal; during user enrolment the extracted feature set, labeled with the user’s
identity, is stored in the biometric system and is known as a template.
(Fig1. Vulnerable in biometric system)
The matching module compares the feature set extracted during authentication with the enrolled
template(s) and generates match scores. The decision module processes these match scores in
order to either determine or verify the identity of an individual. Thus, in biometric system several
different levels of attacks [3] that can be launched (Figure 1):
(i) A fake biometric trait such as an artificial finger may be presented at the sensor [4], (ii) illegally
intercepted data may be resubmitted to the system, (iii) the feature extractor may be replaced by
a Trojan horse program that produces pre-determined feature sets, (iv) legitimate feature sets
may be replaced with synthetic feature sets, (v) the matcher may be replaced by a Trojan horse
program that always outputs high scores thereby defying system security, (vi) the templates
stored in the database may be modified or removed, or new templates may be introduced in the
database, (vii) the data in the communication channel between various modules of the system
may be altered, and (viii) the final decision [5].
Chander Kant, Ranjender Nath & Sheetal Chaudhary
International Journal of Security, Volume (2) : Issue (1) 3
2. Problem Formulation
Imposter Attack
An “exact match” occurs when the digital representation of the live sample extracted from the
capture device is identical to the stored biometric template to which it is compared. In most
applications, an exact match is a good thing, but in biometrics, it is cause for suspicion. There is
natural variability in the sample capture process that makes exact matches unlikely for many
biometric technologies. When one occurs, it may be indicative that someone has improperly
obtained the biometric template and is staging a replay attack [6].
A potential solution is to reject exact matches, thereby requiring the user to provide another
sample. If the user is a valid one, then the variability in the sample capture process should lead to
something other than an exact match on the second authentication attempt. On the other hand, if
the user is an imposter who is in possession of the signed reference template only, then it may be
difficult for the imposter to produce a different sample on the second attempt. There are so many
types of attacks when the biometrics is under suspicious case [7], like (i) Circumvention: An
impostor may gain access to the system protected by biometrics and peruse sensitive data such
as medical records pertaining to a legitimately enrolled user. Besides violating the privacy of the
enrolled user, the impostor can also modify sensitive data. (ii) Repudiation: A legitimate user may
access the facilities offered by an application and then claim that an intruder had circumvented
the system. A bank clerk, for example, may modify the financial records of a customer and then
deny responsibility by claiming that an intruder could have possibly stolen her biometric data. (iii)
Covert acquisition: An impostor may secretly obtain the raw biometric data of a user to access the
system. For example, the latent fingerprints of a user may be lifted from an object by an intruder
and later used to construct a digital or physical artifact of that user’s finger. (iv) Collusion: An
individual with wide super-user privileges (such as an administrator) may deliberately modify
system parameters to permit incursions by an intruder. (v) Coercion: An impostor may force a
legitimate user (e.g., at gunpoint) to grant him access to the system.
3. Use of Steganography in Biometrics
In many cases, the appropriate use of cryptography also reduces this threat [8]. The Security
Administrator will configure the biometric system to encrypt and digitally sign all biometric data
before it is transmitted from one physical device to another.
Figure 2. Use of Steganography for creating secret Templates
Chander Kant, Ranjender Nath & Sheetal Chaudhary
International Journal of Security, Volume (2) : Issue (1) 4
Steganography can greatly reduce these attacks because attackers must have to obtain the
system’s private data in addition, to breaching the security of the capture device or biometric
storage. This makes these attacks considerably more difficult to achieve But steganography is
more secure than cryptography because there is no separate key (Figure 2) in steganography
rather key is inbuilt in the template [9].
4. How to Apply Steganography in Biometrics
4.1 Algorithm for insertion of message bit ‘b’ [10, 11].
(i) Find pseudo-random location ‘l’ in image from secret key to insert the message bit b. (ii) Check
whether at location ‘l’, pixel value is 00000000 or 11111111, called boundary values. If yes,
ignore this location and go to step (i). Here we are ignoring these boundary values because the
change may be +2 or -2 in pixel values, which is to be avoided.
(iii) Check whether at location ‘l’
a) 6th and 7th bits are b, b? If yes, then no change at ‘l’ is required. Message bit is already
there. Go to End.
b) 6th and 7th bit are b, b or b, b? If yes, then see that whether it is possible to make 6th
and 7th bits as b, b by adding or subtracting 1 to pixel value?. If yes, do it and go to End.
Otherwise ignore the location ‘l’ and go to step (i).
c) 6th and 7th bits are b, b? If yes, then see whether it is possible to make 6th and 7th bits
to b, b by adding or subtracting 1? If yes, do it and go to End. Otherwise change them to
b, b or b, b by adding or subtracting 1 and go to (i).
(iv) End.
4.2 Algorithm for retrieval of message bit ‘b’
(i) Trace out the location ‘l’ from the same secret key as used in insertion algorithm.
(ii) Pixel value is equal to one of the boundary values, i.e., 00000000 or 11111111? If yes, then it
is invalid address. Go to step (i).
(iii) Check whether at location ‘l’
a) 6th and 7th bits are different, i.e., b, b or b, b? If yes, then it is invalid address go to step (i).
b) 6th and 7th bits are same i.e. b, b then b is the message bit.
(iv) End.
The main results we got from our insertion algorithm are [12].
• 49% chances, that message bit will be inserted at pseudorandom location at first chance.
• 50% chance, that when message bit is inserted, no change in pixel value is required.
• 12.5% chances, that change in pixel value is required, when we are ignoring the location.
Chander Kant, Ranjender Nath & Sheetal Chaudhary
International Journal of Security, Volume (2) : Issue (1) 5
5. Summary and Future Prospectus
We have discussed various types of attacks that can be launched against a biometric system. We
discuss the importance of steganography principles to enhance the integrity and security of
biometric templates. Biometric cryptosystems can contribute to template security by supporting
biometric matching in secure cryptographic domains. Smart cards are gaining popularity as the
medium for storing biometric templates. As the amount of available memory increases there is a
tendency to store more information in the template. This increases the risks associated with
template misuse. As a result, the issue of template security and integrity continues to cause
several challenges, and it is necessary that further research be conducted in this direction.
REFERENCES
[1] A. K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked
Society. Kluwer Academic Publishers, 1999.
[2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition.
Springer- Verlag, 2003.
[3] A. K. Jain, Arun Ross and U. Uludag “Biometrics Template security: Challenges and solutions”
in Proc. of European Signal Processing Conference September 2005.
[4] U.K. Biometric Working Group, “Biometric security concerns,” Technical Report, CESG,
September 2003, http://www.cesg.gov.uk/site/ast/biometrics/media/
BiometricSecurityConcerns.pdf.
[5] A. Adler, “Can images be regenerated from biometric templates?,” in Biometrics Consortium
Conference, (Arlington, VA), September 2003.
[6] A. Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in
Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL),
March 2005.
[7] R. Cappelli, R. Erol, D. Maio, and D. Maltoni, “Synthetic fingerprint-image generation,” in Proc.
Int’l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475–478,
(Barcelona, Spain), September 2000.
[8] C. Soutar, “Biometric system security,” White Paper, Bioscrypt, http://www.bioscrypt.com.
[9] U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and
challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004.
[10] Neil F. Johnson, Sushil Jajodia, “Steganalysis of Images Created Using Current
Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag.
[11] Parvinder Singh, Sudhir Batra, HR Sharma, “Evaluating the Performance of Message Hidden
in 1st and 2nd Bit Plane”, WSEAS Transactions on Information Science and Applications”, issue
8, vol 2, Aug 2005, pp 1220-1227.

More Related Content

What's hot

A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...sipij
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyNagarjuna mahanti
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemIJRES Journal
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesIJCSIS Research Publications
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Alexander Decker
 

What's hot (19)

A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
G017544855
G017544855G017544855
G017544855
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
J1802035460
J1802035460J1802035460
J1802035460
 
A04820104
A04820104A04820104
A04820104
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
 

Viewers also liked

Courier Mail Article_Career One_Russo Recruitment
Courier Mail Article_Career One_Russo RecruitmentCourier Mail Article_Career One_Russo Recruitment
Courier Mail Article_Career One_Russo RecruitmentSalene Gallagher
 
Marco vinicio lópez oñate
Marco vinicio lópez oñateMarco vinicio lópez oñate
Marco vinicio lópez oñateMarco Lopez
 
Minnesota Public Programs in an ACA World
Minnesota Public Programs in an ACA WorldMinnesota Public Programs in an ACA World
Minnesota Public Programs in an ACA Worldshenry0105
 
Culturas del peru
Culturas del peruCulturas del peru
Culturas del perufrancis2016
 
FinalDraft-SocializationandGenderinBrave
FinalDraft-SocializationandGenderinBraveFinalDraft-SocializationandGenderinBrave
FinalDraft-SocializationandGenderinBraveEmily McConnell
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
 

Viewers also liked (8)

Courier Mail Article_Career One_Russo Recruitment
Courier Mail Article_Career One_Russo RecruitmentCourier Mail Article_Career One_Russo Recruitment
Courier Mail Article_Career One_Russo Recruitment
 
Marco vinicio lópez oñate
Marco vinicio lópez oñateMarco vinicio lópez oñate
Marco vinicio lópez oñate
 
inuyasha
inuyashainuyasha
inuyasha
 
Minnesota Public Programs in an ACA World
Minnesota Public Programs in an ACA WorldMinnesota Public Programs in an ACA World
Minnesota Public Programs in an ACA World
 
Culturas del peru
Culturas del peruCulturas del peru
Culturas del peru
 
FinalDraft-SocializationandGenderinBrave
FinalDraft-SocializationandGenderinBraveFinalDraft-SocializationandGenderinBrave
FinalDraft-SocializationandGenderinBrave
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
 
Pradip _ Updated
Pradip _ UpdatedPradip _ Updated
Pradip _ Updated
 

Similar to Biometrics Security using Steganography

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesTanjarul Islam Mishu
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksSaif Salah
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
 
Information Security using Cryptography and Image Processing
Information Security using Cryptography and Image ProcessingInformation Security using Cryptography and Image Processing
Information Security using Cryptography and Image Processingijsrd.com
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMangaiK4
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET Journal
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 

Similar to Biometrics Security using Steganography (20)

Iciea08
Iciea08Iciea08
Iciea08
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and Attacks
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
Information Security using Cryptography and Image Processing
Information Security using Cryptography and Image ProcessingInformation Security using Cryptography and Image Processing
Information Security using Cryptography and Image Processing
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic System
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Ransomware
RansomwareRansomware
Ransomware
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Biometrics Security using Steganography

  • 1. Chander Kant, Ranjender Nath & Sheetal Chaudhary International Journal of Security, Volume (2) : Issue (1) 1 Biometrics Security using Steganography Chander Kant ckverma@rediffmail.com Faculty, Department of Comp. Sc. and Applications K.U. Kurukshetra, Haryana (INDIA) Rajender Nath rnath_2k3@rediffmail.com Faculty, Department of Comp. Sc. and Applications K.U. Kurukshetra, Haryana (INDIA) Sheetal Chaudhary sheetalkuk@rediffmail.com Research Scholar, Department of Comp. Sc. and Applications K.U. Kurukshetra, Haryana (INDIA) Abstract A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the security afforded by the system or to put off the normal functioning of the system. Various risks have been discovered while using biometric system. Proper use of cryptography greatly reduces the risks in biometric systems as the hackers have to find both secret key and template. It is notified that still fraudrant goes on to some extent. Here in this paper a new idea is presented to make system more secure by use of steganography. Here the secret key (which is in the form of pixel intensities) will be merged in the picture itself while encoding, and at decoding end only the authentic user will be allowed to decode. Keywords: biometric, steganography, cryptography, encoding, decoding 1. Introduction There are basically two kinds of biometric systems [1] Automated identification systems, operated by professionals. The purpose of such systems is to identify an individual to find a criminal of a crime according to trails left on the crime scene. The operators of these systems do not have any reason to cheat the system used by ordinary users to gain a privilege or an access right. Securing such a system is much more complicated task; such systems cannot cope with the situations when the biometric measurements are disclosed, because biometrics cannot be changed (unless the user is willing to have an organ transplant). Moreover, the user will not learn that his/her biometric is disclosed. People leave fingerprints on everything they touch, and the iris can be observed anywhere they look. Biometrics definitely is sensitive data and therefore should be properly protected, but they cannot be considered secret. So the security of the system cannot be
  • 2. Chander Kant, Ranjender Nath & Sheetal Chaudhary International Journal of Security, Volume (2) : Issue (1) 2 based on knowledge of the biometric characteristics [2]. A solution to this problem presented here that beside fingerprint template, a secret data is also tagged which is secret [3]. By applying steganography technique biometric system can enhance user convenience and boost security; it is also protected to various types of threats. A typical biometric system comprises of several modules. The sensor module acquires the raw biometric data of an individual in the form of an image, video, audio or some other signal. The feature extraction module operates on the biometric signal and extracts a salient set of features to represent the signal; during user enrolment the extracted feature set, labeled with the user’s identity, is stored in the biometric system and is known as a template. (Fig1. Vulnerable in biometric system) The matching module compares the feature set extracted during authentication with the enrolled template(s) and generates match scores. The decision module processes these match scores in order to either determine or verify the identity of an individual. Thus, in biometric system several different levels of attacks [3] that can be launched (Figure 1): (i) A fake biometric trait such as an artificial finger may be presented at the sensor [4], (ii) illegally intercepted data may be resubmitted to the system, (iii) the feature extractor may be replaced by a Trojan horse program that produces pre-determined feature sets, (iv) legitimate feature sets may be replaced with synthetic feature sets, (v) the matcher may be replaced by a Trojan horse program that always outputs high scores thereby defying system security, (vi) the templates stored in the database may be modified or removed, or new templates may be introduced in the database, (vii) the data in the communication channel between various modules of the system may be altered, and (viii) the final decision [5].
  • 3. Chander Kant, Ranjender Nath & Sheetal Chaudhary International Journal of Security, Volume (2) : Issue (1) 3 2. Problem Formulation Imposter Attack An “exact match” occurs when the digital representation of the live sample extracted from the capture device is identical to the stored biometric template to which it is compared. In most applications, an exact match is a good thing, but in biometrics, it is cause for suspicion. There is natural variability in the sample capture process that makes exact matches unlikely for many biometric technologies. When one occurs, it may be indicative that someone has improperly obtained the biometric template and is staging a replay attack [6]. A potential solution is to reject exact matches, thereby requiring the user to provide another sample. If the user is a valid one, then the variability in the sample capture process should lead to something other than an exact match on the second authentication attempt. On the other hand, if the user is an imposter who is in possession of the signed reference template only, then it may be difficult for the imposter to produce a different sample on the second attempt. There are so many types of attacks when the biometrics is under suspicious case [7], like (i) Circumvention: An impostor may gain access to the system protected by biometrics and peruse sensitive data such as medical records pertaining to a legitimately enrolled user. Besides violating the privacy of the enrolled user, the impostor can also modify sensitive data. (ii) Repudiation: A legitimate user may access the facilities offered by an application and then claim that an intruder had circumvented the system. A bank clerk, for example, may modify the financial records of a customer and then deny responsibility by claiming that an intruder could have possibly stolen her biometric data. (iii) Covert acquisition: An impostor may secretly obtain the raw biometric data of a user to access the system. For example, the latent fingerprints of a user may be lifted from an object by an intruder and later used to construct a digital or physical artifact of that user’s finger. (iv) Collusion: An individual with wide super-user privileges (such as an administrator) may deliberately modify system parameters to permit incursions by an intruder. (v) Coercion: An impostor may force a legitimate user (e.g., at gunpoint) to grant him access to the system. 3. Use of Steganography in Biometrics In many cases, the appropriate use of cryptography also reduces this threat [8]. The Security Administrator will configure the biometric system to encrypt and digitally sign all biometric data before it is transmitted from one physical device to another. Figure 2. Use of Steganography for creating secret Templates
  • 4. Chander Kant, Ranjender Nath & Sheetal Chaudhary International Journal of Security, Volume (2) : Issue (1) 4 Steganography can greatly reduce these attacks because attackers must have to obtain the system’s private data in addition, to breaching the security of the capture device or biometric storage. This makes these attacks considerably more difficult to achieve But steganography is more secure than cryptography because there is no separate key (Figure 2) in steganography rather key is inbuilt in the template [9]. 4. How to Apply Steganography in Biometrics 4.1 Algorithm for insertion of message bit ‘b’ [10, 11]. (i) Find pseudo-random location ‘l’ in image from secret key to insert the message bit b. (ii) Check whether at location ‘l’, pixel value is 00000000 or 11111111, called boundary values. If yes, ignore this location and go to step (i). Here we are ignoring these boundary values because the change may be +2 or -2 in pixel values, which is to be avoided. (iii) Check whether at location ‘l’ a) 6th and 7th bits are b, b? If yes, then no change at ‘l’ is required. Message bit is already there. Go to End. b) 6th and 7th bit are b, b or b, b? If yes, then see that whether it is possible to make 6th and 7th bits as b, b by adding or subtracting 1 to pixel value?. If yes, do it and go to End. Otherwise ignore the location ‘l’ and go to step (i). c) 6th and 7th bits are b, b? If yes, then see whether it is possible to make 6th and 7th bits to b, b by adding or subtracting 1? If yes, do it and go to End. Otherwise change them to b, b or b, b by adding or subtracting 1 and go to (i). (iv) End. 4.2 Algorithm for retrieval of message bit ‘b’ (i) Trace out the location ‘l’ from the same secret key as used in insertion algorithm. (ii) Pixel value is equal to one of the boundary values, i.e., 00000000 or 11111111? If yes, then it is invalid address. Go to step (i). (iii) Check whether at location ‘l’ a) 6th and 7th bits are different, i.e., b, b or b, b? If yes, then it is invalid address go to step (i). b) 6th and 7th bits are same i.e. b, b then b is the message bit. (iv) End. The main results we got from our insertion algorithm are [12]. • 49% chances, that message bit will be inserted at pseudorandom location at first chance. • 50% chance, that when message bit is inserted, no change in pixel value is required. • 12.5% chances, that change in pixel value is required, when we are ignoring the location.
  • 5. Chander Kant, Ranjender Nath & Sheetal Chaudhary International Journal of Security, Volume (2) : Issue (1) 5 5. Summary and Future Prospectus We have discussed various types of attacks that can be launched against a biometric system. We discuss the importance of steganography principles to enhance the integrity and security of biometric templates. Biometric cryptosystems can contribute to template security by supporting biometric matching in secure cryptographic domains. Smart cards are gaining popularity as the medium for storing biometric templates. As the amount of available memory increases there is a tendency to store more information in the template. This increases the risks associated with template misuse. As a result, the issue of template security and integrity continues to cause several challenges, and it is necessary that further research be conducted in this direction. REFERENCES [1] A. K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999. [2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer- Verlag, 2003. [3] A. K. Jain, Arun Ross and U. Uludag “Biometrics Template security: Challenges and solutions” in Proc. of European Signal Processing Conference September 2005. [4] U.K. Biometric Working Group, “Biometric security concerns,” Technical Report, CESG, September 2003, http://www.cesg.gov.uk/site/ast/biometrics/media/ BiometricSecurityConcerns.pdf. [5] A. Adler, “Can images be regenerated from biometric templates?,” in Biometrics Consortium Conference, (Arlington, VA), September 2003. [6] A. Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005. [7] R. Cappelli, R. Erol, D. Maio, and D. Maltoni, “Synthetic fingerprint-image generation,” in Proc. Int’l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475–478, (Barcelona, Spain), September 2000. [8] C. Soutar, “Biometric system security,” White Paper, Bioscrypt, http://www.bioscrypt.com. [9] U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004. [10] Neil F. Johnson, Sushil Jajodia, “Steganalysis of Images Created Using Current Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag. [11] Parvinder Singh, Sudhir Batra, HR Sharma, “Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane”, WSEAS Transactions on Information Science and Applications”, issue 8, vol 2, Aug 2005, pp 1220-1227.