SlideShare a Scribd company logo
1 of 30
`ADVANCED AUTHENTICATION USING VISUAL
CRYPTOGRAPHY AND A STEGANOGRAPHIC Via
BIOMETRICS FOR ONLINE EXAMS/INTERVIEWS
OBJECTIVE
 To develop a two factor authentication mechanism based on visual
Cryptographic scheme and video object Steganography via biometrics
INTRODUCTION
 Authentication is the act of confirming identification of someone, some application…
 Normally authentication includes the use of username, password, digital cards, signatures,
biometric attributes.
 Where biometric attributes are unique to every individual and there by used in variety of
application where there need to claim authenticity of individual
 In this system authentication is done using biometric attribute ie.,fingerprint
 With the rapid transmission of biometric data over internet ,the security of the data is in major concern
 To avoid these security threats and sharing issues the secret information like text ,audio ,video, image
used for authentications are applied using the techniques visual cryptography and steganography
 In this proposed system visual cryptography and steganography are implemented individually for
different attributes
 Visual cryptography is technique to generate the shares of a secret image and the secret can be achieved
by combining both shares
 Steganogtaphy is used to hide the secret image within a cover image
SCOPE OF THE SYSTEM
 In todays century security and authentication are the major concern in all type of application
like online exams,interview,banking..etc
 Where communicating entities are located at different locations
 To ensure the security of the systems and digital data shared , there should be a dual
authentication process
 The proposed system provides the facility with both visual cryptography and steganography
 The programing is developed using MATLAB software and presented in graphical user
interphase
SYSTEM OVERVIEW
SYSTEM OVERVIEW
VERIFIABLE VISUAL CRYPTOGRAPHY
• Visual cryptography is a cryptographic technique which allows visual information to be encrypted in
such a way that the decryption can be performed by the human visual system, without the aid of
computers.
• Visual cryptography scheme eliminates complex computation problem in decryption process, and the
secret images can be restored by stacking operation.
• This property makes visual cryptography especially useful for the low computation load requirement
• In this system we are using (2,2) VCS scheme which generate two shares of image. For input binary
image which is in 1 and 0 format.
• In the 2-out-of-2 scheme, every secret pixel of the image is converted into two shares and recovered by
simply stacking two shares together.
• This is equivalent to using the OR operation between the shares.
• First we take a monochrome image for the source. Pixels in the image are either white or black
• Next sub-divide each pixel into four smaller subpixels.
• shade these four subpixels to represent the source image, then subjectively divide them between the two
cypher images are to create.
• Distribute the shading such that, if you have just one of the cypher images, it is impossible to determine
what is on the other cypher image, and thus, impossible to decrypt the image.
• If the original pixel in the image is black, fill in all four sub pixels then distribute them.
• The pattern selection is random
• It does not matter which pair of pixels goes on which layer, when they are combined, all four pixels will
be black.
• Conversely, if the source image pixel is white, shade in just two pixels, make sure that
the same pixels are shaded on both layers.
• In this way, when the two cypher images are combined, only two pixels are shaded.
• The result of this process is two images which when combined result in an image with half the
contrast of the original.
• The black of the source remains black in the combined cypher, but the white in the source is changed
to a randomly mottled half-tone gray
• this is still sufficiently high enough contrast for the secret message to be easily read
.
BLOWFISH ENCRYPTION
• Image encryption is necessary for future multimedia Internet applications.
• By encrypting these images, a degree of security can be achieved.
• Blowfish is a symmetric block cipher that can be effectively used for encryption and safeguarding of
data
• It takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data.
• Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times
• Blowfish contains 16 rounds. Each round consists of XOR operation and a function. Each round
consists of key expansion and data encryption.
Algorithm: Blowfish Encryption
 Divide x into two 32-bit halves: xL, xR
 For i = 1to 16:
 xL = XL XOR Pi
 xR = F(XL) XOR xR
 Swap XL and xR
 Swap XL and xR (Undo the last swap.)
 xR = xR XOR P17
 xL = xL XOR P18
 Recombine xL and xR
Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the
feistel network and this algorithm is divided into two parts.
• 1. Key-expansion
• 2. Data Encryption
Key-expansion:
• It will converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Blowfish uses
large number of subkeys. These keys are generate earlier to any data encryption or decryption.
• The p-array consists of 18, 32-bit subkeys: P1,P2,………….,P1
Data Encryption:
• It is having a function to iterate 16 times of network. Each round consists of key-dependent permutation
and a key and data-dependent substitution.
• All operations are XORs and additions on 32-bit words. The only additional operations are four indexed
array data lookup tables for each round.
STEGANOGRAPHIC VIDEO OBJECT AUTHENTICATION
The proposed scheme involves
• Extraction of the host video object from a video and detection of the QSWTs to embed the encrypted signal,
• Embedding of the encrypted signal to the host video object using steganography
• Compression of the final content
Video to frame conversion
• The video is taken from the user as input.
• Usually, the video Consists of multiple frames. The frames are extracted by explicit values specified by the
user.
• After the conversion of video to frames, the user has to input their biometric image i.e. retinal pattern or
finger print.
DATA HIDING
• The goal of this system is send sensitive information that are invisible to human eyes but also robust under
different attacks.
• Qualified Significant Wavelet Trees provide such robustness in the steganography.
• The hiding module hide the encrypted the information into the largest-value QSWTs of energy-efficient
pairs of sub bands
• The image obtained is stego-object image.
• It is compressed and transmitted and receiver after receiving decompress and decryption is done to get
original information and it is accessed as a secret code.
• The Discrete Wavelet Transform is used to hide information like text, audio, video, images etc., into
cover image.
• The steganography technique is implemented in the discrete wavelet transform.
• In this technique the cover image is divided into four equal parts with respect to the resolution of the
image
• The four parts is represented as low, middle and high frequencies that is represented as LL, HL, LH
and HH.
• By applying the DWT once to an area of arbitrary shape, four parts of low, middle, and high frequencies, i.e.,
LL1, HL1, LH1, HH1, are produced.
• Band LL1 (HH1) includes low (high) frequency components both in horizontal and vertical direction, while
the HL1 (LH1), includes high (low) frequencies in horizontal direction and low (high) frequencies in vertical
direction.
• Subband LL1 can be further decomposed in a similar way into four different subbands, denoted as LL2, HL2,
LH2, HH2 respectively.
• The coefficient at the highest level is called the parent and all coefficients corresponding to the same spatial
location at the lower levels of similar orientation are called children..
• Select the pair of subbands that contains the highest energy content (among the three pairs),
• Pi : EPi = max(EP1 ;EP2 ;EP3 )The generalized formula
• x2(i,j)={HL2,LH2,HH2},x1(p,q)={HL1,LH1,HH1}and M,N is the size of the subbands at level two
• After selecting the pair of subbands containing the highest energy content, QSWTs are found for this pair
• If a wavelet coefficient xn(i,j) ∈ D at the is a parent of xn-1(p,q), where D is a subband
• labeled HLn, HLn, HHn, satisfy |xn(i,j)|>T1, |xn- 1(p,q)|>T2 for given thresholds T1 and T2, then xn(i,j)
and its children are called a QSWT
• The encrypted biometric signal is embedded by modifying the values of the detected QSWTs
• After the encrypted biometric image is hidden into the segmented the input image Inverse Discrete
wavelet transform is applied to combine the segmented image and produce a stego -object.
MINIATUIA BASED FINGERPRINT MATCHING
• Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a
match between two human fingerprints
• Fingerprints are one of many forms of biometrics used to identify individuals and verify
their identity
• A fingerprint is the pattern of ridges and valleys on the finger tip.
• A fingerprint is thus defined by the uniqueness of the local ridge characteristics and their
relationships.
• Minutiae points are these local ridge characteristics that occur either at a ridge ending or a ridge
bifurcation.
• A ridge ending is defined as the point where the ridge ends abruptly and the ridge bifurcation is the
point where the ridge splits into two or more branches.
IMPLEMENTATION-3 PHASES
RGISTRATION
•visula cryptography
•share1(user) and share2(reciver)
LOGIN
•input video
•input fingerprint
•stego object
VERIFICATION
•stegoobject
•extract fingerprint and video object
•Fingerprint matching
15.2
0.99 0.99
16.26
61.97
0.52 1 0.002
40.49
0.41 0.936
9.54
PSNR MSE SSM AVG
ANALYSIS
ENCRYPT STEGO DECRYP
The PSNR is measured to ensure whether the encrypted image is intelligible to unauthorized person or not.
 When comparing, PSNR is an approximation to human perception of reconstruction quality. Although a
higher PSNR generally indicates that the reconstruction is of higher quality.
 Thethreshold value for PSNR is 61.971 dB
 Whenever we are hiding image behind cover image though PSNR ratio increased so quality is not
degrading as PSNR value increasing the quality of image is also increasing.
 That is there is not no effect on original image which is hidden twice in a cover image. PSNR value
increasing image quality also increase.
PSNR
SSIM
• The structural similarity index is a method for measuring the similarity between two images.
• Measuring of image quality based on an initial uncompressed or distortion-free image as reference
• SSIM is designed to improve on traditional methods like peak signal-to-noise ratio (PSNR) and mean squared
error (MSE), which have proven to be inconsistent with human eye perception.
MSE
• Mean squared error (MSE) or mean squared deviation (MSD) of an estimator measures the average of the
squares of the errors or deviations
• Ie, the difference between the estimator and what is estimated.
• MSE is a risk function, corresponding to the expected value of the squared error loss or quadratic loss.
• The difference occurs because of randomness
• it is always non-negative, and values closer to zero are better.
FUTURESCOPE
• This proposed system can be further enhanced and made more secure by capturing the retinal image
of a person and performing the above mentioned encryption procedure to encrypt them and send over
a network.
• Also by combining more than one biometric attribute the security can be enhanced
CONCLUSION
• In our daily lives biometrics signal plays a vital role and the development and integration of biometric
authentication techniques used into practical applications increases nowadays.
• In this system , propose a biometrics-based authentication scheme using visual cryptography and
steganography Security .
• If the steganography scheme is alone applied it does not ensure secrecy when it was combined with a
blowfish encryption system and visual cryptographic technique it provides additional security.
• In this method the visual cryptographic share generation at the user registration phase and embedding
biometric signal to the video object at the login phase provide a secure authentication scheme .
REFERENCES
1. A. Shejul and U. L. Kulkarni, “A secure skin tone based steganography using wavelet transform,”
International Journal of Computer Theory and Engineering, vol. 3(1), pp. 16–22, 2011.
2. Bailey, K. “An evaluation of image based steganography methods”, Journal of Multimedia Tools and
Applications, Vol. 30, No. 1, pp. 55-88,IEEE,2006.
3. BANOCI V, BUGAR G, LEVICKY Dusan, 2011, A Novel Method of Image Steganography in DWT
Domain‟ IEEE 2011.
4. Behera, S.K. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and
Engineering Technology, Vol. 1, No. 1, pp. 16-23, IEEE, 2010.
5. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and
Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
6. C.-T. Li and M.-S. Hwang, “An efficient biometrics based remote user authentication scheme using smart
cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, Jan. 2010.
7. Chen, C-H. Ling, and M.-S. Hwang,(2014) “Weaknesses of the yoonkim-yoo remote user authentication
scheme using smart cards,” in Proceedings of the 2014 IEEE Workshop on Electronics, Computer and
Applications. IEEE, pp. 771–774.
8. D. He and D. Wang, “Robust biometrics-based authentication schemefor multi-server environment,” IEEE
Systems Journal, pp. 1–8, 2014.
9. D. He, Q. Sun, and Q. Tian, “A secure and robust object-based video authentication system,” EURASIP
Journal of Applied Signal Processing, vol. 2004, pp. 2185–2200, 2004.
10. D. Kundur, Y. Zhao, and P. Campisi, “A steganographic framework for dual authentication and compression
of high resolution imagery,” in Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 2.
IEEE, 2004, pp. 1–4.
11. Doulamis .N.D, A. D. Doulamis, K. S. Ntalianis, and S. D. Kollias,(2003) “An efficient fully-unsupervised video
object segmentation scheme using an adaptive neural network classifier architecture,” IEEE Transactions on
Neural Networks, vol. 14(3), pp. 616–630.
12. Fard .M, M. R. Akbarzadeh-T, and F. Varasteh-A,(2006) “A new genetic algorithm approach for secure jpeg
steganography,” in Proc. of IEEE Int’l Conference on Engineering of Intelligent Systems.
13. Gopi Krishnan S and Loganathan D,”Color Image Cryptography Scheme Based on Visual Cryptography
“,Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking
Technologies (ICSCCN 2011)
14. Gutub, A. “Pixel Indicator High Capacity Technique for RGB Image Based Steganography”, WoSPA 2008 –
5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E., pp. 154-
159,IEEE,2008.
15. Gutub, A. “Pixel Indicator Technique for RGB Image Steganography”, Journal of Emerging Technologies in
Web Intelligence, Vol. 2, No.1, pp. 193-198,IEEE,2010.
16. Han Yanyan, Cheng Xiaoni, Yao Dong, He Wencai,” VVCS: Verifiable Visual Cryptography Scheme”, 2011
Seventh International Conference on Computational Intelligence and Security
17. Kashyap N, Sinha G.R, 2012,‟Image Watermarking using 3-level Discrete WaveletTransform (DWT)‟
IJMECS.
18. Kaur B, Kaur A, Singh J, 2011,‟Steganographic approach for hiding image in dct domain‟,IJAET, Vol 1, Issue 3.
19. Kelash H.M, Abdel wahab O.F, Elshakankiry ,Etsayed H.S, 2013, „Hiding Data in videoSequences Using
Steganography Algorithms‟ IEEE.2013
20. Klimis Ntalianis and Nicolas Tsapatsoulis (2015), “Remote Authentication Via Biometrics: A Robust Video-
Object Steganographic Mechanism Over Wireless Networks” in IEEE Transactions on Emerging topics on
computing.
21. Kumar S, Latha M, 2014, “DCT Based Secret Image Hiding in video sequence” IJERA,2014
22. Li .S, X. Zheng, X. Mou, and Y. Cai, (2002,) “Chaotic encryption scheme for real-time digital video,” in
Proceedings of Real-Time Imaging VI, vol. 4666. SPIE, pp. 149–160.
23. Majumder J, Mangal S, 2012, „An Overview of image steganography using LSB Technique‟,IJCA.
24. Marwaha, P. “Visual cryptographic steganography in images”, Second International conference on Computing,
Communication and Networking Technologies, pp. 34-39, IEEE, 2010.
25. Moon S.K, Raut R.d, 2013,‟Analysis of Secured Video Steganography Using Computer Forensics Technique for
Enhance Data Security‟, IEEE.
THANK YOU

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed videoeSAT Publishing House
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learningJunaid Bhat
 
An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature LearningAmgad Muhammad
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 

What's hot (19)

Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed video
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learning
 
Steganography
SteganographySteganography
Steganography
 
An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature Learning
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 

Similar to Authentication technique using visual crypto and stegano

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityFatima Azeez
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSSIRJET Journal
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
chapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdfchapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdfssuser6d1fca
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compressionasodariyabhavesh
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 

Similar to Authentication technique using visual crypto and stegano (20)

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
 
A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
chapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdfchapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdf
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Authentication technique using visual crypto and stegano

  • 1. `ADVANCED AUTHENTICATION USING VISUAL CRYPTOGRAPHY AND A STEGANOGRAPHIC Via BIOMETRICS FOR ONLINE EXAMS/INTERVIEWS
  • 2. OBJECTIVE  To develop a two factor authentication mechanism based on visual Cryptographic scheme and video object Steganography via biometrics
  • 3. INTRODUCTION  Authentication is the act of confirming identification of someone, some application…  Normally authentication includes the use of username, password, digital cards, signatures, biometric attributes.  Where biometric attributes are unique to every individual and there by used in variety of application where there need to claim authenticity of individual  In this system authentication is done using biometric attribute ie.,fingerprint
  • 4.  With the rapid transmission of biometric data over internet ,the security of the data is in major concern  To avoid these security threats and sharing issues the secret information like text ,audio ,video, image used for authentications are applied using the techniques visual cryptography and steganography  In this proposed system visual cryptography and steganography are implemented individually for different attributes  Visual cryptography is technique to generate the shares of a secret image and the secret can be achieved by combining both shares  Steganogtaphy is used to hide the secret image within a cover image
  • 5. SCOPE OF THE SYSTEM  In todays century security and authentication are the major concern in all type of application like online exams,interview,banking..etc  Where communicating entities are located at different locations  To ensure the security of the systems and digital data shared , there should be a dual authentication process  The proposed system provides the facility with both visual cryptography and steganography  The programing is developed using MATLAB software and presented in graphical user interphase
  • 8. VERIFIABLE VISUAL CRYPTOGRAPHY • Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. • Visual cryptography scheme eliminates complex computation problem in decryption process, and the secret images can be restored by stacking operation. • This property makes visual cryptography especially useful for the low computation load requirement
  • 9. • In this system we are using (2,2) VCS scheme which generate two shares of image. For input binary image which is in 1 and 0 format. • In the 2-out-of-2 scheme, every secret pixel of the image is converted into two shares and recovered by simply stacking two shares together. • This is equivalent to using the OR operation between the shares. • First we take a monochrome image for the source. Pixels in the image are either white or black • Next sub-divide each pixel into four smaller subpixels. • shade these four subpixels to represent the source image, then subjectively divide them between the two cypher images are to create.
  • 10. • Distribute the shading such that, if you have just one of the cypher images, it is impossible to determine what is on the other cypher image, and thus, impossible to decrypt the image. • If the original pixel in the image is black, fill in all four sub pixels then distribute them. • The pattern selection is random • It does not matter which pair of pixels goes on which layer, when they are combined, all four pixels will be black.
  • 11. • Conversely, if the source image pixel is white, shade in just two pixels, make sure that the same pixels are shaded on both layers. • In this way, when the two cypher images are combined, only two pixels are shaded. • The result of this process is two images which when combined result in an image with half the contrast of the original. • The black of the source remains black in the combined cypher, but the white in the source is changed to a randomly mottled half-tone gray • this is still sufficiently high enough contrast for the secret message to be easily read .
  • 12. BLOWFISH ENCRYPTION • Image encryption is necessary for future multimedia Internet applications. • By encrypting these images, a degree of security can be achieved. • Blowfish is a symmetric block cipher that can be effectively used for encryption and safeguarding of data • It takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data. • Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times • Blowfish contains 16 rounds. Each round consists of XOR operation and a function. Each round consists of key expansion and data encryption.
  • 13. Algorithm: Blowfish Encryption  Divide x into two 32-bit halves: xL, xR  For i = 1to 16:  xL = XL XOR Pi  xR = F(XL) XOR xR  Swap XL and xR  Swap XL and xR (Undo the last swap.)  xR = xR XOR P17  xL = xL XOR P18  Recombine xL and xR
  • 14. Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the feistel network and this algorithm is divided into two parts. • 1. Key-expansion • 2. Data Encryption Key-expansion: • It will converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Blowfish uses large number of subkeys. These keys are generate earlier to any data encryption or decryption. • The p-array consists of 18, 32-bit subkeys: P1,P2,………….,P1 Data Encryption: • It is having a function to iterate 16 times of network. Each round consists of key-dependent permutation and a key and data-dependent substitution. • All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookup tables for each round.
  • 15. STEGANOGRAPHIC VIDEO OBJECT AUTHENTICATION The proposed scheme involves • Extraction of the host video object from a video and detection of the QSWTs to embed the encrypted signal, • Embedding of the encrypted signal to the host video object using steganography • Compression of the final content Video to frame conversion • The video is taken from the user as input. • Usually, the video Consists of multiple frames. The frames are extracted by explicit values specified by the user. • After the conversion of video to frames, the user has to input their biometric image i.e. retinal pattern or finger print.
  • 16. DATA HIDING • The goal of this system is send sensitive information that are invisible to human eyes but also robust under different attacks. • Qualified Significant Wavelet Trees provide such robustness in the steganography. • The hiding module hide the encrypted the information into the largest-value QSWTs of energy-efficient pairs of sub bands • The image obtained is stego-object image. • It is compressed and transmitted and receiver after receiving decompress and decryption is done to get original information and it is accessed as a secret code.
  • 17. • The Discrete Wavelet Transform is used to hide information like text, audio, video, images etc., into cover image. • The steganography technique is implemented in the discrete wavelet transform. • In this technique the cover image is divided into four equal parts with respect to the resolution of the image • The four parts is represented as low, middle and high frequencies that is represented as LL, HL, LH and HH.
  • 18. • By applying the DWT once to an area of arbitrary shape, four parts of low, middle, and high frequencies, i.e., LL1, HL1, LH1, HH1, are produced. • Band LL1 (HH1) includes low (high) frequency components both in horizontal and vertical direction, while the HL1 (LH1), includes high (low) frequencies in horizontal direction and low (high) frequencies in vertical direction. • Subband LL1 can be further decomposed in a similar way into four different subbands, denoted as LL2, HL2, LH2, HH2 respectively. • The coefficient at the highest level is called the parent and all coefficients corresponding to the same spatial location at the lower levels of similar orientation are called children..
  • 19. • Select the pair of subbands that contains the highest energy content (among the three pairs), • Pi : EPi = max(EP1 ;EP2 ;EP3 )The generalized formula • x2(i,j)={HL2,LH2,HH2},x1(p,q)={HL1,LH1,HH1}and M,N is the size of the subbands at level two • After selecting the pair of subbands containing the highest energy content, QSWTs are found for this pair • If a wavelet coefficient xn(i,j) ∈ D at the is a parent of xn-1(p,q), where D is a subband • labeled HLn, HLn, HHn, satisfy |xn(i,j)|>T1, |xn- 1(p,q)|>T2 for given thresholds T1 and T2, then xn(i,j) and its children are called a QSWT • The encrypted biometric signal is embedded by modifying the values of the detected QSWTs • After the encrypted biometric image is hidden into the segmented the input image Inverse Discrete wavelet transform is applied to combine the segmented image and produce a stego -object.
  • 20. MINIATUIA BASED FINGERPRINT MATCHING • Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints • Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity • A fingerprint is the pattern of ridges and valleys on the finger tip. • A fingerprint is thus defined by the uniqueness of the local ridge characteristics and their relationships. • Minutiae points are these local ridge characteristics that occur either at a ridge ending or a ridge bifurcation. • A ridge ending is defined as the point where the ridge ends abruptly and the ridge bifurcation is the point where the ridge splits into two or more branches.
  • 21. IMPLEMENTATION-3 PHASES RGISTRATION •visula cryptography •share1(user) and share2(reciver) LOGIN •input video •input fingerprint •stego object VERIFICATION •stegoobject •extract fingerprint and video object •Fingerprint matching
  • 22. 15.2 0.99 0.99 16.26 61.97 0.52 1 0.002 40.49 0.41 0.936 9.54 PSNR MSE SSM AVG ANALYSIS ENCRYPT STEGO DECRYP
  • 23. The PSNR is measured to ensure whether the encrypted image is intelligible to unauthorized person or not.  When comparing, PSNR is an approximation to human perception of reconstruction quality. Although a higher PSNR generally indicates that the reconstruction is of higher quality.  Thethreshold value for PSNR is 61.971 dB  Whenever we are hiding image behind cover image though PSNR ratio increased so quality is not degrading as PSNR value increasing the quality of image is also increasing.  That is there is not no effect on original image which is hidden twice in a cover image. PSNR value increasing image quality also increase. PSNR
  • 24. SSIM • The structural similarity index is a method for measuring the similarity between two images. • Measuring of image quality based on an initial uncompressed or distortion-free image as reference • SSIM is designed to improve on traditional methods like peak signal-to-noise ratio (PSNR) and mean squared error (MSE), which have proven to be inconsistent with human eye perception. MSE • Mean squared error (MSE) or mean squared deviation (MSD) of an estimator measures the average of the squares of the errors or deviations • Ie, the difference between the estimator and what is estimated. • MSE is a risk function, corresponding to the expected value of the squared error loss or quadratic loss. • The difference occurs because of randomness • it is always non-negative, and values closer to zero are better.
  • 25. FUTURESCOPE • This proposed system can be further enhanced and made more secure by capturing the retinal image of a person and performing the above mentioned encryption procedure to encrypt them and send over a network. • Also by combining more than one biometric attribute the security can be enhanced
  • 26. CONCLUSION • In our daily lives biometrics signal plays a vital role and the development and integration of biometric authentication techniques used into practical applications increases nowadays. • In this system , propose a biometrics-based authentication scheme using visual cryptography and steganography Security . • If the steganography scheme is alone applied it does not ensure secrecy when it was combined with a blowfish encryption system and visual cryptographic technique it provides additional security. • In this method the visual cryptographic share generation at the user registration phase and embedding biometric signal to the video object at the login phase provide a secure authentication scheme .
  • 27. REFERENCES 1. A. Shejul and U. L. Kulkarni, “A secure skin tone based steganography using wavelet transform,” International Journal of Computer Theory and Engineering, vol. 3(1), pp. 16–22, 2011. 2. Bailey, K. “An evaluation of image based steganography methods”, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, pp. 55-88,IEEE,2006. 3. BANOCI V, BUGAR G, LEVICKY Dusan, 2011, A Novel Method of Image Steganography in DWT Domain‟ IEEE 2011. 4. Behera, S.K. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and Engineering Technology, Vol. 1, No. 1, pp. 16-23, IEEE, 2010. 5. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. 6. C.-T. Li and M.-S. Hwang, “An efficient biometrics based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, Jan. 2010. 7. Chen, C-H. Ling, and M.-S. Hwang,(2014) “Weaknesses of the yoonkim-yoo remote user authentication scheme using smart cards,” in Proceedings of the 2014 IEEE Workshop on Electronics, Computer and Applications. IEEE, pp. 771–774. 8. D. He and D. Wang, “Robust biometrics-based authentication schemefor multi-server environment,” IEEE Systems Journal, pp. 1–8, 2014.
  • 28. 9. D. He, Q. Sun, and Q. Tian, “A secure and robust object-based video authentication system,” EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 2185–2200, 2004. 10. D. Kundur, Y. Zhao, and P. Campisi, “A steganographic framework for dual authentication and compression of high resolution imagery,” in Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 2. IEEE, 2004, pp. 1–4. 11. Doulamis .N.D, A. D. Doulamis, K. S. Ntalianis, and S. D. Kollias,(2003) “An efficient fully-unsupervised video object segmentation scheme using an adaptive neural network classifier architecture,” IEEE Transactions on Neural Networks, vol. 14(3), pp. 616–630. 12. Fard .M, M. R. Akbarzadeh-T, and F. Varasteh-A,(2006) “A new genetic algorithm approach for secure jpeg steganography,” in Proc. of IEEE Int’l Conference on Engineering of Intelligent Systems. 13. Gopi Krishnan S and Loganathan D,”Color Image Cryptography Scheme Based on Visual Cryptography “,Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011) 14. Gutub, A. “Pixel Indicator High Capacity Technique for RGB Image Based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E., pp. 154- 159,IEEE,2008. 15. Gutub, A. “Pixel Indicator Technique for RGB Image Steganography”, Journal of Emerging Technologies in Web Intelligence, Vol. 2, No.1, pp. 193-198,IEEE,2010. 16. Han Yanyan, Cheng Xiaoni, Yao Dong, He Wencai,” VVCS: Verifiable Visual Cryptography Scheme”, 2011 Seventh International Conference on Computational Intelligence and Security
  • 29. 17. Kashyap N, Sinha G.R, 2012,‟Image Watermarking using 3-level Discrete WaveletTransform (DWT)‟ IJMECS. 18. Kaur B, Kaur A, Singh J, 2011,‟Steganographic approach for hiding image in dct domain‟,IJAET, Vol 1, Issue 3. 19. Kelash H.M, Abdel wahab O.F, Elshakankiry ,Etsayed H.S, 2013, „Hiding Data in videoSequences Using Steganography Algorithms‟ IEEE.2013 20. Klimis Ntalianis and Nicolas Tsapatsoulis (2015), “Remote Authentication Via Biometrics: A Robust Video- Object Steganographic Mechanism Over Wireless Networks” in IEEE Transactions on Emerging topics on computing. 21. Kumar S, Latha M, 2014, “DCT Based Secret Image Hiding in video sequence” IJERA,2014 22. Li .S, X. Zheng, X. Mou, and Y. Cai, (2002,) “Chaotic encryption scheme for real-time digital video,” in Proceedings of Real-Time Imaging VI, vol. 4666. SPIE, pp. 149–160. 23. Majumder J, Mangal S, 2012, „An Overview of image steganography using LSB Technique‟,IJCA. 24. Marwaha, P. “Visual cryptographic steganography in images”, Second International conference on Computing, Communication and Networking Technologies, pp. 34-39, IEEE, 2010. 25. Moon S.K, Raut R.d, 2013,‟Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security‟, IEEE.