SlideShare a Scribd company logo
1 of 3
Download to read offline
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011



            A Secured Approach to Visual Cryptographic
                       Biometric Template
                                                     Rahna. P. Muhammed
                                                M.Tech Student, Dept of CSE
                                      Viswajyothi College of Engineering and Technology
                                                 Vazhakkulam, Muvattupuzha
                                                   rahnap2000@gmail.com

Abstract— BIOMETRIC authentication systems are gaining                   but the intended recipient can decrypt and read the message.
wide-spread popularity in recent years due to the advances in            Naor and Shamir [6] introduced the visual cryptography
sensor technologies as well as improvements in the matching
                                                                         scheme (VCS) as a simple and secure way to allow the secret
algorithms. Most biometric systems assume that the template
                                                                         sharing of images without any cryptographic computations.
in the system is secure due to human supervision (e.g.,
immigration checks and criminal database search) or physical             This scheme is referred to as the k-out-of-n VCS which is
protection (e.g., laptop locks and door locks). Preserving the           denoted as (k,n)VCS. Given an original binary image, it is
privacy of digital biometric data (e.g., face images) stored in a        encrypted in n images, such that
central database has become of paramount importance. VCS
is a cryptographic technique that allows for the encryption of             T = Sh1  S h2  S h3  …………… S hn                     (1)
visual information such that decryption can be performed
                                                                         where Å is a Boolean operation, Shi, hi Î 1,2,….k is an image
using the human visual system. This work improves the
security of visual cryptography by scrambling the image using            which appears as white noise, k d” n, and n is the number of
random permutation.                                                      noisy images. It is difficult to decipher the secret image T
                                                                         using individuals Shi‘s [6]. The encryption is undertaken in
Index Terms— Visual cryptography, Image scrambling, Random               such a way that k or more out of the n generated images are
permutation                                                              necessary for reconstructing the original image T . In the
                                                                         case of (2, 2) VCS, each pixel P in the original image is
                                                                         encrypted into two sub pixels called shares. For biometric
                        I. INTRODUCTION
                                                                         privacy, here 2-out-of-2 scheme is using.
    BIOMETRICS is the science of establishing the identity                                            TABLE I
of an individual based on physical or behavioral traits such                        ENCODING A BINARY PIXEL P INTO 2 SHARES   A AND B
as face, fingerprints, iris, etc. The working of biometric
authentication system is by acquiring raw biometric data
from a subject, extracting a feature set from the data, and
comparing the feature set against the templates stored in a
database in order to identify the subject or to verify a claimed
identity. The biometric template is generated during
enrollment and is stored in the database. For protecting the
privacy of an individual enrolled in a biometric database,
Davida et al. [1] and Ratha et al. [2] proposed storing a
transformed biometric template instead of the original
biometric template in the database. Apart from these methods,
various image hiding approaches [3]–[5] have been suggested
by researchers to provide anonymity to the stored biometric
                                                                         In this scheme for sharing a single pixel p, in a binary image Z
data. In this paper to enhance the security of the template, a
                                                                         into two shares A and B is illustrated in Table I. If p is white,
system is proposed by applying scrambling to the image and
                                                                         one of the first two rows of Table 1 is chosen randomly to
apply the visual cryptography. This paper is organized as
                                                                         encode A and B. If p is black, one of the last two rows in Table
follow: visual cryptographic scheme is discussed in section
                                                                         1 is chosen randomly to encode A and B. Thus, neither A nor
2, details of random permutation is discussed in section 3,
                                                                         B exposes any clue about the binary color of p. When these
section 4 presents the proposed system.
                                                                         two shares are superimposed together, two black sub-pixels
                                                                         appear if p is black, while one black sub-pixel and one white
                  II. VISUAL CRYPTOGRAPHY
                                                                         sub-pixel appear if p is white as indicated in the rightmost
    Cryptography is the art of sending and receiving                     column in Table 1. Based upon the contrast between two
encrypted messages that can be decrypted only by the sender              kinds of reconstructed pixels can tell whether p is black or
or the receiver. Encryption and decryption are accomplished              white.
by using mathematical algorithms in such a way that no one
                                                                    15
© 2011 ACEEE
DOI: 01.IJNS.02.03.161
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

      III. SCRAMBLING THROUGH RANDOM PERMUTATION                          A.        Enrollment module :
    A random permutation is a permutation containing a fixed                  During the enrollment process, administrator collects the
number n of a random selection from a given set of elements.              template and performs image scrambling. Image scrambling
The plain image can be decomposed into blocks; each one                   is used to make images visually unrecognizable such that
contains a specific number of pixels (4 pixels × 4 pixels blocks).        unauthorized users have difficulty decoding the scrambled
Increasing the number of blocks by using smaller block sizes              image to access the original image. Image scrambling is done
resulted in a lower correlation and higher entropy. The blocks            by applying the above permutation algorithm. Using the key
are transformed into new locations. The permutation process               value some permuted sequence will be generated and apply
refers to the operation of dividing and replacing an                      the sequence to the image. The original image can be
arrangement of the original image, and thus the generated                 decomposed into blocks; each one containing a specific
one can be viewed as an arrangement of blocks [7],[8]. The                number of pixels. The blocks are transformed into new
block diagram of permutation scheme is shown in Fig 1.                    locations by the above permuted sequence, which produces
                                                                          the scrambled image. The scrambled image is then sent to a
A.       Algorithm PERFORM_PERMUTATION                                    trusted third-party entity. Once the trusted entity receives it,
    Input: plain image (BMP image file) and permutation table             the scrambled image is decomposed into two noisy images
Output: permuted image.                                                   (i.e., sheets) and the original data is discarded. The
1.       Load the plain Image                                             decomposed components are then transmitted and stored in
2.       Input secret key                                                 two different database servers such that the identity of the
3.       Get the Width and Height of the image                            private data is not revealed to either server.
4.
                                                                          B.       Authentication module :
4.1. Lower Horizontal Number of Blocks = Integer (Image
Width / 4)                                                                    During the authentication process, the trusted entity
4.2. Lower Vertical Number of Blocks = Integer (Image Height              sends a request to each server and the corresponding sheets
/4)                                                                       are transmitted to it. Sheets are overlaid (i.e., superimposed)
5.       Number of Blocks = Horizontal Number of Blocks ×                 in order to reconstruct the scrambled image. An inverse
Vertical Number of Blocks                                                 permutation sequence is obtained by using the same key,
6.       Seed = | Hash value (Key) |                                      and applies this sequence to the scrambled image in-order to
7.       Randomize ()                                                     reconstruct the original image.
8.       For I = 0 to Number of Blocks -1
8.1      Get the new location of block I from the permutation
table
8.2      Set block I in its new location
9.       End perform_permutation

                     IV. PROPOSED SYSTEM
    Protecting template in the database securely is one of the
challenges in any biometric system. Here visual cryptography
is applied to biometric authentication system [9]. In this
system, there are two modules: Enrollment module and
Authentication module.




          Fig. 1. Block diagram of permutation scheme.                         Fig 2. Proposed approach for de-identifying and storing a finger
                                                                                                        print image
                                                                     16
© 2011 ACEEE
DOI: 01.IJNS.02.03.161
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

 The use of basic visual cryptography for securing fingerprint                [3]. Jain and U. Uludag, “Hiding biometric data,” IEEE Trans.
iris and face templates was suggested in [10] , [11] and [12]                 Pattern Anal. Mach. Intell., vol. 25, no. 11, pp. 1494–1498, Nov.
respectively. By using the proposed method, as shown in                       2003.
Fig. 2, the biometric template is scrambled and decomposed                    [4]. J. Dong and T. Tan, “Effects of watermarking on iris recognition
                                                                              performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics
by the visual cryptography scheme and two noise-like images
                                                                              and Vision, 2008 (ICARCV 2008), 2008, pp. 1156–1161.
known as sheets are produced. For faces each private face                     [5]. N. Agrawal and M. Savvides, “Biometric data hiding: A 3 factor
image is scrambled and decomposed into two independent                        authentication approach to verify identity with a single image using
public host images. The public images hosting the private                     steganography, encryption and matching,” in Proc. Computer Vision
face images are referred to as sheets.                                        and Pattern Recognition Workshop, 2009, vol. 0, pp. 85–92.
                                                                              [6]. M.Naor and A. Shamir, “Visual cryptography,” in Proc.
                          V. CONCLUSIONS                                      EUROCRYPT, 1994, pp. 1–12.
                                                                              [7]. Mitra, Y V. Subba Rao, and S. R. M. Prasnna, “A new image
    This paper explored the security of visual cryptography                   encryption approach using combinational permutation techniques,”
by scrambling the image using random permutation. Here,                       Journal of computer Science, vol.1, no. 1, 2006, p.127, http://
the templates are scrambled and decomposed into two noise-                    www.enformatika.org.
like images using (2,2) VCS, and since the spatial arrangement                [8]. Mohammad Ali Bani Younes and Aman Jantan “An Image
of the pixels in these images varies from block to block, it is               Encryption Approach Using a Combination of Permutation
impossible to recover the scrambled image without accessing                   Technique Followed by Encryption” IJCSNS International Journal
                                                                              of Computer Science and Network Security, VOL.8 No.4, April
both the shares and an XOR operator is used to superimpose
                                                                              2008
the two noisy images to get the scrambled image. Hence this                   [9]. A.Ross and A.A.Othman,”Visual cryptography for biometric
paper contributes a more secured approach to biometric data                   privacy”,IEEE transactions on information forensics and
privacy.                                                                      security,Vol.6,No.1,March 2011.
                                                                              [10]. Y. Rao, Y. Sukonkina, C. Bhagwati, and U. Singh, “Fingerprint
                          REFERENCES                                          based authentication application using visual cryptography methods
                                                                              (improved id card),” in Proc. IEEE Region 10 Conf., Nov. 2008,
[1]. G. I. Davida, Y. Frankel, and B. J. Matt, “On enabling secure            pp.1–5.
applications through off-line biometric identification,” in Proc. IEEE        [11]. P.Revenker, A. Anjum, and W. Gandhare, “Secure iris
Symp. Security and Privacy, 1998, pp. 148–157.                                authentication using visual cryptography,” Int. J. Comput. Sci.
[2]. N. Ratha, J. Connell, and R. Bolle, “Enhancing security and              (IJCSIS), vol. 7, no. 3, pp. 217–221, Mar. 2010.
privacy in biometrics-based authentication systems,” IBM Syst. J.,            [12]. A. Ross and A. A. Othman, “Visual cryptography for face
vol. 40, no. 3, pp. 614–634, 2001.                                            privacy,” in Proc. SPIE Biometric Technology for Human
                                                                              Identification VII, Orlando,FL, 2010, vol. 7667.




                                                                         17
© 2011 ACEEE
DOI: 01.IJNS.02.03.161

More Related Content

What's hot

Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual CryptographyAneeshGKumar
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYcscpconf
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...IDES Editor
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 

What's hot (17)

Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
akashreport
akashreportakashreport
akashreport
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Vc pred
Vc predVc pred
Vc pred
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 

Similar to A Secured Approach to Visual Cryptographic Biometric Template

MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
Reversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansionReversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansionnooriasukmaningtyas
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Reviewiosrjce
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107IJRAT
 

Similar to A Secured Approach to Visual Cryptographic Biometric Template (20)

MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 
J017335863
J017335863J017335863
J017335863
 
Aj03102230224
Aj03102230224Aj03102230224
Aj03102230224
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Reversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansionReversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansion
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
N017327985
N017327985N017327985
N017327985
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

A Secured Approach to Visual Cryptographic Biometric Template

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 A Secured Approach to Visual Cryptographic Biometric Template Rahna. P. Muhammed M.Tech Student, Dept of CSE Viswajyothi College of Engineering and Technology Vazhakkulam, Muvattupuzha rahnap2000@gmail.com Abstract— BIOMETRIC authentication systems are gaining but the intended recipient can decrypt and read the message. wide-spread popularity in recent years due to the advances in Naor and Shamir [6] introduced the visual cryptography sensor technologies as well as improvements in the matching scheme (VCS) as a simple and secure way to allow the secret algorithms. Most biometric systems assume that the template sharing of images without any cryptographic computations. in the system is secure due to human supervision (e.g., immigration checks and criminal database search) or physical This scheme is referred to as the k-out-of-n VCS which is protection (e.g., laptop locks and door locks). Preserving the denoted as (k,n)VCS. Given an original binary image, it is privacy of digital biometric data (e.g., face images) stored in a encrypted in n images, such that central database has become of paramount importance. VCS is a cryptographic technique that allows for the encryption of T = Sh1  S h2  S h3  …………… S hn (1) visual information such that decryption can be performed where Å is a Boolean operation, Shi, hi Î 1,2,….k is an image using the human visual system. This work improves the security of visual cryptography by scrambling the image using which appears as white noise, k d” n, and n is the number of random permutation. noisy images. It is difficult to decipher the secret image T using individuals Shi‘s [6]. The encryption is undertaken in Index Terms— Visual cryptography, Image scrambling, Random such a way that k or more out of the n generated images are permutation necessary for reconstructing the original image T . In the case of (2, 2) VCS, each pixel P in the original image is encrypted into two sub pixels called shares. For biometric I. INTRODUCTION privacy, here 2-out-of-2 scheme is using. BIOMETRICS is the science of establishing the identity TABLE I of an individual based on physical or behavioral traits such ENCODING A BINARY PIXEL P INTO 2 SHARES A AND B as face, fingerprints, iris, etc. The working of biometric authentication system is by acquiring raw biometric data from a subject, extracting a feature set from the data, and comparing the feature set against the templates stored in a database in order to identify the subject or to verify a claimed identity. The biometric template is generated during enrollment and is stored in the database. For protecting the privacy of an individual enrolled in a biometric database, Davida et al. [1] and Ratha et al. [2] proposed storing a transformed biometric template instead of the original biometric template in the database. Apart from these methods, various image hiding approaches [3]–[5] have been suggested by researchers to provide anonymity to the stored biometric In this scheme for sharing a single pixel p, in a binary image Z data. In this paper to enhance the security of the template, a into two shares A and B is illustrated in Table I. If p is white, system is proposed by applying scrambling to the image and one of the first two rows of Table 1 is chosen randomly to apply the visual cryptography. This paper is organized as encode A and B. If p is black, one of the last two rows in Table follow: visual cryptographic scheme is discussed in section 1 is chosen randomly to encode A and B. Thus, neither A nor 2, details of random permutation is discussed in section 3, B exposes any clue about the binary color of p. When these section 4 presents the proposed system. two shares are superimposed together, two black sub-pixels appear if p is black, while one black sub-pixel and one white II. VISUAL CRYPTOGRAPHY sub-pixel appear if p is white as indicated in the rightmost Cryptography is the art of sending and receiving column in Table 1. Based upon the contrast between two encrypted messages that can be decrypted only by the sender kinds of reconstructed pixels can tell whether p is black or or the receiver. Encryption and decryption are accomplished white. by using mathematical algorithms in such a way that no one 15 © 2011 ACEEE DOI: 01.IJNS.02.03.161
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 III. SCRAMBLING THROUGH RANDOM PERMUTATION A. Enrollment module : A random permutation is a permutation containing a fixed During the enrollment process, administrator collects the number n of a random selection from a given set of elements. template and performs image scrambling. Image scrambling The plain image can be decomposed into blocks; each one is used to make images visually unrecognizable such that contains a specific number of pixels (4 pixels × 4 pixels blocks). unauthorized users have difficulty decoding the scrambled Increasing the number of blocks by using smaller block sizes image to access the original image. Image scrambling is done resulted in a lower correlation and higher entropy. The blocks by applying the above permutation algorithm. Using the key are transformed into new locations. The permutation process value some permuted sequence will be generated and apply refers to the operation of dividing and replacing an the sequence to the image. The original image can be arrangement of the original image, and thus the generated decomposed into blocks; each one containing a specific one can be viewed as an arrangement of blocks [7],[8]. The number of pixels. The blocks are transformed into new block diagram of permutation scheme is shown in Fig 1. locations by the above permuted sequence, which produces the scrambled image. The scrambled image is then sent to a A. Algorithm PERFORM_PERMUTATION trusted third-party entity. Once the trusted entity receives it, Input: plain image (BMP image file) and permutation table the scrambled image is decomposed into two noisy images Output: permuted image. (i.e., sheets) and the original data is discarded. The 1. Load the plain Image decomposed components are then transmitted and stored in 2. Input secret key two different database servers such that the identity of the 3. Get the Width and Height of the image private data is not revealed to either server. 4. B. Authentication module : 4.1. Lower Horizontal Number of Blocks = Integer (Image Width / 4) During the authentication process, the trusted entity 4.2. Lower Vertical Number of Blocks = Integer (Image Height sends a request to each server and the corresponding sheets /4) are transmitted to it. Sheets are overlaid (i.e., superimposed) 5. Number of Blocks = Horizontal Number of Blocks × in order to reconstruct the scrambled image. An inverse Vertical Number of Blocks permutation sequence is obtained by using the same key, 6. Seed = | Hash value (Key) | and applies this sequence to the scrambled image in-order to 7. Randomize () reconstruct the original image. 8. For I = 0 to Number of Blocks -1 8.1 Get the new location of block I from the permutation table 8.2 Set block I in its new location 9. End perform_permutation IV. PROPOSED SYSTEM Protecting template in the database securely is one of the challenges in any biometric system. Here visual cryptography is applied to biometric authentication system [9]. In this system, there are two modules: Enrollment module and Authentication module. Fig. 1. Block diagram of permutation scheme. Fig 2. Proposed approach for de-identifying and storing a finger print image 16 © 2011 ACEEE DOI: 01.IJNS.02.03.161
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 The use of basic visual cryptography for securing fingerprint [3]. Jain and U. Uludag, “Hiding biometric data,” IEEE Trans. iris and face templates was suggested in [10] , [11] and [12] Pattern Anal. Mach. Intell., vol. 25, no. 11, pp. 1494–1498, Nov. respectively. By using the proposed method, as shown in 2003. Fig. 2, the biometric template is scrambled and decomposed [4]. J. Dong and T. Tan, “Effects of watermarking on iris recognition performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics by the visual cryptography scheme and two noise-like images and Vision, 2008 (ICARCV 2008), 2008, pp. 1156–1161. known as sheets are produced. For faces each private face [5]. N. Agrawal and M. Savvides, “Biometric data hiding: A 3 factor image is scrambled and decomposed into two independent authentication approach to verify identity with a single image using public host images. The public images hosting the private steganography, encryption and matching,” in Proc. Computer Vision face images are referred to as sheets. and Pattern Recognition Workshop, 2009, vol. 0, pp. 85–92. [6]. M.Naor and A. Shamir, “Visual cryptography,” in Proc. V. CONCLUSIONS EUROCRYPT, 1994, pp. 1–12. [7]. Mitra, Y V. Subba Rao, and S. R. M. Prasnna, “A new image This paper explored the security of visual cryptography encryption approach using combinational permutation techniques,” by scrambling the image using random permutation. Here, Journal of computer Science, vol.1, no. 1, 2006, p.127, http:// the templates are scrambled and decomposed into two noise- www.enformatika.org. like images using (2,2) VCS, and since the spatial arrangement [8]. Mohammad Ali Bani Younes and Aman Jantan “An Image of the pixels in these images varies from block to block, it is Encryption Approach Using a Combination of Permutation impossible to recover the scrambled image without accessing Technique Followed by Encryption” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April both the shares and an XOR operator is used to superimpose 2008 the two noisy images to get the scrambled image. Hence this [9]. A.Ross and A.A.Othman,”Visual cryptography for biometric paper contributes a more secured approach to biometric data privacy”,IEEE transactions on information forensics and privacy. security,Vol.6,No.1,March 2011. [10]. Y. Rao, Y. Sukonkina, C. Bhagwati, and U. Singh, “Fingerprint REFERENCES based authentication application using visual cryptography methods (improved id card),” in Proc. IEEE Region 10 Conf., Nov. 2008, [1]. G. I. Davida, Y. Frankel, and B. J. Matt, “On enabling secure pp.1–5. applications through off-line biometric identification,” in Proc. IEEE [11]. P.Revenker, A. Anjum, and W. Gandhare, “Secure iris Symp. Security and Privacy, 1998, pp. 148–157. authentication using visual cryptography,” Int. J. Comput. Sci. [2]. N. Ratha, J. Connell, and R. Bolle, “Enhancing security and (IJCSIS), vol. 7, no. 3, pp. 217–221, Mar. 2010. privacy in biometrics-based authentication systems,” IBM Syst. J., [12]. A. Ross and A. A. Othman, “Visual cryptography for face vol. 40, no. 3, pp. 614–634, 2001. privacy,” in Proc. SPIE Biometric Technology for Human Identification VII, Orlando,FL, 2010, vol. 7667. 17 © 2011 ACEEE DOI: 01.IJNS.02.03.161