SlideShare a Scribd company logo
`ADVANCED AUTHENTICATION USING VISUAL
CRYPTOGRAPHY AND A STEGANOGRAPHIC Via
BIOMETRICS FOR ONLINE EXAMS/INTERVIEWS
OBJECTIVE
 To develop a two factor authentication mechanism based on visual
Cryptographic scheme and video object Steganography via biometrics
INTRODUCTION
 Authentication is the act of confirming identification of someone, some application…
 Normally authentication includes the use of username, password, digital cards, signatures,
biometric attributes.
 Where biometric attributes are unique to every individual and there by used in variety of
application where there need to claim authenticity of individual
 In this system authentication is done using biometric attribute ie.,fingerprint
 With the rapid transmission of biometric data over internet ,the security of the data is in major concern
 To avoid these security threats and sharing issues the secret information like text ,audio ,video, image
used for authentications are applied using the techniques visual cryptography and steganography
 In this proposed system visual cryptography and steganography are implemented individually for
different attributes
 Visual cryptography is technique to generate the shares of a secret image and the secret can be achieved
by combining both shares
 Steganogtaphy is used to hide the secret image within a cover image
SCOPE OF THE SYSTEM
 In todays century security and authentication are the major concern in all type of application
like online exams,interview,banking..etc
 Where communicating entities are located at different locations
 To ensure the security of the systems and digital data shared , there should be a dual
authentication process
 The proposed system provides the facility with both visual cryptography and steganography
 The programing is developed using MATLAB software and presented in graphical user
interphase
SYSTEM OVERVIEW
SYSTEM OVERVIEW
VERIFIABLE VISUAL CRYPTOGRAPHY
• Visual cryptography is a cryptographic technique which allows visual information to be encrypted in
such a way that the decryption can be performed by the human visual system, without the aid of
computers.
• Visual cryptography scheme eliminates complex computation problem in decryption process, and the
secret images can be restored by stacking operation.
• This property makes visual cryptography especially useful for the low computation load requirement
• In this system we are using (2,2) VCS scheme which generate two shares of image. For input binary
image which is in 1 and 0 format.
• In the 2-out-of-2 scheme, every secret pixel of the image is converted into two shares and recovered by
simply stacking two shares together.
• This is equivalent to using the OR operation between the shares.
• First we take a monochrome image for the source. Pixels in the image are either white or black
• Next sub-divide each pixel into four smaller subpixels.
• shade these four subpixels to represent the source image, then subjectively divide them between the two
cypher images are to create.
• Distribute the shading such that, if you have just one of the cypher images, it is impossible to determine
what is on the other cypher image, and thus, impossible to decrypt the image.
• If the original pixel in the image is black, fill in all four sub pixels then distribute them.
• The pattern selection is random
• It does not matter which pair of pixels goes on which layer, when they are combined, all four pixels will
be black.
• Conversely, if the source image pixel is white, shade in just two pixels, make sure that
the same pixels are shaded on both layers.
• In this way, when the two cypher images are combined, only two pixels are shaded.
• The result of this process is two images which when combined result in an image with half the
contrast of the original.
• The black of the source remains black in the combined cypher, but the white in the source is changed
to a randomly mottled half-tone gray
• this is still sufficiently high enough contrast for the secret message to be easily read
.
BLOWFISH ENCRYPTION
• Image encryption is necessary for future multimedia Internet applications.
• By encrypting these images, a degree of security can be achieved.
• Blowfish is a symmetric block cipher that can be effectively used for encryption and safeguarding of
data
• It takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data.
• Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times
• Blowfish contains 16 rounds. Each round consists of XOR operation and a function. Each round
consists of key expansion and data encryption.
Algorithm: Blowfish Encryption
 Divide x into two 32-bit halves: xL, xR
 For i = 1to 16:
 xL = XL XOR Pi
 xR = F(XL) XOR xR
 Swap XL and xR
 Swap XL and xR (Undo the last swap.)
 xR = xR XOR P17
 xL = xL XOR P18
 Recombine xL and xR
Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the
feistel network and this algorithm is divided into two parts.
• 1. Key-expansion
• 2. Data Encryption
Key-expansion:
• It will converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Blowfish uses
large number of subkeys. These keys are generate earlier to any data encryption or decryption.
• The p-array consists of 18, 32-bit subkeys: P1,P2,………….,P1
Data Encryption:
• It is having a function to iterate 16 times of network. Each round consists of key-dependent permutation
and a key and data-dependent substitution.
• All operations are XORs and additions on 32-bit words. The only additional operations are four indexed
array data lookup tables for each round.
STEGANOGRAPHIC VIDEO OBJECT AUTHENTICATION
The proposed scheme involves
• Extraction of the host video object from a video and detection of the QSWTs to embed the encrypted signal,
• Embedding of the encrypted signal to the host video object using steganography
• Compression of the final content
Video to frame conversion
• The video is taken from the user as input.
• Usually, the video Consists of multiple frames. The frames are extracted by explicit values specified by the
user.
• After the conversion of video to frames, the user has to input their biometric image i.e. retinal pattern or
finger print.
DATA HIDING
• The goal of this system is send sensitive information that are invisible to human eyes but also robust under
different attacks.
• Qualified Significant Wavelet Trees provide such robustness in the steganography.
• The hiding module hide the encrypted the information into the largest-value QSWTs of energy-efficient
pairs of sub bands
• The image obtained is stego-object image.
• It is compressed and transmitted and receiver after receiving decompress and decryption is done to get
original information and it is accessed as a secret code.
• The Discrete Wavelet Transform is used to hide information like text, audio, video, images etc., into
cover image.
• The steganography technique is implemented in the discrete wavelet transform.
• In this technique the cover image is divided into four equal parts with respect to the resolution of the
image
• The four parts is represented as low, middle and high frequencies that is represented as LL, HL, LH
and HH.
• By applying the DWT once to an area of arbitrary shape, four parts of low, middle, and high frequencies, i.e.,
LL1, HL1, LH1, HH1, are produced.
• Band LL1 (HH1) includes low (high) frequency components both in horizontal and vertical direction, while
the HL1 (LH1), includes high (low) frequencies in horizontal direction and low (high) frequencies in vertical
direction.
• Subband LL1 can be further decomposed in a similar way into four different subbands, denoted as LL2, HL2,
LH2, HH2 respectively.
• The coefficient at the highest level is called the parent and all coefficients corresponding to the same spatial
location at the lower levels of similar orientation are called children..
• Select the pair of subbands that contains the highest energy content (among the three pairs),
• Pi : EPi = max(EP1 ;EP2 ;EP3 )The generalized formula
• x2(i,j)={HL2,LH2,HH2},x1(p,q)={HL1,LH1,HH1}and M,N is the size of the subbands at level two
• After selecting the pair of subbands containing the highest energy content, QSWTs are found for this pair
• If a wavelet coefficient xn(i,j) ∈ D at the is a parent of xn-1(p,q), where D is a subband
• labeled HLn, HLn, HHn, satisfy |xn(i,j)|>T1, |xn- 1(p,q)|>T2 for given thresholds T1 and T2, then xn(i,j)
and its children are called a QSWT
• The encrypted biometric signal is embedded by modifying the values of the detected QSWTs
• After the encrypted biometric image is hidden into the segmented the input image Inverse Discrete
wavelet transform is applied to combine the segmented image and produce a stego -object.
MINIATUIA BASED FINGERPRINT MATCHING
• Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a
match between two human fingerprints
• Fingerprints are one of many forms of biometrics used to identify individuals and verify
their identity
• A fingerprint is the pattern of ridges and valleys on the finger tip.
• A fingerprint is thus defined by the uniqueness of the local ridge characteristics and their
relationships.
• Minutiae points are these local ridge characteristics that occur either at a ridge ending or a ridge
bifurcation.
• A ridge ending is defined as the point where the ridge ends abruptly and the ridge bifurcation is the
point where the ridge splits into two or more branches.
IMPLEMENTATION-3 PHASES
RGISTRATION
•visula cryptography
•share1(user) and share2(reciver)
LOGIN
•input video
•input fingerprint
•stego object
VERIFICATION
•stegoobject
•extract fingerprint and video object
•Fingerprint matching
15.2
0.99 0.99
16.26
61.97
0.52 1 0.002
40.49
0.41 0.936
9.54
PSNR MSE SSM AVG
ANALYSIS
ENCRYPT STEGO DECRYP
The PSNR is measured to ensure whether the encrypted image is intelligible to unauthorized person or not.
 When comparing, PSNR is an approximation to human perception of reconstruction quality. Although a
higher PSNR generally indicates that the reconstruction is of higher quality.
 Thethreshold value for PSNR is 61.971 dB
 Whenever we are hiding image behind cover image though PSNR ratio increased so quality is not
degrading as PSNR value increasing the quality of image is also increasing.
 That is there is not no effect on original image which is hidden twice in a cover image. PSNR value
increasing image quality also increase.
PSNR
SSIM
• The structural similarity index is a method for measuring the similarity between two images.
• Measuring of image quality based on an initial uncompressed or distortion-free image as reference
• SSIM is designed to improve on traditional methods like peak signal-to-noise ratio (PSNR) and mean squared
error (MSE), which have proven to be inconsistent with human eye perception.
MSE
• Mean squared error (MSE) or mean squared deviation (MSD) of an estimator measures the average of the
squares of the errors or deviations
• Ie, the difference between the estimator and what is estimated.
• MSE is a risk function, corresponding to the expected value of the squared error loss or quadratic loss.
• The difference occurs because of randomness
• it is always non-negative, and values closer to zero are better.
FUTURESCOPE
• This proposed system can be further enhanced and made more secure by capturing the retinal image
of a person and performing the above mentioned encryption procedure to encrypt them and send over
a network.
• Also by combining more than one biometric attribute the security can be enhanced
CONCLUSION
• In our daily lives biometrics signal plays a vital role and the development and integration of biometric
authentication techniques used into practical applications increases nowadays.
• In this system , propose a biometrics-based authentication scheme using visual cryptography and
steganography Security .
• If the steganography scheme is alone applied it does not ensure secrecy when it was combined with a
blowfish encryption system and visual cryptographic technique it provides additional security.
• In this method the visual cryptographic share generation at the user registration phase and embedding
biometric signal to the video object at the login phase provide a secure authentication scheme .
REFERENCES
1. A. Shejul and U. L. Kulkarni, “A secure skin tone based steganography using wavelet transform,”
International Journal of Computer Theory and Engineering, vol. 3(1), pp. 16–22, 2011.
2. Bailey, K. “An evaluation of image based steganography methods”, Journal of Multimedia Tools and
Applications, Vol. 30, No. 1, pp. 55-88,IEEE,2006.
3. BANOCI V, BUGAR G, LEVICKY Dusan, 2011, A Novel Method of Image Steganography in DWT
Domain‟ IEEE 2011.
4. Behera, S.K. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and
Engineering Technology, Vol. 1, No. 1, pp. 16-23, IEEE, 2010.
5. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and
Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
6. C.-T. Li and M.-S. Hwang, “An efficient biometrics based remote user authentication scheme using smart
cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, Jan. 2010.
7. Chen, C-H. Ling, and M.-S. Hwang,(2014) “Weaknesses of the yoonkim-yoo remote user authentication
scheme using smart cards,” in Proceedings of the 2014 IEEE Workshop on Electronics, Computer and
Applications. IEEE, pp. 771–774.
8. D. He and D. Wang, “Robust biometrics-based authentication schemefor multi-server environment,” IEEE
Systems Journal, pp. 1–8, 2014.
9. D. He, Q. Sun, and Q. Tian, “A secure and robust object-based video authentication system,” EURASIP
Journal of Applied Signal Processing, vol. 2004, pp. 2185–2200, 2004.
10. D. Kundur, Y. Zhao, and P. Campisi, “A steganographic framework for dual authentication and compression
of high resolution imagery,” in Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 2.
IEEE, 2004, pp. 1–4.
11. Doulamis .N.D, A. D. Doulamis, K. S. Ntalianis, and S. D. Kollias,(2003) “An efficient fully-unsupervised video
object segmentation scheme using an adaptive neural network classifier architecture,” IEEE Transactions on
Neural Networks, vol. 14(3), pp. 616–630.
12. Fard .M, M. R. Akbarzadeh-T, and F. Varasteh-A,(2006) “A new genetic algorithm approach for secure jpeg
steganography,” in Proc. of IEEE Int’l Conference on Engineering of Intelligent Systems.
13. Gopi Krishnan S and Loganathan D,”Color Image Cryptography Scheme Based on Visual Cryptography
“,Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking
Technologies (ICSCCN 2011)
14. Gutub, A. “Pixel Indicator High Capacity Technique for RGB Image Based Steganography”, WoSPA 2008 –
5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E., pp. 154-
159,IEEE,2008.
15. Gutub, A. “Pixel Indicator Technique for RGB Image Steganography”, Journal of Emerging Technologies in
Web Intelligence, Vol. 2, No.1, pp. 193-198,IEEE,2010.
16. Han Yanyan, Cheng Xiaoni, Yao Dong, He Wencai,” VVCS: Verifiable Visual Cryptography Scheme”, 2011
Seventh International Conference on Computational Intelligence and Security
17. Kashyap N, Sinha G.R, 2012,‟Image Watermarking using 3-level Discrete WaveletTransform (DWT)‟
IJMECS.
18. Kaur B, Kaur A, Singh J, 2011,‟Steganographic approach for hiding image in dct domain‟,IJAET, Vol 1, Issue 3.
19. Kelash H.M, Abdel wahab O.F, Elshakankiry ,Etsayed H.S, 2013, „Hiding Data in videoSequences Using
Steganography Algorithms‟ IEEE.2013
20. Klimis Ntalianis and Nicolas Tsapatsoulis (2015), “Remote Authentication Via Biometrics: A Robust Video-
Object Steganographic Mechanism Over Wireless Networks” in IEEE Transactions on Emerging topics on
computing.
21. Kumar S, Latha M, 2014, “DCT Based Secret Image Hiding in video sequence” IJERA,2014
22. Li .S, X. Zheng, X. Mou, and Y. Cai, (2002,) “Chaotic encryption scheme for real-time digital video,” in
Proceedings of Real-Time Imaging VI, vol. 4666. SPIE, pp. 149–160.
23. Majumder J, Mangal S, 2012, „An Overview of image steganography using LSB Technique‟,IJCA.
24. Marwaha, P. “Visual cryptographic steganography in images”, Second International conference on Computing,
Communication and Networking Technologies, pp. 34-39, IEEE, 2010.
25. Moon S.K, Raut R.d, 2013,‟Analysis of Secured Video Steganography Using Computer Forensics Technique for
Enhance Data Security‟, IEEE.
THANK YOU

More Related Content

What's hot

Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
Shahid Zargar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed video
eSAT Publishing House
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learning
Junaid Bhat
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...
TELKOMNIKA JOURNAL
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
Zac Darcy
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Sagun Man Singh Shrestha
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature LearningAmgad Muhammad
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 

What's hot (19)

Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed video
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learning
 
Steganography
SteganographySteganography
Steganography
 
An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...An improved security and message capacity using AES and Huffman coding on ima...
An improved security and message capacity using AES and Huffman coding on ima...
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature Learning
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 

Similar to Authentication technique using visual crypto and stegano

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
Fatima Azeez
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Mahipesh Satija
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
Mahipesh Satija
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
pallavikhandekar212
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
IRJET Journal
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
SruthiReddy112
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
International Journal of Engineering Inventions www.ijeijournal.com
 
A04020107
A04020107A04020107
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
Omkar Salunke
 
chapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdfchapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdf
ssuser6d1fca
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
asodariyabhavesh
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
AnIsh Kumar
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
IJERA Editor
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Harish Sripathi
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
Samant Khajuria
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 

Similar to Authentication technique using visual crypto and stegano (20)

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
A04020107
A04020107A04020107
A04020107
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
chapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdfchapter-8imagecompression-170804060146.pdf
chapter-8imagecompression-170804060146.pdf
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 

Recently uploaded

ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 

Recently uploaded (20)

ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 

Authentication technique using visual crypto and stegano

  • 1. `ADVANCED AUTHENTICATION USING VISUAL CRYPTOGRAPHY AND A STEGANOGRAPHIC Via BIOMETRICS FOR ONLINE EXAMS/INTERVIEWS
  • 2. OBJECTIVE  To develop a two factor authentication mechanism based on visual Cryptographic scheme and video object Steganography via biometrics
  • 3. INTRODUCTION  Authentication is the act of confirming identification of someone, some application…  Normally authentication includes the use of username, password, digital cards, signatures, biometric attributes.  Where biometric attributes are unique to every individual and there by used in variety of application where there need to claim authenticity of individual  In this system authentication is done using biometric attribute ie.,fingerprint
  • 4.  With the rapid transmission of biometric data over internet ,the security of the data is in major concern  To avoid these security threats and sharing issues the secret information like text ,audio ,video, image used for authentications are applied using the techniques visual cryptography and steganography  In this proposed system visual cryptography and steganography are implemented individually for different attributes  Visual cryptography is technique to generate the shares of a secret image and the secret can be achieved by combining both shares  Steganogtaphy is used to hide the secret image within a cover image
  • 5. SCOPE OF THE SYSTEM  In todays century security and authentication are the major concern in all type of application like online exams,interview,banking..etc  Where communicating entities are located at different locations  To ensure the security of the systems and digital data shared , there should be a dual authentication process  The proposed system provides the facility with both visual cryptography and steganography  The programing is developed using MATLAB software and presented in graphical user interphase
  • 8. VERIFIABLE VISUAL CRYPTOGRAPHY • Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. • Visual cryptography scheme eliminates complex computation problem in decryption process, and the secret images can be restored by stacking operation. • This property makes visual cryptography especially useful for the low computation load requirement
  • 9. • In this system we are using (2,2) VCS scheme which generate two shares of image. For input binary image which is in 1 and 0 format. • In the 2-out-of-2 scheme, every secret pixel of the image is converted into two shares and recovered by simply stacking two shares together. • This is equivalent to using the OR operation between the shares. • First we take a monochrome image for the source. Pixels in the image are either white or black • Next sub-divide each pixel into four smaller subpixels. • shade these four subpixels to represent the source image, then subjectively divide them between the two cypher images are to create.
  • 10. • Distribute the shading such that, if you have just one of the cypher images, it is impossible to determine what is on the other cypher image, and thus, impossible to decrypt the image. • If the original pixel in the image is black, fill in all four sub pixels then distribute them. • The pattern selection is random • It does not matter which pair of pixels goes on which layer, when they are combined, all four pixels will be black.
  • 11. • Conversely, if the source image pixel is white, shade in just two pixels, make sure that the same pixels are shaded on both layers. • In this way, when the two cypher images are combined, only two pixels are shaded. • The result of this process is two images which when combined result in an image with half the contrast of the original. • The black of the source remains black in the combined cypher, but the white in the source is changed to a randomly mottled half-tone gray • this is still sufficiently high enough contrast for the secret message to be easily read .
  • 12. BLOWFISH ENCRYPTION • Image encryption is necessary for future multimedia Internet applications. • By encrypting these images, a degree of security can be achieved. • Blowfish is a symmetric block cipher that can be effectively used for encryption and safeguarding of data • It takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data. • Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times • Blowfish contains 16 rounds. Each round consists of XOR operation and a function. Each round consists of key expansion and data encryption.
  • 13. Algorithm: Blowfish Encryption  Divide x into two 32-bit halves: xL, xR  For i = 1to 16:  xL = XL XOR Pi  xR = F(XL) XOR xR  Swap XL and xR  Swap XL and xR (Undo the last swap.)  xR = xR XOR P17  xL = xL XOR P18  Recombine xL and xR
  • 14. Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the feistel network and this algorithm is divided into two parts. • 1. Key-expansion • 2. Data Encryption Key-expansion: • It will converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Blowfish uses large number of subkeys. These keys are generate earlier to any data encryption or decryption. • The p-array consists of 18, 32-bit subkeys: P1,P2,………….,P1 Data Encryption: • It is having a function to iterate 16 times of network. Each round consists of key-dependent permutation and a key and data-dependent substitution. • All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookup tables for each round.
  • 15. STEGANOGRAPHIC VIDEO OBJECT AUTHENTICATION The proposed scheme involves • Extraction of the host video object from a video and detection of the QSWTs to embed the encrypted signal, • Embedding of the encrypted signal to the host video object using steganography • Compression of the final content Video to frame conversion • The video is taken from the user as input. • Usually, the video Consists of multiple frames. The frames are extracted by explicit values specified by the user. • After the conversion of video to frames, the user has to input their biometric image i.e. retinal pattern or finger print.
  • 16. DATA HIDING • The goal of this system is send sensitive information that are invisible to human eyes but also robust under different attacks. • Qualified Significant Wavelet Trees provide such robustness in the steganography. • The hiding module hide the encrypted the information into the largest-value QSWTs of energy-efficient pairs of sub bands • The image obtained is stego-object image. • It is compressed and transmitted and receiver after receiving decompress and decryption is done to get original information and it is accessed as a secret code.
  • 17. • The Discrete Wavelet Transform is used to hide information like text, audio, video, images etc., into cover image. • The steganography technique is implemented in the discrete wavelet transform. • In this technique the cover image is divided into four equal parts with respect to the resolution of the image • The four parts is represented as low, middle and high frequencies that is represented as LL, HL, LH and HH.
  • 18. • By applying the DWT once to an area of arbitrary shape, four parts of low, middle, and high frequencies, i.e., LL1, HL1, LH1, HH1, are produced. • Band LL1 (HH1) includes low (high) frequency components both in horizontal and vertical direction, while the HL1 (LH1), includes high (low) frequencies in horizontal direction and low (high) frequencies in vertical direction. • Subband LL1 can be further decomposed in a similar way into four different subbands, denoted as LL2, HL2, LH2, HH2 respectively. • The coefficient at the highest level is called the parent and all coefficients corresponding to the same spatial location at the lower levels of similar orientation are called children..
  • 19. • Select the pair of subbands that contains the highest energy content (among the three pairs), • Pi : EPi = max(EP1 ;EP2 ;EP3 )The generalized formula • x2(i,j)={HL2,LH2,HH2},x1(p,q)={HL1,LH1,HH1}and M,N is the size of the subbands at level two • After selecting the pair of subbands containing the highest energy content, QSWTs are found for this pair • If a wavelet coefficient xn(i,j) ∈ D at the is a parent of xn-1(p,q), where D is a subband • labeled HLn, HLn, HHn, satisfy |xn(i,j)|>T1, |xn- 1(p,q)|>T2 for given thresholds T1 and T2, then xn(i,j) and its children are called a QSWT • The encrypted biometric signal is embedded by modifying the values of the detected QSWTs • After the encrypted biometric image is hidden into the segmented the input image Inverse Discrete wavelet transform is applied to combine the segmented image and produce a stego -object.
  • 20. MINIATUIA BASED FINGERPRINT MATCHING • Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints • Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity • A fingerprint is the pattern of ridges and valleys on the finger tip. • A fingerprint is thus defined by the uniqueness of the local ridge characteristics and their relationships. • Minutiae points are these local ridge characteristics that occur either at a ridge ending or a ridge bifurcation. • A ridge ending is defined as the point where the ridge ends abruptly and the ridge bifurcation is the point where the ridge splits into two or more branches.
  • 21. IMPLEMENTATION-3 PHASES RGISTRATION •visula cryptography •share1(user) and share2(reciver) LOGIN •input video •input fingerprint •stego object VERIFICATION •stegoobject •extract fingerprint and video object •Fingerprint matching
  • 22. 15.2 0.99 0.99 16.26 61.97 0.52 1 0.002 40.49 0.41 0.936 9.54 PSNR MSE SSM AVG ANALYSIS ENCRYPT STEGO DECRYP
  • 23. The PSNR is measured to ensure whether the encrypted image is intelligible to unauthorized person or not.  When comparing, PSNR is an approximation to human perception of reconstruction quality. Although a higher PSNR generally indicates that the reconstruction is of higher quality.  Thethreshold value for PSNR is 61.971 dB  Whenever we are hiding image behind cover image though PSNR ratio increased so quality is not degrading as PSNR value increasing the quality of image is also increasing.  That is there is not no effect on original image which is hidden twice in a cover image. PSNR value increasing image quality also increase. PSNR
  • 24. SSIM • The structural similarity index is a method for measuring the similarity between two images. • Measuring of image quality based on an initial uncompressed or distortion-free image as reference • SSIM is designed to improve on traditional methods like peak signal-to-noise ratio (PSNR) and mean squared error (MSE), which have proven to be inconsistent with human eye perception. MSE • Mean squared error (MSE) or mean squared deviation (MSD) of an estimator measures the average of the squares of the errors or deviations • Ie, the difference between the estimator and what is estimated. • MSE is a risk function, corresponding to the expected value of the squared error loss or quadratic loss. • The difference occurs because of randomness • it is always non-negative, and values closer to zero are better.
  • 25. FUTURESCOPE • This proposed system can be further enhanced and made more secure by capturing the retinal image of a person and performing the above mentioned encryption procedure to encrypt them and send over a network. • Also by combining more than one biometric attribute the security can be enhanced
  • 26. CONCLUSION • In our daily lives biometrics signal plays a vital role and the development and integration of biometric authentication techniques used into practical applications increases nowadays. • In this system , propose a biometrics-based authentication scheme using visual cryptography and steganography Security . • If the steganography scheme is alone applied it does not ensure secrecy when it was combined with a blowfish encryption system and visual cryptographic technique it provides additional security. • In this method the visual cryptographic share generation at the user registration phase and embedding biometric signal to the video object at the login phase provide a secure authentication scheme .
  • 27. REFERENCES 1. A. Shejul and U. L. Kulkarni, “A secure skin tone based steganography using wavelet transform,” International Journal of Computer Theory and Engineering, vol. 3(1), pp. 16–22, 2011. 2. Bailey, K. “An evaluation of image based steganography methods”, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, pp. 55-88,IEEE,2006. 3. BANOCI V, BUGAR G, LEVICKY Dusan, 2011, A Novel Method of Image Steganography in DWT Domain‟ IEEE 2011. 4. Behera, S.K. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and Engineering Technology, Vol. 1, No. 1, pp. 16-23, IEEE, 2010. 5. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. 6. C.-T. Li and M.-S. Hwang, “An efficient biometrics based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, Jan. 2010. 7. Chen, C-H. Ling, and M.-S. Hwang,(2014) “Weaknesses of the yoonkim-yoo remote user authentication scheme using smart cards,” in Proceedings of the 2014 IEEE Workshop on Electronics, Computer and Applications. IEEE, pp. 771–774. 8. D. He and D. Wang, “Robust biometrics-based authentication schemefor multi-server environment,” IEEE Systems Journal, pp. 1–8, 2014.
  • 28. 9. D. He, Q. Sun, and Q. Tian, “A secure and robust object-based video authentication system,” EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 2185–2200, 2004. 10. D. Kundur, Y. Zhao, and P. Campisi, “A steganographic framework for dual authentication and compression of high resolution imagery,” in Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 2. IEEE, 2004, pp. 1–4. 11. Doulamis .N.D, A. D. Doulamis, K. S. Ntalianis, and S. D. Kollias,(2003) “An efficient fully-unsupervised video object segmentation scheme using an adaptive neural network classifier architecture,” IEEE Transactions on Neural Networks, vol. 14(3), pp. 616–630. 12. Fard .M, M. R. Akbarzadeh-T, and F. Varasteh-A,(2006) “A new genetic algorithm approach for secure jpeg steganography,” in Proc. of IEEE Int’l Conference on Engineering of Intelligent Systems. 13. Gopi Krishnan S and Loganathan D,”Color Image Cryptography Scheme Based on Visual Cryptography “,Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011) 14. Gutub, A. “Pixel Indicator High Capacity Technique for RGB Image Based Steganography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E., pp. 154- 159,IEEE,2008. 15. Gutub, A. “Pixel Indicator Technique for RGB Image Steganography”, Journal of Emerging Technologies in Web Intelligence, Vol. 2, No.1, pp. 193-198,IEEE,2010. 16. Han Yanyan, Cheng Xiaoni, Yao Dong, He Wencai,” VVCS: Verifiable Visual Cryptography Scheme”, 2011 Seventh International Conference on Computational Intelligence and Security
  • 29. 17. Kashyap N, Sinha G.R, 2012,‟Image Watermarking using 3-level Discrete WaveletTransform (DWT)‟ IJMECS. 18. Kaur B, Kaur A, Singh J, 2011,‟Steganographic approach for hiding image in dct domain‟,IJAET, Vol 1, Issue 3. 19. Kelash H.M, Abdel wahab O.F, Elshakankiry ,Etsayed H.S, 2013, „Hiding Data in videoSequences Using Steganography Algorithms‟ IEEE.2013 20. Klimis Ntalianis and Nicolas Tsapatsoulis (2015), “Remote Authentication Via Biometrics: A Robust Video- Object Steganographic Mechanism Over Wireless Networks” in IEEE Transactions on Emerging topics on computing. 21. Kumar S, Latha M, 2014, “DCT Based Secret Image Hiding in video sequence” IJERA,2014 22. Li .S, X. Zheng, X. Mou, and Y. Cai, (2002,) “Chaotic encryption scheme for real-time digital video,” in Proceedings of Real-Time Imaging VI, vol. 4666. SPIE, pp. 149–160. 23. Majumder J, Mangal S, 2012, „An Overview of image steganography using LSB Technique‟,IJCA. 24. Marwaha, P. “Visual cryptographic steganography in images”, Second International conference on Computing, Communication and Networking Technologies, pp. 34-39, IEEE, 2010. 25. Moon S.K, Raut R.d, 2013,‟Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security‟, IEEE.