SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 580
Lossless Encryption Technique for Finger Biometric Images
Pranoti G. Tapase1, Prof. G. N. Wazurkar2, Dr. D. R. Dandekar 3
1PG Scholar, Department of Electronics Engineering, BDCE, Sevagram, Wardha –442102, INDIA
2Assistant Professor, Department of Electronics Engineering, BDCE, Sevagram, Wardha –442102, INDIA
3Professor, Department of Electronics Engineering, BDCE, Sevagram, Wardha –442102, INDIA
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Biometric template protection is one of the most
important issues in deploying a practical biometricsystem. To
tackle this problem, many algorithms, that do not store the
template in its original form, have been reported in recent
years. They can be categorized into two approaches, namely
biometric cryptosystem and transform-based. However, most
algorithms in both approaches offer a trade-off between the
template security and matching performance. Moreover, it is
believed that no single template protection method is capable
of satisfying the security and performance simultaneously.
Multi-biometric systems are being increasingly deployed in
many large-scale biometricapplications(e.g., FBI-IAFIS, UIDAI
system in India) because of their advantages of lower error
rates and larger population coverage compared to uni-
biometric systems. However, multi-biometric systems require
storage of multiple biometric templates (e.g., fingerprint, iris,
and face) for each user, which results in increased risk to user
privacy and system security.
Keywords: encryption algorithm, decryption algorithm,
attacks.
1. INTRODUCTION
With the growth in communication technology, the
popularity of multimedia data has also increased. The
progress in multimedia distribution technologyhasresulted
in easy availability of multimedia content to various users
over the communication channels. Users of the multimedia
data are able to carry out real-time audio and video
conferencing, listen to music, viewstreamingvideoclips,etc.
They also view films and news on the World Wide Web
(WWW). However, most of the networks used for
multimedia distribution are open channels and are highly
insecure. These networks are vulnerable to attacks and not
suitable for transmitting sensitive and valuable multimedia
content such as military, financial or personal videos. This
necessitates secure encryption algorithms for multimedia
data protection. Cryptography is an important tool in
modern electronic security technologies to protect valuable
multimedia data on intranets, extranets and the Internet.
Data encryption is encoding the data so that only authorized
users can decode the content. For all others, the data does
not make any sense. Encryption algorithms have been well
studied for the textual data in the past. This standard has
resulted in algorithms like Data Encryption Standard (DES),
Advanced Encryption Standard (AES), RC4, RC6, etc.
However, direct extension of the algorithms for image does
not result in practically useful imageencryptionschemes. All
these algorithms are designed based on the textual
characteristics. Image encryptionschemesaredifferentfrom
textual encryption because image data are usually large in
size and thus requires more time for encryption. It also
requires a similar amount of time for decryption.
Computational overhead makes the traditional encryption
algorithm unsuitable for real-time image communications.
2. LITERATURE REVIEW
Image Security ensures protection of imagecontent
using classical encryption algorithms. Figure 1 shows the
general block diagramof encryption/decryptionsystem. The
original content is changed into the encrypted form with the
encryption algorithm using encryption key. In the sameway
the encrypted data is decrypted into theoriginal formatwith
the decryption algorithm using the same key.
Fig. 1. Image Encryption & Decryption System
Requirement for image encryption/decryption
 Security: Security is the essential requirement of
image content encryption and it can be viewed in
two aspects namely cryptographic security and
perceptual security. The cryptographic security
mainly deals with cryptographic attacks and
perceptual security makes the image content
garbled to human insight. The encryptionalgorithm
becomes secure if the cost of breaking is more than
content. The cryptographic security is the ability to
resist the attacks like differential attack,cipher-text
only attack, plain-text only attack and statistical
attack. If any new formulated algorithm is secure
against those attacks, the encryption algorithm is
said to be of high security, otherwise regarded as of
low security.
 Compression: In general image data is compressed
to minimize the storage space or transmission
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 581
bandwidth. The image content may be encrypted
before compression, during compression and after
compression based on its applications. Due to
encryption algorithms, the size of image content
may increase than the original data.
 Encryption efficiency: Most of the encryption
algorithms are required for real time applications
therefore they should be more efficient and allow
less delay during transmissionthroughthenetwork
or at the time of user access. This can be achieved
by reducing encrypted data volume and proposing
light weight algorithms.
Encryption can be classified into two types
1. Complete Encryption: Complete encryption
encrypts the entire image content without
considering its format. This kind of algorithm
encrypts raw data or compressed data directlywith
classical encryption algorithms by using an
encryption key. In raw data encryption, the image
data is encrypted before it is compressed. In
compressed data encryption, the data is first
compressed and then encrypted. Based on the
properties, encryption algorithms can be classified
into permutation algorithms, random modulation
algorithms, confusion diffusion algorithms, and
partial DES algorithms, etc. Based on
implementation, they canbe classifiedintosoftware
based algorithms and hardware-based algorithms.
2. Selective Encryption:Selectiveencryptionapproach
encrypts only a part of the image content. Image
data is first partitioned into two parts, one part is
encrypted by encryption algorithm withencryption
key, and the other part is not changed, and the two
parts are combined together. The decryption
process is symmetric to the encryption process.
Applications of image encryption / decryption
 Internet communication
 Medical imaging
 Military communication
 Cryptography
 Steganography
 Digital image watermarking
 Biometric images
[1] In this paper two stage biometric data protection
scheme is being proposed using permutation and
substitution mechanism of the chaotic theory which is
lossless in nature. Arnold transformation and Henon map is
used to design an efficient encryption system. The
encryption method is aimed at generating an encrypted
image that will have statistical properties completely
dissimilar from the original image analysis which will make
it difficult for any intruder to decrypt the image. The
performance of the method has been experimentally
analyzed using statistical analysis and correlation based
methods. Correlation coefficient analysis is done to evaluate
the behavior of pixels in horizontal and vertical directions
and the results are found to be encouraging. This protection
scheme provides the ability to encrypt the data and secureit
from unauthorized users. Upon decryption the data is
completely recovered making this scheme a lossless and
efficient method of biometric data security.
[2] Biometric identification suffers a lotofproblemssuchas
the storage of user’s biometrictemplate,theleakageofuser’s
private and the resulting security problems. As a
substitution, biometric encryption has become the focus of
the present studies. Recently, numerous studies focus on
biometric encryption based on Fuzzy Vault, Fuzzy
Commitment and dynamic key generation. Both of them are
unavailable in the network environment as they suffer
neither stored templates nor unstable keys.Inthispaper,we
propose a fingerprint encryptionschemebasedonthreshold
(t, n), unlike the reliance of templates in Fuzzy Vault based
scheme or the “encrypted” templates in Fuzzy Commitment
based scheme when regenerate the very key, whichprotects
biometric key in a polynomial, and saves nothing about
biometric characteristics just like dynamic biometric key
generation scheme.
[3] With the current emergence of biometric image data
applications on devices such as smart phones, security
cameras, personal computersetc,thereisa needforsecuring
the image templates obtained from crime scenes as well as
such devices before storing them in locations such as the
cloud etc. In this paper, we proposed an encryption
technique of securing the biometric image data collected
from devices with an approach of feature based on
encryption technique for securing forensic biometric image
data using AES and visual cryptography method.
[4] In this paper, a chaotic encryption framework is
proposed for enhancing the security of biometrics images
during transmission. The proposed framework is based on
the fractional wavelet packet transform (FrWPT), chaotic
map and Hessenberg decomposition. The core idea is to
shuffle biometrics image using affine transform followed by
the transformation in FrWPT domain with chaotically
generated transform orders. Now, FrWPT coefficients are
altered using the Hessenberg decomposition. Finally, a
reliable decryption process is presented to reconstruct
original biometrics image from the encrypteddata onlywith
the valid keys. The efficiency and robustnessoftheproposed
technique are validated by different kind of simulations and
analysis on fingerprint images.
[5] This study proposes a chaos-based image encryption
scheme using Henon map andLorenzequation withmultiple
levels of diffusion. The Henon map is used for confusion and
the Lorenz equation for diffusion. Apart from the Lorenz
equation, another matrix with the same size as the original
image is generated which is a complex function of the
original image. This matrix which is configuredasa diffusion
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 582
matrix permits two stages of diffusion.Duetothisstep,there
is a strong sensitivity to input image. This encryption
algorithm has high key space, entropyverycloseto eight(for
grey images) and very less correlation among adjacent
pixels. The highlight of this method is the ideal number of
pixels change rate and unified average changing intensity it
offers. These ideal values indicate that the encryptedimages
produced by this proposedschemearerandom-like.Further,
a cryptanalysis study has been carried out to prove that the
proposed algorithm is resistant to known attacks.
3. PROBLEM FORMULATION
The objective of our research is to develop and
investigate the performance of encryption / decryption
algorithm for finger biometric images using cryptosystem
technique by measuring encryption time, NPCR, UACI and
entropy.
 To develop encryption algorithm
 To develop decryption algorithm
 Performance evaluation using parameters
under common attackssuchasnoise,geometric
and compression.
4. PROPOSED METHODOLOGY
The following steps indicate the methodology adopted for
biometric image encryption/decryption.
1. Input fingerprint biometric image
2. Preprocessing of input image
3. Key generation
4. Encryption / decryption algorithm
5. Key management
6. Performance evaluation using parameters under
common attacks such as noise, geometric and
compression.
5. CONCLUSION
Two important attributes of a powerful encryption
technique are diffusion and confusion.Hence,themotivation
is to generate a scheme which has more diffusion and
confusion. Due to some intrinsic features of images, some of
the traditional encryption schemes are not very suitable for
finger biometric images encryption. Hence the motivation is
to generate schemes to encrypt images efficiently. To
enhance the security of images, a biometric cryptosystem
approach that combines cryptography and biometrics
images. Under this approach, the biometric image is
encrypted with the help of key. A key may be generatedwith
the combination of fingerprint image itself and / or
password and is used for image encryption.Thismechanism
is seen to enhance the security of biometrics images during
transmission, storage and verification
ACKNOWLEDGEMENT
Firstly, I would like to thank respected Dr. D. R. Dandekarsir
and Prof. G. N. Wazurkar sir for giving me such a wonderful
opportunity to expand my knowledge and for his huge
support. Secondly, I would like to thank my parents who
patiently helped me as I went through my work and my
friends who helped me to make my work more organized
and well-stacked till the end.
REFERENCES
[1] Garima Mehta, Malay Kishore Dutta, Jan Karasek,
Pyung Soo Kim, “An Efficient and LosslessFingerprint
Encryption Algorithm Using Henon Map & Arnold
Transformation,” in IEEE International Conferenceon
Control Communication and Computing(ICCC),2013.
[2] Bin Liang, et al, “A Novel Fingerprint-Based Biometric
Encryption,” in IEEE Ninth International Conference
on P2P, Parallel, Grid, Cloud and Internet Computing,
2014.
[3] Quist-Aphetsi Kester, et al, “FeatureBasedEncryption
Technique For Securing Forensic Biometric Image
Data Using AES and Visual Cryptography,” in IEEE
Second International Conference on Artificial
Intelligence, Modelling and Simulation, 2014.
[4] G. Bhatnagar and Q. J. Wu, “Enhancing the
transmission security of biometric images using
chaotic encryption,”SpringerMultimedia systems,vol.
20, no. 2, pp. 203–214, 2014.
[5] Brindha Murugan, Ammasai Gounden Nanjappa
Gounder, “Image encryption scheme based on block
based confusion and multiple levels of diffusion,” in
IET Computer Vision, Vol. 10 Issue 6, 2016, pp. 593-
602.
[6] R. Gonzales, R. E. Woods, “Digital Image Processing,”
2nd Edition, New Jersey Prentice Hall, 2002.
[7] A. K. Jain, “Fundamentals of Digital ImageProcessing,”
2nd Edition, Prentice Hall, 1994.

More Related Content

What's hot

IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
INFOGAIN PUBLICATION
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
IJRES Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
ijwmn
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
 

What's hot (19)

IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
319 325
319 325319 325
319 325
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 

Similar to IRJET- Lossless Encryption Technique for Finger Biometric Images

Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
IRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
IRJET Journal
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET Journal
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd Iaetsd
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
IRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
IAEME Publication
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
aissmsblogs
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
ssuser50a5ec
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...
Christo Ananth
 

Similar to IRJET- Lossless Encryption Technique for Finger Biometric Images (20)

Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 

Recently uploaded (20)

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 

IRJET- Lossless Encryption Technique for Finger Biometric Images

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 580 Lossless Encryption Technique for Finger Biometric Images Pranoti G. Tapase1, Prof. G. N. Wazurkar2, Dr. D. R. Dandekar 3 1PG Scholar, Department of Electronics Engineering, BDCE, Sevagram, Wardha –442102, INDIA 2Assistant Professor, Department of Electronics Engineering, BDCE, Sevagram, Wardha –442102, INDIA 3Professor, Department of Electronics Engineering, BDCE, Sevagram, Wardha –442102, INDIA ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Biometric template protection is one of the most important issues in deploying a practical biometricsystem. To tackle this problem, many algorithms, that do not store the template in its original form, have been reported in recent years. They can be categorized into two approaches, namely biometric cryptosystem and transform-based. However, most algorithms in both approaches offer a trade-off between the template security and matching performance. Moreover, it is believed that no single template protection method is capable of satisfying the security and performance simultaneously. Multi-biometric systems are being increasingly deployed in many large-scale biometricapplications(e.g., FBI-IAFIS, UIDAI system in India) because of their advantages of lower error rates and larger population coverage compared to uni- biometric systems. However, multi-biometric systems require storage of multiple biometric templates (e.g., fingerprint, iris, and face) for each user, which results in increased risk to user privacy and system security. Keywords: encryption algorithm, decryption algorithm, attacks. 1. INTRODUCTION With the growth in communication technology, the popularity of multimedia data has also increased. The progress in multimedia distribution technologyhasresulted in easy availability of multimedia content to various users over the communication channels. Users of the multimedia data are able to carry out real-time audio and video conferencing, listen to music, viewstreamingvideoclips,etc. They also view films and news on the World Wide Web (WWW). However, most of the networks used for multimedia distribution are open channels and are highly insecure. These networks are vulnerable to attacks and not suitable for transmitting sensitive and valuable multimedia content such as military, financial or personal videos. This necessitates secure encryption algorithms for multimedia data protection. Cryptography is an important tool in modern electronic security technologies to protect valuable multimedia data on intranets, extranets and the Internet. Data encryption is encoding the data so that only authorized users can decode the content. For all others, the data does not make any sense. Encryption algorithms have been well studied for the textual data in the past. This standard has resulted in algorithms like Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC4, RC6, etc. However, direct extension of the algorithms for image does not result in practically useful imageencryptionschemes. All these algorithms are designed based on the textual characteristics. Image encryptionschemesaredifferentfrom textual encryption because image data are usually large in size and thus requires more time for encryption. It also requires a similar amount of time for decryption. Computational overhead makes the traditional encryption algorithm unsuitable for real-time image communications. 2. LITERATURE REVIEW Image Security ensures protection of imagecontent using classical encryption algorithms. Figure 1 shows the general block diagramof encryption/decryptionsystem. The original content is changed into the encrypted form with the encryption algorithm using encryption key. In the sameway the encrypted data is decrypted into theoriginal formatwith the decryption algorithm using the same key. Fig. 1. Image Encryption & Decryption System Requirement for image encryption/decryption  Security: Security is the essential requirement of image content encryption and it can be viewed in two aspects namely cryptographic security and perceptual security. The cryptographic security mainly deals with cryptographic attacks and perceptual security makes the image content garbled to human insight. The encryptionalgorithm becomes secure if the cost of breaking is more than content. The cryptographic security is the ability to resist the attacks like differential attack,cipher-text only attack, plain-text only attack and statistical attack. If any new formulated algorithm is secure against those attacks, the encryption algorithm is said to be of high security, otherwise regarded as of low security.  Compression: In general image data is compressed to minimize the storage space or transmission
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 581 bandwidth. The image content may be encrypted before compression, during compression and after compression based on its applications. Due to encryption algorithms, the size of image content may increase than the original data.  Encryption efficiency: Most of the encryption algorithms are required for real time applications therefore they should be more efficient and allow less delay during transmissionthroughthenetwork or at the time of user access. This can be achieved by reducing encrypted data volume and proposing light weight algorithms. Encryption can be classified into two types 1. Complete Encryption: Complete encryption encrypts the entire image content without considering its format. This kind of algorithm encrypts raw data or compressed data directlywith classical encryption algorithms by using an encryption key. In raw data encryption, the image data is encrypted before it is compressed. In compressed data encryption, the data is first compressed and then encrypted. Based on the properties, encryption algorithms can be classified into permutation algorithms, random modulation algorithms, confusion diffusion algorithms, and partial DES algorithms, etc. Based on implementation, they canbe classifiedintosoftware based algorithms and hardware-based algorithms. 2. Selective Encryption:Selectiveencryptionapproach encrypts only a part of the image content. Image data is first partitioned into two parts, one part is encrypted by encryption algorithm withencryption key, and the other part is not changed, and the two parts are combined together. The decryption process is symmetric to the encryption process. Applications of image encryption / decryption  Internet communication  Medical imaging  Military communication  Cryptography  Steganography  Digital image watermarking  Biometric images [1] In this paper two stage biometric data protection scheme is being proposed using permutation and substitution mechanism of the chaotic theory which is lossless in nature. Arnold transformation and Henon map is used to design an efficient encryption system. The encryption method is aimed at generating an encrypted image that will have statistical properties completely dissimilar from the original image analysis which will make it difficult for any intruder to decrypt the image. The performance of the method has been experimentally analyzed using statistical analysis and correlation based methods. Correlation coefficient analysis is done to evaluate the behavior of pixels in horizontal and vertical directions and the results are found to be encouraging. This protection scheme provides the ability to encrypt the data and secureit from unauthorized users. Upon decryption the data is completely recovered making this scheme a lossless and efficient method of biometric data security. [2] Biometric identification suffers a lotofproblemssuchas the storage of user’s biometrictemplate,theleakageofuser’s private and the resulting security problems. As a substitution, biometric encryption has become the focus of the present studies. Recently, numerous studies focus on biometric encryption based on Fuzzy Vault, Fuzzy Commitment and dynamic key generation. Both of them are unavailable in the network environment as they suffer neither stored templates nor unstable keys.Inthispaper,we propose a fingerprint encryptionschemebasedonthreshold (t, n), unlike the reliance of templates in Fuzzy Vault based scheme or the “encrypted” templates in Fuzzy Commitment based scheme when regenerate the very key, whichprotects biometric key in a polynomial, and saves nothing about biometric characteristics just like dynamic biometric key generation scheme. [3] With the current emergence of biometric image data applications on devices such as smart phones, security cameras, personal computersetc,thereisa needforsecuring the image templates obtained from crime scenes as well as such devices before storing them in locations such as the cloud etc. In this paper, we proposed an encryption technique of securing the biometric image data collected from devices with an approach of feature based on encryption technique for securing forensic biometric image data using AES and visual cryptography method. [4] In this paper, a chaotic encryption framework is proposed for enhancing the security of biometrics images during transmission. The proposed framework is based on the fractional wavelet packet transform (FrWPT), chaotic map and Hessenberg decomposition. The core idea is to shuffle biometrics image using affine transform followed by the transformation in FrWPT domain with chaotically generated transform orders. Now, FrWPT coefficients are altered using the Hessenberg decomposition. Finally, a reliable decryption process is presented to reconstruct original biometrics image from the encrypteddata onlywith the valid keys. The efficiency and robustnessoftheproposed technique are validated by different kind of simulations and analysis on fingerprint images. [5] This study proposes a chaos-based image encryption scheme using Henon map andLorenzequation withmultiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from the Lorenz equation, another matrix with the same size as the original image is generated which is a complex function of the original image. This matrix which is configuredasa diffusion
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 582 matrix permits two stages of diffusion.Duetothisstep,there is a strong sensitivity to input image. This encryption algorithm has high key space, entropyverycloseto eight(for grey images) and very less correlation among adjacent pixels. The highlight of this method is the ideal number of pixels change rate and unified average changing intensity it offers. These ideal values indicate that the encryptedimages produced by this proposedschemearerandom-like.Further, a cryptanalysis study has been carried out to prove that the proposed algorithm is resistant to known attacks. 3. PROBLEM FORMULATION The objective of our research is to develop and investigate the performance of encryption / decryption algorithm for finger biometric images using cryptosystem technique by measuring encryption time, NPCR, UACI and entropy.  To develop encryption algorithm  To develop decryption algorithm  Performance evaluation using parameters under common attackssuchasnoise,geometric and compression. 4. PROPOSED METHODOLOGY The following steps indicate the methodology adopted for biometric image encryption/decryption. 1. Input fingerprint biometric image 2. Preprocessing of input image 3. Key generation 4. Encryption / decryption algorithm 5. Key management 6. Performance evaluation using parameters under common attacks such as noise, geometric and compression. 5. CONCLUSION Two important attributes of a powerful encryption technique are diffusion and confusion.Hence,themotivation is to generate a scheme which has more diffusion and confusion. Due to some intrinsic features of images, some of the traditional encryption schemes are not very suitable for finger biometric images encryption. Hence the motivation is to generate schemes to encrypt images efficiently. To enhance the security of images, a biometric cryptosystem approach that combines cryptography and biometrics images. Under this approach, the biometric image is encrypted with the help of key. A key may be generatedwith the combination of fingerprint image itself and / or password and is used for image encryption.Thismechanism is seen to enhance the security of biometrics images during transmission, storage and verification ACKNOWLEDGEMENT Firstly, I would like to thank respected Dr. D. R. Dandekarsir and Prof. G. N. Wazurkar sir for giving me such a wonderful opportunity to expand my knowledge and for his huge support. Secondly, I would like to thank my parents who patiently helped me as I went through my work and my friends who helped me to make my work more organized and well-stacked till the end. REFERENCES [1] Garima Mehta, Malay Kishore Dutta, Jan Karasek, Pyung Soo Kim, “An Efficient and LosslessFingerprint Encryption Algorithm Using Henon Map & Arnold Transformation,” in IEEE International Conferenceon Control Communication and Computing(ICCC),2013. [2] Bin Liang, et al, “A Novel Fingerprint-Based Biometric Encryption,” in IEEE Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2014. [3] Quist-Aphetsi Kester, et al, “FeatureBasedEncryption Technique For Securing Forensic Biometric Image Data Using AES and Visual Cryptography,” in IEEE Second International Conference on Artificial Intelligence, Modelling and Simulation, 2014. [4] G. Bhatnagar and Q. J. Wu, “Enhancing the transmission security of biometric images using chaotic encryption,”SpringerMultimedia systems,vol. 20, no. 2, pp. 203–214, 2014. [5] Brindha Murugan, Ammasai Gounden Nanjappa Gounder, “Image encryption scheme based on block based confusion and multiple levels of diffusion,” in IET Computer Vision, Vol. 10 Issue 6, 2016, pp. 593- 602. [6] R. Gonzales, R. E. Woods, “Digital Image Processing,” 2nd Edition, New Jersey Prentice Hall, 2002. [7] A. K. Jain, “Fundamentals of Digital ImageProcessing,” 2nd Edition, Prentice Hall, 1994.