Abstract
The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. In this paper, we proposed an enhancement of temporal-spatial domain algorithm which involves the scheme of Least Significant Bits (LSB) as the new model which converts iris images to binary stream and hides into a proper lower bit plane. Here, the stego key, n, will be inserted into the binary values from the plane which concealed the information; where n is the input parameter in binary values which inserted to the iris codes, m. These values produce the output which is the new iris stego image after binary conversion. Theoretically, the proposed model is promising a high security performance implementation in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bhargav, A., Squicciarini, A., Bertino, E., Kong, X., Zhang, W.: Biometrics-Based Identifiers for Digital Identity Management. In: ACM International Conference Proceeding Series, Proceedings of the 9th Symposium on Identity and Trust on the Internet, pp. 84–96 (2010)
Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, New York (2001)
Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology 14(1), 4–19 (2004)
Schneier, B.: The Uses and Abuses of Biometrics. Communications of The ACMÂ 42(8), 136 (1999)
Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE, Transactions on Computers 55(9), 1081–1088 (2006)
Xiao, M.-m., Yu, L.-X., Liu, C.-J.: A comparative Research of Robustness for Image Watermarking. IEEE, Computer Science and Software Engineering 6(12-14), 700–703 (2008)
VijayKumar, Dinesh: Performance Evaluation of DWT Based Image Steganography. In: IEEE, 2nd International Advance Computing, pp. 223–228 (2010)
Fouad, M., Saddik, A.E., Petriu, E.: Combining DWT and LSB Watermarking to Secure Revocable Iris Templates. In: International Conference on Information Science, Signal Processing and their Applications, pp. 25–28 (2010)
Zebbiche, K., Khelifi, F., Bouridane, A.: An Efficient Watermarking Technique for the Protection of Fingerprint Images. Journal of Information Security, 20 (2008)
Varbanov, G., Blagoev, P.: An Improving Model Watermarking with Iris Biometric Code. In: ACM, International Conference on Computer Systems and Technologies, pp. 5-1 – 5-6 (2007)
Das, S., Bandyopadhyay, P., Paul, S., Ray, A.S., Banerjee, M.: A New Introduction Towards Invisible Image Watermarking on Color Image. In: IEEE, International Advance Computing Conference, pp. 1224–1229 (2009)
Deng, H., Xie, M., Zhang, L., Yao, Z.: An Improved LSB Information Hiding Algorithm and Its Realization by C#. In: IEEE, International Forum on Information Technology and Application, pp. 759–763 (2009)
He, H., Zhang, J., Chen, F.: Block-wise Fragile Watermarking Scheme Based on Scramble Encryption, pp. 216–220 (2007)
Lu, H., Wan, B.: Information Hiding Algorithm using BMP Image. Journal of Wuhan University of Technology 28(6), 96–98 (2006)
Mehboob, B., Faruqui, R.A.: A Steganography Implementation. IEEE, Los Alamitos (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zainal Abidin, Z., Manaf, M., Shibghatullah, A.S. (2011). A New Model of Securing Iris Authentication Using Steganography. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-22170-5_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22169-9
Online ISBN: 978-3-642-22170-5
eBook Packages: Computer ScienceComputer Science (R0)