Skip to main content

A New Model of Securing Iris Authentication Using Steganography

  • Conference paper
Software Engineering and Computer Systems (ICSECS 2011)

Abstract

The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. In this paper, we proposed an enhancement of temporal-spatial domain algorithm which involves the scheme of Least Significant Bits (LSB) as the new model which converts iris images to binary stream and hides into a proper lower bit plane. Here, the stego key, n, will be inserted into the binary values from the plane which concealed the information; where n is the input parameter in binary values which inserted to the iris codes, m. These values produce the output which is the new iris stego image after binary conversion. Theoretically, the proposed model is promising a high security performance implementation in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bhargav, A., Squicciarini, A., Bertino, E., Kong, X., Zhang, W.: Biometrics-Based Identifiers for Digital Identity Management. In: ACM International Conference Proceeding Series, Proceedings of the 9th Symposium on Identity and Trust on the Internet, pp. 84–96 (2010)

    Google Scholar 

  2. Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, New York (2001)

    Google Scholar 

  3. Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology 14(1), 4–19 (2004)

    Article  Google Scholar 

  4. Schneier, B.: The Uses and Abuses of Biometrics. Communications of The ACM 42(8), 136 (1999)

    Article  Google Scholar 

  5. Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE, Transactions on Computers 55(9), 1081–1088 (2006)

    Article  Google Scholar 

  6. Xiao, M.-m., Yu, L.-X., Liu, C.-J.: A comparative Research of Robustness for Image Watermarking. IEEE, Computer Science and Software Engineering 6(12-14), 700–703 (2008)

    Google Scholar 

  7. VijayKumar, Dinesh: Performance Evaluation of DWT Based Image Steganography. In: IEEE, 2nd International Advance Computing, pp. 223–228 (2010)

    Google Scholar 

  8. Fouad, M., Saddik, A.E., Petriu, E.: Combining DWT and LSB Watermarking to Secure Revocable Iris Templates. In: International Conference on Information Science, Signal Processing and their Applications, pp. 25–28 (2010)

    Google Scholar 

  9. Zebbiche, K., Khelifi, F., Bouridane, A.: An Efficient Watermarking Technique for the Protection of Fingerprint Images. Journal of Information Security, 20 (2008)

    Google Scholar 

  10. Varbanov, G., Blagoev, P.: An Improving Model Watermarking with Iris Biometric Code. In: ACM, International Conference on Computer Systems and Technologies, pp. 5-1 – 5-6 (2007)

    Google Scholar 

  11. Das, S., Bandyopadhyay, P., Paul, S., Ray, A.S., Banerjee, M.: A New Introduction Towards Invisible Image Watermarking on Color Image. In: IEEE, International Advance Computing Conference, pp. 1224–1229 (2009)

    Google Scholar 

  12. Deng, H., Xie, M., Zhang, L., Yao, Z.: An Improved LSB Information Hiding Algorithm and Its Realization by C#. In: IEEE, International Forum on Information Technology and Application, pp. 759–763 (2009)

    Google Scholar 

  13. He, H., Zhang, J., Chen, F.: Block-wise Fragile Watermarking Scheme Based on Scramble Encryption, pp. 216–220 (2007)

    Google Scholar 

  14. Lu, H., Wan, B.: Information Hiding Algorithm using BMP Image. Journal of Wuhan University of Technology 28(6), 96–98 (2006)

    Google Scholar 

  15. Mehboob, B., Faruqui, R.A.: A Steganography Implementation. IEEE, Los Alamitos (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zainal Abidin, Z., Manaf, M., Shibghatullah, A.S. (2011). A New Model of Securing Iris Authentication Using Steganography. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22170-5_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22169-9

  • Online ISBN: 978-3-642-22170-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics