Abstract
In recent trend biometric authentication is been used extensively to authenticate the person remotely. So, it is necessary to secure the sensitive secret data by encryption, before transmitting over medium. This paper proposed a stout, highly secure authentication technique based on semantic segmentation, Triple key chaotic encryption and data hiding. If a user wants to be authenticated remotely, then firstly image is segmented to extract head and body parts through semantic segmentation. Second, take A’s fingerprint and encrypt it using Triple key chaotic encryption technique. Furthermore, qualified significant wavelet tree is used to place the encrypted signal in the most significant wavelet coefficient of image. Finally, Inverse Discrete Wavelet Transform is applied to obtain stego image. The output image is further compressed before transmission over wireless medium using Set Partition in Hierarchical Tree compression technique. This technique has good resistance against lossless transmission and compression. The performance measures are Peak signal to noise ratio, correlation index, information entropy and compression ratio.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Madero A (2013) Password secured systems and negative authentication. Ph.D. dissertation, Dept. Eng. Manage., Massachusetts Inst. Technol., Cambridge, MA, USA (Online). Available: http://hdl.handle.net/1721.1/90691
Pascual A, Miller S (2013) Identity fraud report: data breaches becoming a treasure trove for fraudsters. Javelin Strategy Res., Pleasanton, CA, USA, Tech. Rep. 1/2013
Yoon E-J, Yoo K-Y (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235–255
Chuang M-C, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411–1418
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11)770–772
Stallings W (2010) Cryptography and network security: principles and practice, 5th edn. Prentice-Hall, Upper Saddle River, NJ
Liao I-E, Lee C-C, Hwang M-S (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727–740
Jakobsson M, Dhiman M (2013) The benefits of understanding passwords. In: Mobile authentication (Springer Briefs in Computer Science). Springer, New York, NY, pp. 5–24
Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM conference computer, communication and secure, pp 162–175
Wang Y-Y, Liu J-Y, Xiao F-X, Dan J (2009) A more efficient and secure dynamic ID-based remote user authentication scheme. Comput Commun 32(4):583–585
Khan MK, Kim S-K, Alghathbar K (2011) Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comput Commun 34(3):305–309
Yoon E-J, Kim S-H, Yoo K-Y (2012) A security enhanced remote user authentication scheme using smart cards. Int J Innov Comput Inf Control 8(5B):3661–3675
Madhusudhan R, Mittal RC (2012) Dynamic ID-based remote user password authentication schemes using smart cards: a review. Intell Algorithms Data-Centric Sens Netw 35(4):1235–1248
Das AK (2013) A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw Sci 2(1–2):12–27
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20
Chen P-Y, Lin H-J (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275–290
Areepongsa S, Syed YF, Kaewkamnerd N, Rao KR (2000) Steganography for a low bit-rate wavelet based image coder. In: Proc. IEEE international conference on image processing, vol 1, pp 597–600
Kundur D, Zhao Y, Campisi P (2004) A stenographic framework for dual authentication and compression of high resolution imagery. In: Proceedings of the IEEE international symposium on circuits and systems, vol 2, pp 1–4
Hemalatha S, Acharya UD, Renuka A, Kamath PR (2013) A secure color image steganography in transform domain. Int J Crypt Inf Secur 3(1):17–24
Rao NN, Thrimurthy P, Babu BR (2009) A novel scheme for digital rights management of images using biometrics. Int J Comput Sci Netw Secur 9(3):157–167
Wu CW, Rulkov NF (1993) Studying chaos via 1-0 maps-a tutorial. IEEE Trans Circuits Syst I: Fundam Theor Appl 40(10):707–721
Yen C, Guo I (1999) A chaotic neural network for signal encryption/decryption and its VLSI architecture. In: Proceedings of the 10th VLSI Design/CAD symposium, Nan-Tou, Taiwan, August 1999, pp 319–322
Doulamis N, Doulamis A, Ntalianis K, Kollias S (2003) An efficient fully unsupervised video object segmentation scheme using an adaptive neural network classifier architecture. IEEE Trans Neural Netw 14(3):616–630
Li S, Li W (2000) Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding. IEEE Trans Circuits Syst Video Technol 10(5):725–743
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khunteta, A., Sharma, P., Pathak, S., Noonia, A. (2020). Image Security Using Triple Key Chaotic Encryption and SPIHT Compression Technique in Steganography. In: Mathur, G., Sharma, H., Bundele, M., Dey, N., Paprzycki, M. (eds) International Conference on Artificial Intelligence: Advances and Applications 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-1059-5_26
Download citation
DOI: https://doi.org/10.1007/978-981-15-1059-5_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1058-8
Online ISBN: 978-981-15-1059-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)