Enhance Facial Biometric Template Security using Advance Encryption Standard with Least Significant Bit

Gbolagade Morufat D, Moshood Abiola Hambali, Oluwadamilare H. Abdulganiyu, E Lawrence

Abstract


Security of data has been a major issue for many years which has lead to several challenges; loss of data and also allure hackers to where data are been stored. Biometric system to some extend has helped in combating these security issues, the major issues with the biometric system is how to properly secure the template been generated from hackers and unauthorized users. In this paper we combine cryptography and steganography to enhance security of biometric templates using the advance encryption standard (AES) and the least significant bit (LSB) technique to encrypt these templates and secure it from hackers, Cryptography and Steganography are the two widely employed techniques for securing and hiding data. The center of attention of this paper is the potency of combining cryptography and stenography techniques to improve the security of biometric templates.

Keywords


Biometric templates; Cryptography; Steganography Stego-image; LSB

Full Text:

PDF

References


M. A. Hambali and R. G. Jimoh, “Performance Evaluation of Principal Component Analysis and Independent Component Analysis Algorithms for Facial Recognition,” J. Adv. Sci. Res. Its Appl., vol. 2, pp. 47 – 62, 2015.

Y. K. Saheed, M. A. Hambali, I. A. Adeniji, and A. F. Kadri, “Fingerprint Based Approach for Examination Clearance in Higher Institutions,” vol. 2, no. 1, pp. 2–5, 2017. http://dx.doi.org/10.46792/fuoyejet.v2i1.46

S. Z. Li, Encyclopedia of Biometrics: I-Z., vol. 2. Springer Science & Business Media, 2009. https://doi.org/10.1007/978-0-387-73003-5

D. Sadhya and S. K. Singh, “Construction of a Bayesian decision theory-based secure multimodal fusion framework for soft biometric traits,” IET Biometrics, vol. 7, no. 3, pp. 251–259, 2018. http://dx.doi.org/10.1049/iet-bmt.2017.0049

A. M. P. Canuto, F. Pintro, and J. C. Xavier-Junior, “Investigating fusion approaches in multi-biometric cancellable recognition,” Expert Syst. Appl., vol. 40, no. 6, pp. 1971–1980, 2013. https://doi.org/10.1016/j.eswa.2012.10.002

O. C. Abikoye, U. A. Ojo, J. B. Awotunde, and R. O. Ogundokun, “A safe and secured iris template using steganography and cryptography,” Multimed. Tools Apllication, 2020, doi: /doi.org/10.1007/s11042-020-08971-x A.

E. J. C. Kelkboom, X. Zhou, J. Breebaart, R. N. J. Veldhuis, and C. Busch, “Multi-algorithm fusion with template protection,” in 2009 IEEE 3rd international conference on biometrics: Theory, applications, and systems, 2009, pp. 1–8. https://doi.org/10.1109/BTAS.2009.5339045

K. Nandakumar and A. K. Jain, “Biometric template protection: Bridging the performance gap between theory and practice,” IEEE Signal Process. Mag., vol. 32, no. 5, pp. 88–100, 2015. https://doi.org/10.1109/MSP.2015.2427849

R. Dwivedi and S. Dey, “A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification,” Appl. Intell., vol. 49, no. 3, pp. 1016–1035, 2019. https://doi.org/10.1007/s10489-018-1311-2

M. A. Hambali, M. D. Gbolagade, and Y. A. Olasupo, “Cloud Security Using Least Significant Bit Steganography and Data Encryption Standard Algorithm,” GESJ Comput. Sci. Telecommun., vol. 1, no. 58, pp. 17–29, 2020.

A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010

Y. Yiğit and M. Karabatak, “A stenography application for hiding student information into an image,” in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 2019, pp. 1–4. https://doi.org/10.1109/ISDFS.2019.8757516

M. S. Taha, M. S. M. Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of steganography and cryptography: A short survey,” in IOP conference series: materials science and engineering, 2019, p. 052003. https://doi.org/10.1088/1757-899X/518/5/052003

I. McAteer, A. Ibrahim, G. Zheng, W. Yang, and C. Valli, “Integration of biometrics and steganography: A comprehensive review,” Technologies, vol. 7, no. 2, p. 34, 2019. http://dx.doi.org/10.3390/technologies7020034

R. M. Bolle, J. H. Connell, and N. K. Ratha, “Biometric perils and patches,” Pattern Recognit., vol. 35, no. 12, pp. 2727–2738, 2002. https://doi.org/10.1016/S0031-3203(01)00247-3

Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” SIAM J. Comput., vol. 38, no. 1, pp. 97–139, 2008. https://doi.org/10.1007/978-3-540-24676-3_31

M. Umamaheswari, S. Sivasubramanian, and S. Pandiarajan, “Analysis of different steganographic algorithms for secured data hiding,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 10, no. 8, pp. 154–160, 2010. http://paper.ijcsns.org/07_book/201008/20100825.pdf

P. Marwaha and P. Marwaha, “Visual cryptographic steganography in images,” in 2010 Second international conference on computing, communication and networking technologies, 2010, pp. 1–6. https://doi.org/10.1109/ICCCNT.2010.5591730

Z. Zainal-Abidin, M. Manaf, and A. S. Shibghatullah, “A New Model of Securing Iris Authentication Using Steganography,” in International Conference on Software Engineering and Computer Systems, 2011, pp. 547–554. http://dx.doi.org/10.1007/978-3-642-22170-5_47

S. Usha, G. A. S. Kumar, and K. Boopathybagan, “A secure triple level encryption method using cryptography and steganography,” in Proceedings of 2011 International Conference on Computer Science and Network Technology, 2011, vol. 2, pp. 1017–1020. https://doi.org/10.1109/ICCSNT.2011.6182134

P. Bharti and R. Soni, “A new approach of data hiding in images using cryptography and steganography,” Int. J. Comput. Appl., vol. 58, no. 18, 2012. https://research.ijcaonline.org/volume58/number18/pxc3883716.pdf

P. Thiyagarajan, V. Natarajan, G. Aghila, V. Prasanna Venkatesan, and R. Anitha, “Pattern based 3d image steganography,” 3D Res., vol. 4, no. 1, pp. 1–8, 2013. https://doi.org/10.1007/3DRes.01(2013)1

S. Chaudhary and R. Nath, “A new template protection approach for Iris recognition,” in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015, pp. 1–6. https://doi.org/10.1109/ICRITO.2015.7359306

S. Pramothini, Y. S. Pavan, and N. Harini, “Securing images with fingerprint data using steganography and blockchain,” Int. J. Recent Technol. Eng., vol. 7, no. 4, pp. 82–85, 2018. https://www.ijrte.org/wp-content/uploads/papers/v7i4s2/Es2042017519.pdf

K. Y. Saheed, A. S. Olaniyi, A. M. Olaolu, and A. N. Babatunde, “Development of Iris biometric template security using steganography,” Comput. Inf. Syst., vol. 22, no. 3, pp. 8–18, 2018. link.gale.com/apps/doc/A562690777/AONE?u=googlescholar&sid=googleScholar&xid=0a7f27f6




DOI: https://doi.org/10.36596/jcse.v3i2.527

Refbacks

  • There are currently no refbacks.


Journal of Computer Science and Engineering (JCSE)
ISSN 2721-0251 (online)
Published by : ICSE (Institute of Computer Sciences and Engineering)
Website : http://icsejournal.com/index.php/JCSE/
Email: jcse@icsejournal.com

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.