Defending Biometric Templates by Multilevel Authentication using BioCryptography and Steganography Techniques
T. Leena Premakumari, Dr. S. Arul Jothi "Defending Biometric Templates by Multilevel Authentication using BioCryptography and Steganography Techniques". International Journal of Computer Trends and Technology (IJCTT) V36(1):43-47, June 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Defending information against some
intruders is a most demanding task in our computer
world. Now a day’s information sharing and
transferring are the common task performed over
the network. In this paper we are defending the
biometric templates from the malicious users.
Biometric templates may be modified by attacker.
Here we are using steganography techniques and
biocryptography techniques as a multilevel
authentication. Biometric is a method of identifying
a person or verifying the identity of a person based
on physiological or behavioral characteristics such
as knuckles, skin, nail etc. The biometric system
offers a greater security when compared to the
password authentication or token based system.
Biometric templates are acquired from the subject as
a raw biometric data and we are extracting a feature
from the data and compare the feature set against
the template stored in the database in order to
identify the person. And at the same time it is
possible for the intruders to identify or access the
data from the database where the data is stored as
the biometric data. So defending the data is the
major concern for that we are using the following
techniques such as steganography and
biocryptography. In biocryptography we can defend
the important data from the hackers. Cryptography
provides the means to further protect Biometric
Templates at these critical junctures. It is the science
of scrambling information and data which is transit
across a network medium, and then descrambling it
at the receiving end into a decipherable format. That
way, if the scrambled information and data were to
be intercepted by a third party, there is not much
which can be done unless they possess the keys for
descrambling the information. These concepts of
scrambling and descrambling can be very easily
applied to biometrics. This is known as “Bio-
Cryptography”. The next level of protection is by
using the steganography which is one of the major
techniques used for secret communication.
“Steganography is an art of sending secret messages
over public channel in such a way that only the
intended recipient knows about the existence of the
message” and it is a skill as science of hiding a top
secret communication in a cover media such as
image, text, signal or sound in such manner that
nobody, apart from the deliberate recipient knows
the existence of the data In other words, the
biometric templates are protected by scrambling and
descrambling keys while they are stored in the
database, or in movement across a network.
References
[1] K. S. Sandha, “Performance Evaluation of Symmetric
Cryptography Algorithms,” International Journal of
Electronics and Communication Technology, vol. 2, Sep.
2011.
[2] D. Das, J. Nath, M. Mukherjee, N. Chaudhury and A.
Nath, ”An Integrated symmetric key cryptography
algorithm using generalized vernam cipher method and
DJSA method: DJMNA symmetric key algorithm”,
Proceedings of IEEE conference WICT-2011 held at
Mumbai University, Dec. 2011.
[3] J. Nath. et. al. ”Symmetric key Cryptography using twoway
updated -Generalized Vernam Cipher method: TTSJA
algorithm”, IJCA, Vol. 42, Mar. 2012.
[4] D. Chatterjee, J. Nath, S. Das, S. Agarwal and A. Nath,
“Symmetric key Cryptography using modified DJSSA
symmetric key algorithm”, Proceedings of International
conference Worldcomp 2011 held at Las Vegas, USA, July
2011.
[5] Ismail Avc?bas, Nasir Memon, and Bülent Sankur,
“Steganalysis Using Image Quality Metrics”, IEEE
Transactions On Image Processing, vol. 12, Feb. 2003.
[6] Ajay.B.Gadicha, “Audio Wave Steganography”,
International Journal of Soft Computing and Engineering
(IJSCE), vol. 1, Nov. 2011.
[7] Pratap Chnadra Mandal, “Superiority of Blowfish
Algorithm,” International Journal Of Advanced Research
in Computers Science and Software Engineering , vol. 2,
Sep. 2012.
[8] J. Daemen and V. Rijmen, “Rijndael: The Advanced
Encryption Standard", Dr. Dobb`s Journal, Mar. 2001.
[9] M. Sreerama Murty, D. Veeraiah, and A. Srinivas Rao,
“Digital Signature and Watermark Methods For Image
Authentication using Cryptography Analysis,” Signal &
Image Processing : An International Journal, vol. 2, pp.
170–179, Jun. 2011.
[10] J.S. LeenaJasmine, L. Prabha, “An Efficient Secure Image
Watermarking Using Wavelet Transform”, International
Journal of Computer Trends and Technology, vol. 17,
pp. 133–137, Nov. 2014.
[11] G.Shyamala, I.Jasmine Selvakumari Jeya and M.Revathi,
“Secure and Reliable Watermarking in Relational
Databases”, International Journal of Computer Trends
and Technology, vol. 11, pp. 13–18, May. 2014.
Keywords
Steganography, Biocryptography,
biometric templates, keys, Intruders, hackers.