Skip to main content

A New Approach Based on Steganography to Face Facial Recognition Vulnerabilities Against Fake Identities

  • Conference paper
  • First Online:
Business Intelligence (CBI 2021)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 416))

Included in the following conference series:

Abstract

By the huge use of biometric identification and authentication systems, securing user’s images is one of the major recent researches topics. In this paper we aim to present a new approach which is based on detecting face in any picture (even with low quality) a detection that can goes to 93%. As a second work we aim to test the ability of this algorithm to identify people while wearing medical masks. In fact, with the spread of Covid-19, people are now obliged to wear medical masks. These masks cover almost 60% of persons faces, this lack of information can prevent the identification of the person or can create some confusions. And To secure images and prevent identity theft we propose an approach that consists of hiding a generated key in each person’s image. This unique key is based on user’s personal information, the key will be verified by Luhn algorithm, which is considered as a widely used algorithm to verify generated IDs. As a third work, we aim to hide the person’s ID in the image using a steganographic algorithm. Our work main objective is to protect pictures and prevent any attempt of creating a fake model of the owners. Therefore, the ID hidden in the picture will be destructed in every attempt of creating a fake image or model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jadhav, A., Jadhav, A., Ladhe, T., Yeolekar, K.: Automated attendance system using face recognition. Int. Res. J. Eng. Technol. (IRJET) 04(01), 1467–1471 (2017). ISSN 2395-0072

    Google Scholar 

  2. Punjani, A.A., Obaid, C., Yasir, C.: Automated attendance management system using face recognition. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 6(8), 1210–1212 (2017)

    Google Scholar 

  3. Chaudhari, C., Raj, R., Shirnath, S., Sali, T.: Automatic attendance monitoring system using face recognition techniques. Int. J. Innov. Eng. Technol. (IJIET), 10(1), 103–106 (2018)

    Google Scholar 

  4. https://github.com/ageitgey/face_recognition

  5. Kowsalya, P., Pavithra, J., Sowmiya, G., Shankar, C.K.: Attendance monitoring system using face detection & face recognition. Int. Res. J. Eng. Technol. (IRJET) 6(3), 6629–6632 (2019). ISSN 2395-0072

    Google Scholar 

  6. Mallikarjuna Reddy, A., Venkata Krishna, V., Sumalatha, L.: Face recognition based on cross diagonal complete motif matrix. Int. J. Image Graph. Signal Process. 359–66 (2018)

    Google Scholar 

  7. Kamencay, P., Benco, M., Mizdos, T., Radil, R.: A new method for face recognition using convolutional neural network. Digit. Image Process. Comput. Graph. 15(4), 663–672 (2017)

    Google Scholar 

  8. Beli, I., Guo, C.: Enhancing face identification using local binary patterns and K-nearest neighbors. J. Imaging 3(37), 1–12 (2017)

    Google Scholar 

  9. Gaikwad, A.T.: LBP and PCA based on face recognition system, pp. 368–373, November 2018

    Google Scholar 

  10. Sumathi, C.P., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 4(6), 9–25 (2013)

    Google Scholar 

  11. Juneja, M., Sandhu, P.S.: A new approach for information security using an improved steganography technique. J. Inf. Pro. Syst. 9(3), 405–424 (2013)

    Google Scholar 

  12. Shanmuga Priya, S., Mahesh, K., Kuppusamy, K.: Efficient steganography method to implement selected least significant bits in spatial domain. Int. J. Eng. Res. Appl. 2(3), 2632–2637 (2012)

    Google Scholar 

  13. Thiyagarajan, P., Natarajan, V., Aghila, G., Pranna Venkatesan, V., Anitha, R.: Pattern based 3D image steganography. In: 3D Research center, Kwangwoon University and Springer 2013, 3DR Express, pp.1–8 (2013)

    Google Scholar 

  14. Zhang, G.Q., et al.: Randomized N-Gram hashing for distributed generation of validatable unique study identifiers in multicenter research. JMIR Med. Inform. 3(4), e4959 (2015)

    Google Scholar 

  15. Olden, M., Holle, R., Heid, I.M. and Stark, K.: IDGenerator: unique identifier generator for epidemiologic or clinical studies. BMC Med. Res. Methodol. 16, 1–10 (2016). https://doi.org/10.1186/s12874-016-0222-3

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nemmaoui, S., Elhammani, S. (2021). A New Approach Based on Steganography to Face Facial Recognition Vulnerabilities Against Fake Identities. In: Fakir, M., Baslam, M., El Ayachi, R. (eds) Business Intelligence. CBI 2021. Lecture Notes in Business Information Processing, vol 416. Springer, Cham. https://doi.org/10.1007/978-3-030-76508-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-76508-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-76507-1

  • Online ISBN: 978-3-030-76508-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics