Abstract
By the huge use of biometric identification and authentication systems, securing user’s images is one of the major recent researches topics. In this paper we aim to present a new approach which is based on detecting face in any picture (even with low quality) a detection that can goes to 93%. As a second work we aim to test the ability of this algorithm to identify people while wearing medical masks. In fact, with the spread of Covid-19, people are now obliged to wear medical masks. These masks cover almost 60% of persons faces, this lack of information can prevent the identification of the person or can create some confusions. And To secure images and prevent identity theft we propose an approach that consists of hiding a generated key in each person’s image. This unique key is based on user’s personal information, the key will be verified by Luhn algorithm, which is considered as a widely used algorithm to verify generated IDs. As a third work, we aim to hide the person’s ID in the image using a steganographic algorithm. Our work main objective is to protect pictures and prevent any attempt of creating a fake model of the owners. Therefore, the ID hidden in the picture will be destructed in every attempt of creating a fake image or model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jadhav, A., Jadhav, A., Ladhe, T., Yeolekar, K.: Automated attendance system using face recognition. Int. Res. J. Eng. Technol. (IRJET) 04(01), 1467–1471 (2017). ISSN 2395-0072
Punjani, A.A., Obaid, C., Yasir, C.: Automated attendance management system using face recognition. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 6(8), 1210–1212 (2017)
Chaudhari, C., Raj, R., Shirnath, S., Sali, T.: Automatic attendance monitoring system using face recognition techniques. Int. J. Innov. Eng. Technol. (IJIET), 10(1), 103–106 (2018)
Kowsalya, P., Pavithra, J., Sowmiya, G., Shankar, C.K.: Attendance monitoring system using face detection & face recognition. Int. Res. J. Eng. Technol. (IRJET) 6(3), 6629–6632 (2019). ISSN 2395-0072
Mallikarjuna Reddy, A., Venkata Krishna, V., Sumalatha, L.: Face recognition based on cross diagonal complete motif matrix. Int. J. Image Graph. Signal Process. 359–66 (2018)
Kamencay, P., Benco, M., Mizdos, T., Radil, R.: A new method for face recognition using convolutional neural network. Digit. Image Process. Comput. Graph. 15(4), 663–672 (2017)
Beli, I., Guo, C.: Enhancing face identification using local binary patterns and K-nearest neighbors. J. Imaging 3(37), 1–12 (2017)
Gaikwad, A.T.: LBP and PCA based on face recognition system, pp. 368–373, November 2018
Sumathi, C.P., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 4(6), 9–25 (2013)
Juneja, M., Sandhu, P.S.: A new approach for information security using an improved steganography technique. J. Inf. Pro. Syst. 9(3), 405–424 (2013)
Shanmuga Priya, S., Mahesh, K., Kuppusamy, K.: Efficient steganography method to implement selected least significant bits in spatial domain. Int. J. Eng. Res. Appl. 2(3), 2632–2637 (2012)
Thiyagarajan, P., Natarajan, V., Aghila, G., Pranna Venkatesan, V., Anitha, R.: Pattern based 3D image steganography. In: 3D Research center, Kwangwoon University and Springer 2013, 3DR Express, pp.1–8 (2013)
Zhang, G.Q., et al.: Randomized N-Gram hashing for distributed generation of validatable unique study identifiers in multicenter research. JMIR Med. Inform. 3(4), e4959 (2015)
Olden, M., Holle, R., Heid, I.M. and Stark, K.: IDGenerator: unique identifier generator for epidemiologic or clinical studies. BMC Med. Res. Methodol. 16, 1–10 (2016). https://doi.org/10.1186/s12874-016-0222-3
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Nemmaoui, S., Elhammani, S. (2021). A New Approach Based on Steganography to Face Facial Recognition Vulnerabilities Against Fake Identities. In: Fakir, M., Baslam, M., El Ayachi, R. (eds) Business Intelligence. CBI 2021. Lecture Notes in Business Information Processing, vol 416. Springer, Cham. https://doi.org/10.1007/978-3-030-76508-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-76508-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76507-1
Online ISBN: 978-3-030-76508-8
eBook Packages: Computer ScienceComputer Science (R0)