Abstract
This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.
Similar content being viewed by others
References
Anuja JS, Praveen K, Amritha PP (2019) A survey of Iris template security aspects. International Journal of Pure and Applied Mathematics 119(15):1471–1481
Canuto AM, Pintro F, Xavier-Junior JC (2013) Investigating fusion approaches in multi-biometric cancellable recognition. Expert Syst Appl 40(6):1971–1980
Chai TY, Goi BM, Tay YH, Jin Z (2019) A new design for alignment-free chaffed cancelable Iris key binding scheme. Symmetry 11(2):164
Chaudhary S, Nath R (2015) A new template protection approach for Iris recognition, 4th international conference on reliability. Inf Technol Opt
Rudresh D, Somnath D (2019) A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification. Appl Intell 49(3):1016–1035
Emanuele M, Patrizio C, Alessandro N (2014) Iris template protection using a digital modulation paradigm. Int Conf Acoustic Speech Signal Process 3759–3763
Grover D, Devi K, Gupta P (2016) A Two_Fold security approach an Iris template. International Journal of Pharmacy and Technology 8(3):19094–19103
Kayode SY, Olaniyi AS, Olaolu AM, Babatunde AN (2018) Development of Iris biometric template security using steganography. Comput Inf Syst 22(3)
Kelkboom EJC, Zhou X, Breebaart J, Veldhuis RNJ, Busch C (2009) Multialgorithm fusion with template protection. In: 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems. pp 1–8
Kumar MM, Prasad MV, Raju USN (2018) Iris template protection using discrete logarithm. In proceedings of the 2018 2nd international conference on biometric engineering and applications (pp 43–49). ACM
Li S, Chen X, Wang Z, Qian Z, Zhang X (2018) Data hiding in Iris image for privacy protection. IETE technical review 35(sup 1):34–41
Li SZ, Jain AK (2009) Encyclopedia of biometrics, vol. 1. Springer Science & Business Media
Maček N, Adamović S, Milosavljević M, Jovanović M, Gnjatović M, Trenkić B (2019) Mobile banking authentication based on cryptographically secured Iris biometrics. Acta Polytechnica Hungarica 16(1)
Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100
Ouda O, Tsumura N, Nakaguchi T (2010) Tokenless cancelable biometrics scheme for protecting iris codes. In 2010 20th international conference on pattern recognition (pp 882–885). IEEE
Radman A, Jumari K, Zainal N (2013) Fast and reliable iris segmentation algorithm. IET Image Process 7(1):42–49
Rathgeb C, Tams B, Wagner J, Busch C (2016) Unlinkable improved multi-biometric iris fuzzy vault. EURASIP J Inf Secur 2016(1):26
Rathgeb C, Uhl A (2011) The state-of-the-art in iris biometric cryptosystems. State of the art in Biometrics 179–202
Revenkar PS, Anjum A, Gandhare W (2010) Secure Iris authentication using visual cryptography. International Journal of Computer Science and Information Security 7(3):217–221
Sadhya D, Singh SK (2018) Construction of a bayesian decision theory-based secure multimodal fusion framework for soft biometric traits. IET Biometrics 7(3):251–259
Taha MS, Rahim MSM, Lafta SA, Hashim MM, Alzuabidi HM (2019) Combination of steganography and cryptography: a short survey. In IOP conference series: materials science and engineering (Vol 518, no 5, p 052003). IOP publishing
Thanki R et al (2015) Multibiometric template security using CS theory – SVD based fragile watermarking technique. WSEAS Trans Inf Sci Appl 12(1):1–10
Yang W, Wang S, Hu J, Ibrahim A, Zheng G, Macedo MJ, Johnstone MN, Valli C (2019) A cancelable iris-and steganography-based user authentication system for the internet of things. Sensors 19(13):2985
Zaheera ZA, Mazani M, Abdul SS (2011) A new model of securing Iris authentication using steganography, conference on Communications in Computer and Information Science, part I. CCIS 179:547–554
Zhao D, Fang S, Xiang J, Tian J, Xiong S (2018) Iris template protection based on local ranking. Security and Communication Networks 2018. https://doi.org/10.1155/2018/4519548
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Abikoye, O.C., Ojo, U.A., Awotunde, J.B. et al. A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79, 23483–23506 (2020). https://doi.org/10.1007/s11042-020-08971-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08971-x