Skip to main content
Log in

A safe and secured iris template using steganography and cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This study combines Cryptography (Twofish and Triple data decryption (3DES)) algorithms and Steganography (Least Significant Bits) to solve the problem of attacking or hacking biometric template for a malicious act, which has become a huge problem in the iris recognition system. Twofish and Triple data encryption are good and secured cryptography algorithms which are used to change readable secret data (plain image) into an unreadable format (cipher image) while least significant bits (LSB) is a steganography algorithm which embeds ciphertext/image directly into a cover image to produce an image known as stego image. In this work, Hough transform, Daugman rubber-sheet model and Log Gabor filter were used for iris image segmentation, normalization and feature extraction and the iris template generated was encrypted using 3DES and Twofish algorithms. The cipher image was then embedded into a cover image to produce stego image using LSB. The result of this work slightly changes the master file after embedding the secret image (stego file) that cannot be identified by the physical eyes and only a JPEG image was used as the master or cover file. The two levels of security technique provide high embedded capacity and eminence stego images that will able to withstand attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Anuja JS, Praveen K, Amritha PP (2019) A survey of Iris template security aspects. International Journal of Pure and Applied Mathematics 119(15):1471–1481

    Google Scholar 

  2. Canuto AM, Pintro F, Xavier-Junior JC (2013) Investigating fusion approaches in multi-biometric cancellable recognition. Expert Syst Appl 40(6):1971–1980

    Article  Google Scholar 

  3. Chai TY, Goi BM, Tay YH, Jin Z (2019) A new design for alignment-free chaffed cancelable Iris key binding scheme. Symmetry 11(2):164

    Article  Google Scholar 

  4. Chaudhary S, Nath R (2015) A new template protection approach for Iris recognition, 4th international conference on reliability. Inf Technol Opt

  5. Rudresh D, Somnath D (2019) A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification. Appl Intell 49(3):1016–1035

  6. Emanuele M, Patrizio C, Alessandro N (2014) Iris template protection using a digital modulation paradigm. Int Conf Acoustic Speech Signal Process 3759–3763

  7. Grover D, Devi K, Gupta P (2016) A Two_Fold security approach an Iris template. International Journal of Pharmacy and Technology 8(3):19094–19103

    Google Scholar 

  8. Kayode SY, Olaniyi AS, Olaolu AM, Babatunde AN (2018) Development of Iris biometric template security using steganography. Comput Inf Syst 22(3)

  9. Kelkboom EJC, Zhou X, Breebaart J, Veldhuis RNJ, Busch C (2009) Multialgorithm fusion with template protection. In: 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems. pp 1–8

  10. Kumar MM, Prasad MV, Raju USN (2018) Iris template protection using discrete logarithm. In proceedings of the 2018 2nd international conference on biometric engineering and applications (pp 43–49). ACM

  11. Li S, Chen X, Wang Z, Qian Z, Zhang X (2018) Data hiding in Iris image for privacy protection. IETE technical review 35(sup 1):34–41

    Article  Google Scholar 

  12. Li SZ, Jain AK (2009) Encyclopedia of biometrics, vol. 1. Springer Science & Business Media

  13. Maček N, Adamović S, Milosavljević M, Jovanović M, Gnjatović M, Trenkić B (2019) Mobile banking authentication based on cryptographically secured Iris biometrics. Acta Polytechnica Hungarica 16(1)

  14. Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100

    Article  Google Scholar 

  15. Ouda O, Tsumura N, Nakaguchi T (2010) Tokenless cancelable biometrics scheme for protecting iris codes. In 2010 20th international conference on pattern recognition (pp 882–885). IEEE

  16. Radman A, Jumari K, Zainal N (2013) Fast and reliable iris segmentation algorithm. IET Image Process 7(1):42–49

    Article  Google Scholar 

  17. Rathgeb C, Tams B, Wagner J, Busch C (2016) Unlinkable improved multi-biometric iris fuzzy vault. EURASIP J Inf Secur 2016(1):26

    Article  Google Scholar 

  18. Rathgeb C, Uhl A (2011) The state-of-the-art in iris biometric cryptosystems. State of the art in Biometrics 179–202

  19. Revenkar PS, Anjum A, Gandhare W (2010) Secure Iris authentication using visual cryptography. International Journal of Computer Science and Information Security 7(3):217–221

    Google Scholar 

  20. Sadhya D, Singh SK (2018) Construction of a bayesian decision theory-based secure multimodal fusion framework for soft biometric traits. IET Biometrics 7(3):251–259

    Article  Google Scholar 

  21. Taha MS, Rahim MSM, Lafta SA, Hashim MM, Alzuabidi HM (2019) Combination of steganography and cryptography: a short survey. In IOP conference series: materials science and engineering (Vol 518, no 5, p 052003). IOP publishing

  22. Thanki R et al (2015) Multibiometric template security using CS theory – SVD based fragile watermarking technique. WSEAS Trans Inf Sci Appl 12(1):1–10

    Google Scholar 

  23. Yang W, Wang S, Hu J, Ibrahim A, Zheng G, Macedo MJ, Johnstone MN, Valli C (2019) A cancelable iris-and steganography-based user authentication system for the internet of things. Sensors 19(13):2985

    Article  Google Scholar 

  24. Zaheera ZA, Mazani M, Abdul SS (2011) A new model of securing Iris authentication using steganography, conference on Communications in Computer and Information Science, part I. CCIS 179:547–554

    Google Scholar 

  25. Zhao D, Fang S, Xiang J, Tian J, Xiong S (2018) Iris template protection based on local ranking. Security and Communication Networks 2018. https://doi.org/10.1155/2018/4519548

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roseline Oluwaseun Ogundokun.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abikoye, O.C., Ojo, U.A., Awotunde, J.B. et al. A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79, 23483–23506 (2020). https://doi.org/10.1007/s11042-020-08971-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08971-x

Keywords

Navigation