ABSTRACT
In ascertaining the authenticity of a person's identity, the techniques that utilises Biometric Technology and its vital aspects and attributes are essential in endorsing this endeavour. Transversing the years, identification through biometric means has heightened much attention with regards to its susceptibility to assaults whilst information are being transferred. Thus, there is a dire need for the development for a safeguarding means. Steganography and watermarking methods are adopted towards the enhancement of biometric information secureness. Watermarking entails the embedding of data within file that carries the data, in safeguarding intellectual property rights and copyrights that involves music, video or image files. Meanwhile, steganography entails the concealment of data. This research puts forward an all-encompassing review pertaining the latest steganography methods that has been implemented to protect the biometric fingerprints information up-to-date. This review categorizes the fingerprint system into various sections, inclusive of methods for extracting features and matching procedure.
- Abdulnabi, Mohamed, Ahmed Al-Haiqi, Miss Laiha Mat Kiah, A. A. Zaidan, B. B. Zaidan, and Muzammil Hussain. "A distributed framework for health information exchange using smartphone technologies." Journal of biomedical informatics 69 (2017): 230--250.Google ScholarDigital Library
- Awasthi, Vipul, Vanchha Awasthi, and Krishna Kumari Tiwari. "Fingerprint analysis using termination and bifurcation minutiae." International Journal of Emerging Technology and Advanced Engineering 2 (2012): 124--30.Google Scholar
- Barkadehi, Mohammadreza Hazhirpasand, Mehrbaksh Nilashi, Othman Ibrahim, Ali Zakeri Fardi, and Sarminah Samad. "Authentication systems: A literature review and classification." Telematics and Informatics 35, no. 5 (2018): 1491--1511.Google ScholarCross Ref
- Barman, Subhas, Debasis Samanta, and Samiran Chattopadhyay. "Fingerprint-based crypto-biometric system for network security." EURASIP Journal on Information Security 2015, no. 1 (2015): 3.Google ScholarCross Ref
- Chatterjee, Amit, Puneet Singh, Vimal Bhatia, and Shashi Prakash. "Ear biometrics recognition using laser biospeckled fringe projection profilometry." Optics & Laser Technology 112 (2019): 368--378.Google ScholarCross Ref
- Cheng, Kevin HM, and Ajay Kumar. "Contactless Biometric Identification using 3D Finger Knuckle Patterns." IEEE transactions on pattern analysis and machine intelligence (2019).Google Scholar
- DOMAIN, WATERMARKING TECHNIQUES IN SPATIAL. "A REVIEW AND OPEN ISSUES OF DIVERSE TEXT WATERMARKING TECHNIQUES IN SPATIAL DOMAIN." Journal of Theoretical and Applied Information Technology 96, no. 17 (2018).Google Scholar
- Garg, Mayank, Shashikant Gupta, and Pallavi Khatri. "Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm." In 2015 International Conference on Communication Networks (ICCN), pp. 246--251. IEEE, 2015.Google Scholar
- Goel, Piyush. "Data hiding in digital images: a Steganographic paradigm." Master's thesis in Computer Science and Engineering, Indian Institute of Technology Kharagpur (2008).Google Scholar
- Gupta, Himanshu, and Nupur Sharma. "A model for biometric security using visual cryptography." In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 328--332. IEEE, 2016.Google Scholar
- Gupta, Shailender, Ankur Goyal, and Bharat Bhushan. "Information hiding using least significant bit steganography and cryptography." International Journal of Modern Education and Computer Science 4, no. 6 (2012): 27Google ScholarCross Ref
- Hájek, Josef, and Martin Drahanský. "Recognition-Based on Eye Biometrics: Iris and Retina." In Biometric-Based Physical and Cybersecurity Systems, pp. 37--102. Springer, Cham, 2019.Google Scholar
- Hashim, M. M., Mustafa Sabah Taha, Azana Hafizah Mohd Aman, Aisha Hassan Abdalla Hashim, Mohd Shafry Mohd Rahim, and Shayla Islam. "Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography." In 2019 7th International Conference on Mechatronics Engineering (ICOM), pp. 1--6. IEEE, 2019.Google Scholar
- Hashim, Mohammed Mahdi, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, and Hassan Salman Hamad. "Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats." International Journal of Engineering & Technology 7, no. 4 (2018 b): 3505--3514.Google Scholar
- Hashim, Mohammed Mahdi, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, Ali A. Al-Wan, and Nilam Nur Amir Sjarif. "An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching." International Journal of Engineering & Technology 7, no. 4 (2018 c): 4008--4023.Google Scholar
- HASHIM, MOHAMMED, MOHD RAHIM, MOHD SHAFRY, and ALI ABDULRAHEEM ALWAN. "A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN." Journal of Theoretical & Applied Information Technology 96, no. 4 (2018 a).Google Scholar
- Hong, Lin, Anil Jain, Sharath Pankanti, and Ruud Bolle. "Identity authentication using fingerprints." In International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 103--110. Springer, Berlin, Heidelberg, 1997.Google Scholar
- Hussain, M. A. "Simple encryption encoding for data hiding and security applications." In The 3rd International Conference on Multimedia Technology, Published by Atlantis Press, Guangzhou, China, pp. 1621--1628. 2013.Google Scholar
- Islam, M. Nazrul, Mohammad Faysal Islam, and Kamal Shahrabi. "Enhanced information security employing orthogonal code, steganography, and joint transform correlation." In Optical Pattern Recognition XXIV, vol. 8748, p. 87480K. International Society for Optics and Photonics, 2013.Google Scholar
- Islam, M. Nazrul, Muhammad Faysal Islam, and Kamal Shahrabi. "Robust information security system using steganography, orthogonal code and joint transform correlation." Optik 126, no. 23 (2015): 4026--4031.Google ScholarCross Ref
- Jain, Anil K., Arun Ross, and Salil Prabhakar. "An introduction to biometric recognition." IEEE Transactions on circuits and systems for video technology 14, no. 1 (2004).Google Scholar
- Jaswal, Gaurav, Amit Kaul, and Ravinder Nath. "Multimodal Biometric Authentication System Using Hand Shape, Palm Print, and Hand Geometry." In Computational Intelligence: Theories, Applications and Future Directions-Volume II, pp. 557--570. Springer, Singapore, 2019.Google Scholar
- Jung, Ki-Hyun. "A high-capacity reversible data hiding scheme based on sorting and prediction in digital images." Multimedia Tools and Applications 76, no. 11 (2017): 13127--13137.Google ScholarDigital Library
- Khoo, Yik-Herng, Bok-Min Goi, Tong-Yuen Chai, Yen-Lung Lai, and Zhe Jin. "Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint." In Proceedings of the 2nd International Conference on Advances in Image Processing, pp. 6--10. ACM, 2018.Google Scholar
- Kocharyan, Davit, and Hakob Sarukhanyan. "Feature extraction techniques and minutiae-based fingerprint recognition process." The International Journal of Multimedia Technology 1, no. 1 (2001): 31--35.Google Scholar
- Li, Sheng, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, and Xinpeng Zhang. "Data hiding in Fingerprint Minutiae Template for Privacy Protection." arXiv preprint arXiv:1710.00516 (2017).Google Scholar
- Mahdi Hashim, M. O. H. A. M. M. E. D., Mohd Rahim, and Mohd Shafry. "IMAGE STEGANOGRAPHY BASED ON ODD/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION." Journal Of Theoretical & Applied Information Technology 95, no. 22 (2017).Google Scholar
- Maltoni D, Maio D, Jain AK, Prabhakar S (2009b) Handbook of fingerprint recognition, 2nd edn. Spinger-Verlag Limited, London, pp 57--95.Google ScholarDigital Library
- Mason, James Eric, Issa Traore, and Isaac Woungang. "Facets and Promises of Gait Biometric Recognition." In Biometric-Based Physical and Cybersecurity Systems, pp. 233--253. Springer, Cham, 2019.Google Scholar
- McAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of biometrics and steganography: A comprehensive review." Technologies 7, no. 2 (2019): 34.Google ScholarCross Ref
- Mehmandoust, Saeed, and Asadollah Shahbahrami. "A Comparison between Different Fingerprint Matching Techniques." In International Conference on Digital Information and Communication Technology and Its Applications, pp. 242--253. Springer, Berlin, Heidelberg, 2011.Google Scholar
- Mhenni, Abir, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. "Double serial adaptation mechanism for keystroke dynamics authentication based on a single password." Computers & Security 83 (2019): 151--166.Google ScholarCross Ref
- Misbahuddin, Mohammed, and C. S. Sreeja. "A secure image-based authentication scheme employing DNA crypto and steganography." In Proceedings of the Third International Symposium on Women in Computing and Informatics, pp. 595--601. ACM, 2015.Google Scholar
- Morales, Aythami, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. "Introduction to iris presentation attack detection." In Handbook of Biometric Anti-Spoofing, pp. 135--150. Springer, Cham, 2019.Google Scholar
- Muhammad, Khan, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, and Rashid Jalal Qureshi. "A secure cyclic steganographic technique for color images using randomization." arXiv preprint arXiv:1502.07808 (2015).Google Scholar
- Nagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "Multibiometric cryptosystems based on feature-level fusion." IEEE transactions on information forensics and security 7, no. 1 (2012): 255--268.Google Scholar
- Nosrati, Masoud. "Exact requirements engineering for developing business process models." In 2017 3th International Conference on Web Research (ICWR), pp. 140--147. IEEE, 2017.Google Scholar
- Othmani, Alice Ahlem, Sreetama Basu, Amulya Nidhi Shrivastava, Sinem Aslan, Francesco De Carli, Amesefe Delase Afua, A. S. M. Shihavuddin, and Amine Nait-Ali. "Biometrics from Cellular Imaging." In Biometrics under Biomedical Considerations, pp. 229--252. Springer, Singapore, 2019.Google Scholar
- Patel, Meghna B., Satyen M. Parikh, and Ashok R. Patel. "Performance Improvement in Preprocessing Phase of Fingerprint Recognition." In Information and Communication Technology for Intelligent Systems, pp. 521--530. Springer, Singapore, 2019.Google Scholar
- Patel, Vishal M., Nalini K. Ratha, and Rama Chellappa. "Cancelable biometrics: A review." IEEE Signal Processing Magazine 32, no. 5 (2015): 54--65.Google ScholarCross Ref
- Patra, Arpita. "Development of efficient methods for face recognition and multimodal biometry." Indian Institute Of Technology Madras (2006): 1--176.Google Scholar
- Praseetha, V. M., Ayush Dattagupta, R. Suma, and S. Vadivel. "Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining." In IOP Conference Series: Materials Science and Engineering, vol. 396, no. 1, p. 012026. IOP Publishing, 2018.Google Scholar
- Seleym, Ashraf. "A high-rate chaotic secured covert channel based on multiple embedding in images." In 2013 8th International Conference on Computer Engineering & Systems (ICCES), pp. 286--292. IEEE, 2013.Google Scholar
- Subhedar, Mansi S., and Vijay H. Mankar. "High capacity image steganography based on discrete wavelet transform and singular value decomposition." In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, p. 63. ACM, 2014.Google Scholar
- Sujatha, E., and A. Chilambuchelvan Nil. "Multimodal biometric authentication algorithm at score level fusion using hybrid optimization." Wireless Communication Technology 2, no. 1 (2018): 1.Google Scholar
- Tanwar, Sudeep, Mohammad S. Obaidat, Sudhanshu Tyagi, and Neeraj Kumar. "Online Signature-Based Biometric Recognition." In Biometric-Based Physical and Cybersecurity Systems, pp. 255--285. Springer, Cham, 2019.Google Scholar
- Tekade, Priyanka, and Priti Shende. "Enhancement of Security through Fused Multimodal Biometric System." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), pp. 1--5. IEEE, 2017.Google Scholar
- Timem, Joseph, Donald Perry, Jenny Rosenberger, and David Karpey. "Utilizing voice biometrics." U.S. Patent 9,215,321, issued December 15, 2015.Google Scholar
- Ugail, Hassan, and Ahmad Al-Dahoud. "Is gender encoded in the smile? A computational framework for the analysis of the smile driven dynamic face for gender recognition." The Visual Computer 34, no. 9 (2018): 1243--1254.Google ScholarDigital Library
- Walter, Charles, and Rose Gamble. "Gait-Based Identification Using Wearables in the Personal Fog." In Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.Google Scholar
- Whitelam, Cameron, Nnamdi Osia, and Thirimachos Bourlai. "Securing multimodal biometric data through watermarking and steganography." In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61--66. IEEE, 2013.Google Scholar
- Yang, Wencheng, Song Wang, Jiankun Hu, Guanglou Zheng, and Craig Valli. "A fingerprint and finger-vein based cancelable multi-biometric system." Pattern Recognition 78 (2018): 242--251.Google ScholarDigital Library
- Zhang, David, Guangming Lu, and Lei Zhang. "Line Scan Palmprint Recognition System." In Advanced Biometrics, pp. 235--257. Springer, Cham, 2018.Google Scholar
Index Terms
- All-encompassing Review of Biometric Information Protection in Fingerprints Based Steganography
Recommendations
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
LSB-Based Steganography Using Reflected Gray Code
Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to ...
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
Comments