skip to main content
10.1145/3386164.3389079acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiscsicConference Proceedingsconference-collections
research-article

All-encompassing Review of Biometric Information Protection in Fingerprints Based Steganography

Published:06 June 2020Publication History

ABSTRACT

In ascertaining the authenticity of a person's identity, the techniques that utilises Biometric Technology and its vital aspects and attributes are essential in endorsing this endeavour. Transversing the years, identification through biometric means has heightened much attention with regards to its susceptibility to assaults whilst information are being transferred. Thus, there is a dire need for the development for a safeguarding means. Steganography and watermarking methods are adopted towards the enhancement of biometric information secureness. Watermarking entails the embedding of data within file that carries the data, in safeguarding intellectual property rights and copyrights that involves music, video or image files. Meanwhile, steganography entails the concealment of data. This research puts forward an all-encompassing review pertaining the latest steganography methods that has been implemented to protect the biometric fingerprints information up-to-date. This review categorizes the fingerprint system into various sections, inclusive of methods for extracting features and matching procedure.

References

  1. Abdulnabi, Mohamed, Ahmed Al-Haiqi, Miss Laiha Mat Kiah, A. A. Zaidan, B. B. Zaidan, and Muzammil Hussain. "A distributed framework for health information exchange using smartphone technologies." Journal of biomedical informatics 69 (2017): 230--250.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Awasthi, Vipul, Vanchha Awasthi, and Krishna Kumari Tiwari. "Fingerprint analysis using termination and bifurcation minutiae." International Journal of Emerging Technology and Advanced Engineering 2 (2012): 124--30.Google ScholarGoogle Scholar
  3. Barkadehi, Mohammadreza Hazhirpasand, Mehrbaksh Nilashi, Othman Ibrahim, Ali Zakeri Fardi, and Sarminah Samad. "Authentication systems: A literature review and classification." Telematics and Informatics 35, no. 5 (2018): 1491--1511.Google ScholarGoogle ScholarCross RefCross Ref
  4. Barman, Subhas, Debasis Samanta, and Samiran Chattopadhyay. "Fingerprint-based crypto-biometric system for network security." EURASIP Journal on Information Security 2015, no. 1 (2015): 3.Google ScholarGoogle ScholarCross RefCross Ref
  5. Chatterjee, Amit, Puneet Singh, Vimal Bhatia, and Shashi Prakash. "Ear biometrics recognition using laser biospeckled fringe projection profilometry." Optics & Laser Technology 112 (2019): 368--378.Google ScholarGoogle ScholarCross RefCross Ref
  6. Cheng, Kevin HM, and Ajay Kumar. "Contactless Biometric Identification using 3D Finger Knuckle Patterns." IEEE transactions on pattern analysis and machine intelligence (2019).Google ScholarGoogle Scholar
  7. DOMAIN, WATERMARKING TECHNIQUES IN SPATIAL. "A REVIEW AND OPEN ISSUES OF DIVERSE TEXT WATERMARKING TECHNIQUES IN SPATIAL DOMAIN." Journal of Theoretical and Applied Information Technology 96, no. 17 (2018).Google ScholarGoogle Scholar
  8. Garg, Mayank, Shashikant Gupta, and Pallavi Khatri. "Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm." In 2015 International Conference on Communication Networks (ICCN), pp. 246--251. IEEE, 2015.Google ScholarGoogle Scholar
  9. Goel, Piyush. "Data hiding in digital images: a Steganographic paradigm." Master's thesis in Computer Science and Engineering, Indian Institute of Technology Kharagpur (2008).Google ScholarGoogle Scholar
  10. Gupta, Himanshu, and Nupur Sharma. "A model for biometric security using visual cryptography." In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 328--332. IEEE, 2016.Google ScholarGoogle Scholar
  11. Gupta, Shailender, Ankur Goyal, and Bharat Bhushan. "Information hiding using least significant bit steganography and cryptography." International Journal of Modern Education and Computer Science 4, no. 6 (2012): 27Google ScholarGoogle ScholarCross RefCross Ref
  12. Hájek, Josef, and Martin Drahanský. "Recognition-Based on Eye Biometrics: Iris and Retina." In Biometric-Based Physical and Cybersecurity Systems, pp. 37--102. Springer, Cham, 2019.Google ScholarGoogle Scholar
  13. Hashim, M. M., Mustafa Sabah Taha, Azana Hafizah Mohd Aman, Aisha Hassan Abdalla Hashim, Mohd Shafry Mohd Rahim, and Shayla Islam. "Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography." In 2019 7th International Conference on Mechatronics Engineering (ICOM), pp. 1--6. IEEE, 2019.Google ScholarGoogle Scholar
  14. Hashim, Mohammed Mahdi, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, and Hassan Salman Hamad. "Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats." International Journal of Engineering & Technology 7, no. 4 (2018 b): 3505--3514.Google ScholarGoogle Scholar
  15. Hashim, Mohammed Mahdi, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, Ali A. Al-Wan, and Nilam Nur Amir Sjarif. "An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching." International Journal of Engineering & Technology 7, no. 4 (2018 c): 4008--4023.Google ScholarGoogle Scholar
  16. HASHIM, MOHAMMED, MOHD RAHIM, MOHD SHAFRY, and ALI ABDULRAHEEM ALWAN. "A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN." Journal of Theoretical & Applied Information Technology 96, no. 4 (2018 a).Google ScholarGoogle Scholar
  17. Hong, Lin, Anil Jain, Sharath Pankanti, and Ruud Bolle. "Identity authentication using fingerprints." In International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 103--110. Springer, Berlin, Heidelberg, 1997.Google ScholarGoogle Scholar
  18. Hussain, M. A. "Simple encryption encoding for data hiding and security applications." In The 3rd International Conference on Multimedia Technology, Published by Atlantis Press, Guangzhou, China, pp. 1621--1628. 2013.Google ScholarGoogle Scholar
  19. Islam, M. Nazrul, Mohammad Faysal Islam, and Kamal Shahrabi. "Enhanced information security employing orthogonal code, steganography, and joint transform correlation." In Optical Pattern Recognition XXIV, vol. 8748, p. 87480K. International Society for Optics and Photonics, 2013.Google ScholarGoogle Scholar
  20. Islam, M. Nazrul, Muhammad Faysal Islam, and Kamal Shahrabi. "Robust information security system using steganography, orthogonal code and joint transform correlation." Optik 126, no. 23 (2015): 4026--4031.Google ScholarGoogle ScholarCross RefCross Ref
  21. Jain, Anil K., Arun Ross, and Salil Prabhakar. "An introduction to biometric recognition." IEEE Transactions on circuits and systems for video technology 14, no. 1 (2004).Google ScholarGoogle Scholar
  22. Jaswal, Gaurav, Amit Kaul, and Ravinder Nath. "Multimodal Biometric Authentication System Using Hand Shape, Palm Print, and Hand Geometry." In Computational Intelligence: Theories, Applications and Future Directions-Volume II, pp. 557--570. Springer, Singapore, 2019.Google ScholarGoogle Scholar
  23. Jung, Ki-Hyun. "A high-capacity reversible data hiding scheme based on sorting and prediction in digital images." Multimedia Tools and Applications 76, no. 11 (2017): 13127--13137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Khoo, Yik-Herng, Bok-Min Goi, Tong-Yuen Chai, Yen-Lung Lai, and Zhe Jin. "Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint." In Proceedings of the 2nd International Conference on Advances in Image Processing, pp. 6--10. ACM, 2018.Google ScholarGoogle Scholar
  25. Kocharyan, Davit, and Hakob Sarukhanyan. "Feature extraction techniques and minutiae-based fingerprint recognition process." The International Journal of Multimedia Technology 1, no. 1 (2001): 31--35.Google ScholarGoogle Scholar
  26. Li, Sheng, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, and Xinpeng Zhang. "Data hiding in Fingerprint Minutiae Template for Privacy Protection." arXiv preprint arXiv:1710.00516 (2017).Google ScholarGoogle Scholar
  27. Mahdi Hashim, M. O. H. A. M. M. E. D., Mohd Rahim, and Mohd Shafry. "IMAGE STEGANOGRAPHY BASED ON ODD/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION." Journal Of Theoretical & Applied Information Technology 95, no. 22 (2017).Google ScholarGoogle Scholar
  28. Maltoni D, Maio D, Jain AK, Prabhakar S (2009b) Handbook of fingerprint recognition, 2nd edn. Spinger-Verlag Limited, London, pp 57--95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mason, James Eric, Issa Traore, and Isaac Woungang. "Facets and Promises of Gait Biometric Recognition." In Biometric-Based Physical and Cybersecurity Systems, pp. 233--253. Springer, Cham, 2019.Google ScholarGoogle Scholar
  30. McAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of biometrics and steganography: A comprehensive review." Technologies 7, no. 2 (2019): 34.Google ScholarGoogle ScholarCross RefCross Ref
  31. Mehmandoust, Saeed, and Asadollah Shahbahrami. "A Comparison between Different Fingerprint Matching Techniques." In International Conference on Digital Information and Communication Technology and Its Applications, pp. 242--253. Springer, Berlin, Heidelberg, 2011.Google ScholarGoogle Scholar
  32. Mhenni, Abir, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. "Double serial adaptation mechanism for keystroke dynamics authentication based on a single password." Computers & Security 83 (2019): 151--166.Google ScholarGoogle ScholarCross RefCross Ref
  33. Misbahuddin, Mohammed, and C. S. Sreeja. "A secure image-based authentication scheme employing DNA crypto and steganography." In Proceedings of the Third International Symposium on Women in Computing and Informatics, pp. 595--601. ACM, 2015.Google ScholarGoogle Scholar
  34. Morales, Aythami, Julian Fierrez, Javier Galbally, and Marta Gomez-Barrero. "Introduction to iris presentation attack detection." In Handbook of Biometric Anti-Spoofing, pp. 135--150. Springer, Cham, 2019.Google ScholarGoogle Scholar
  35. Muhammad, Khan, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, and Rashid Jalal Qureshi. "A secure cyclic steganographic technique for color images using randomization." arXiv preprint arXiv:1502.07808 (2015).Google ScholarGoogle Scholar
  36. Nagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "Multibiometric cryptosystems based on feature-level fusion." IEEE transactions on information forensics and security 7, no. 1 (2012): 255--268.Google ScholarGoogle Scholar
  37. Nosrati, Masoud. "Exact requirements engineering for developing business process models." In 2017 3th International Conference on Web Research (ICWR), pp. 140--147. IEEE, 2017.Google ScholarGoogle Scholar
  38. Othmani, Alice Ahlem, Sreetama Basu, Amulya Nidhi Shrivastava, Sinem Aslan, Francesco De Carli, Amesefe Delase Afua, A. S. M. Shihavuddin, and Amine Nait-Ali. "Biometrics from Cellular Imaging." In Biometrics under Biomedical Considerations, pp. 229--252. Springer, Singapore, 2019.Google ScholarGoogle Scholar
  39. Patel, Meghna B., Satyen M. Parikh, and Ashok R. Patel. "Performance Improvement in Preprocessing Phase of Fingerprint Recognition." In Information and Communication Technology for Intelligent Systems, pp. 521--530. Springer, Singapore, 2019.Google ScholarGoogle Scholar
  40. Patel, Vishal M., Nalini K. Ratha, and Rama Chellappa. "Cancelable biometrics: A review." IEEE Signal Processing Magazine 32, no. 5 (2015): 54--65.Google ScholarGoogle ScholarCross RefCross Ref
  41. Patra, Arpita. "Development of efficient methods for face recognition and multimodal biometry." Indian Institute Of Technology Madras (2006): 1--176.Google ScholarGoogle Scholar
  42. Praseetha, V. M., Ayush Dattagupta, R. Suma, and S. Vadivel. "Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining." In IOP Conference Series: Materials Science and Engineering, vol. 396, no. 1, p. 012026. IOP Publishing, 2018.Google ScholarGoogle Scholar
  43. Seleym, Ashraf. "A high-rate chaotic secured covert channel based on multiple embedding in images." In 2013 8th International Conference on Computer Engineering & Systems (ICCES), pp. 286--292. IEEE, 2013.Google ScholarGoogle Scholar
  44. Subhedar, Mansi S., and Vijay H. Mankar. "High capacity image steganography based on discrete wavelet transform and singular value decomposition." In Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, p. 63. ACM, 2014.Google ScholarGoogle Scholar
  45. Sujatha, E., and A. Chilambuchelvan Nil. "Multimodal biometric authentication algorithm at score level fusion using hybrid optimization." Wireless Communication Technology 2, no. 1 (2018): 1.Google ScholarGoogle Scholar
  46. Tanwar, Sudeep, Mohammad S. Obaidat, Sudhanshu Tyagi, and Neeraj Kumar. "Online Signature-Based Biometric Recognition." In Biometric-Based Physical and Cybersecurity Systems, pp. 255--285. Springer, Cham, 2019.Google ScholarGoogle Scholar
  47. Tekade, Priyanka, and Priti Shende. "Enhancement of Security through Fused Multimodal Biometric System." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), pp. 1--5. IEEE, 2017.Google ScholarGoogle Scholar
  48. Timem, Joseph, Donald Perry, Jenny Rosenberger, and David Karpey. "Utilizing voice biometrics." U.S. Patent 9,215,321, issued December 15, 2015.Google ScholarGoogle Scholar
  49. Ugail, Hassan, and Ahmad Al-Dahoud. "Is gender encoded in the smile? A computational framework for the analysis of the smile driven dynamic face for gender recognition." The Visual Computer 34, no. 9 (2018): 1243--1254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Walter, Charles, and Rose Gamble. "Gait-Based Identification Using Wearables in the Personal Fog." In Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.Google ScholarGoogle Scholar
  51. Whitelam, Cameron, Nnamdi Osia, and Thirimachos Bourlai. "Securing multimodal biometric data through watermarking and steganography." In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61--66. IEEE, 2013.Google ScholarGoogle Scholar
  52. Yang, Wencheng, Song Wang, Jiankun Hu, Guanglou Zheng, and Craig Valli. "A fingerprint and finger-vein based cancelable multi-biometric system." Pattern Recognition 78 (2018): 242--251.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Zhang, David, Guangming Lu, and Lei Zhang. "Line Scan Palmprint Recognition System." In Advanced Biometrics, pp. 235--257. Springer, Cham, 2018.Google ScholarGoogle Scholar

Index Terms

  1. All-encompassing Review of Biometric Information Protection in Fingerprints Based Steganography

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ISCSIC 2019: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control
      September 2019
      397 pages
      ISBN:9781450376617
      DOI:10.1145/3386164

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 June 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      ISCSIC 2019 Paper Acceptance Rate77of152submissions,51%Overall Acceptance Rate192of401submissions,48%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader