• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (2), 2013
  3. 100-112
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 100-112
crossmark

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
Research Article

Bio-hiding for Smart Swipe Card: A Secret Security

Rengarajan Amirtharajan, G. Aishwarya, M. Sai Krishna Karthik, V. Thanikaiselvan and J.B.B. Rayappan

ABSTRACT


To ensure secrecy in communication, especially if it is through image or any other digital file, attention should be paid on the tool concerned in transferring the file. It may entail intricate algorithms and cryptic measures. But the query here is how far it is multifarious? How thorny is it for the impostor to haul out the masked data? If these questions are genuinely answered by one, without doubt the algorithm is a rock. Here presented one such scheme which, of course, answers the above, ensures defence at three levels namely cryptography, steganography and fingerprinting. The first one involves encryption of text, steganography deals with burying the stealthy information, finally, fingerprinting, in general, toting up fingerprints to an entity or recognizing those which are previously inherent to a item. The efficacy is tested by the delineated image aspects. Additionally, this method can be put into action easily and bulky size of secret data can be passed on.
PDF Abstract XML References Citation
Received: April 29, 2013;   Accepted: May 16, 2013;   Published: August 01, 2013

How to cite this article

Rengarajan Amirtharajan, G. Aishwarya, M. Sai Krishna Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for Smart Swipe Card: A Secret Security. Research Journal of Information Technology, 5: 100-112.

URL: https://scialert.net/abstract/?doi=rjit.2013.100.112

Search


INTRODUCTION


Authentication using biometric involves obtaining physical traits from an individual like finger marks, iris, facial, voice and retinal models, written monikers etc., for certifying an individual’s identity via processing images. Important here is mentioning that characteristics obtained are unique to an individual and remain so in his life time. Finger-print based biometric authentication system has in this regard evolved as one of the oldest and most mature system due to the unique and reliable finger-print of a person and successfully implemented in many varied applications (Cheddad et al., 2008). The fingerprints analysis in favour of harmonizing intention usually involves likening of quite a few traits in the feature prototype. They comprise models, having amassed features like crumples (raised skin), furrows (lowered skin) and minutia points, which are distinctive traits that create inside such moulds. Indeed it becomes crucial of having knowledge on construction plus assets belonging to individual with the intention of effectively utilizing a number of technologies in imaging. First and foremost Minutia characteristics in finger mark creases: ridge ending, bifurcation, along with short ridge (or dot). Bifurcation is nothing but the point where a solitary ridge segments to two crinkles. Details and trivia remain incredibly imperative to examine fingerprint because no two finger marks are alike.

Two factors come into play for deciding the suitably of finger-print based biometrics than others. These are space complexity and time complexity (Brindha and Vennila, 2011). A bare minimum sized fingerprint stencil has size of bytes more than a few hundred where customary smart-cards possess nonvolatilizable memory of 8K up to 16K approximately. Hence, place intricacy is not a chief crisis for as latter is able to hoard whole finger mark templet. In case of period complication, its processor should be gifted of accomplishing an intact fingerprint toning algorithm instantaneously.

The main aim of this paper is to hide the fingerprint in the person’s photo which can be later printed on his/her Smart card or ID card for identification as well as authentication purpose. In addition, this work mainly focused on the software implementation of hiding the fingerprint in the image for authentication purpose (Yang et al., 2007). To enhance security, prior to embedding, the fingerprint is encrypted (Salem et al., 2011) and then embedded (Amirtharajan and Rayappan, 2012a; b ; c ; d). The fingerprint will be encrypted using an encryption algorithm which will be later discussed. Then the encrypted bits get rooted in covers through Scattered (LSB) embedding. Rather than infixing covert bits in linear fashion as in casual LSB substitution method (Chan and Cheng, 2004), here it is done so in a unique non-linear fashion based on a PRNG which gets generated according to covers’ size.

Cryptography (Schneier, 2007), Steganography (Stefan and Fabin, 2000; Thenmozhi et al., 2012; Zhu et al., 2011; Zhao and Luo, 2012) and Biometrics are blend together to implement a smart Identity Card (ID card) by hiding the fingerprint in the person’s photo which can be later printed on his/her Smart card or ID card for identification as well as authentication purpose. Thus the stored/hidden biometric template (finger print) can be compared with the live template for authentication purpose and the photo is an indication for his/her identity. Steganography (Cheddad et al., 2010), watermarking (Abdulfetah et al., 2010; Zeki et al., 2011) and Cryptography (Salem et al., 2011; Zaidan et al., 2010) play a vital role in providing security (Hmood et al., 2010a, b; Rajagopalan et al., 2012).

Steganography can be broadly classified into spatial (Luo et al., 2011; Mohammad et al., 2011) and frequency domain (Amirtharajan and Rayappan, 2012d; Provos and Honeyman, 2003; Thanikaiselvan et al., 2011a). Another classification is based on the cover object (Bender et al., 1996) like text (Al-Azawi and Fadhil, 2010; Xiang et al., 2011), video (Al-Frajat et al., 2010), audio (Zhu et al., 2011) or in an image (Gutub, 2010; Amirtharajan et al., 2012; Janakiraman et al., 2012a, b; Padmaa et al., 2011; Zaidan et al., 2010; Zanganeh and Ibrahim, 2011; Thanikaiselvan et al., 2011b). In this study, an optimistic effort has been taken to encrypt the finger print through ingenious symmetric key crypto system, later embedded in the photo to build smart ID cards.

Some useful cryptographic system: Since a Simple XOR Cipher with a single key can easily be guessed by the intruders, we have implemented a three key Cryptographic algorithm. The Encryption and Decryption algorithms will be discussed in this section.

Encryption algorithm: Figure 1 shows the encryption algorithm with 3 keys. It consists of 3 different keys say 1, 2 and 3. The first one will be the user defined key i.e., the user has to enter the key he wants to use for encrypting the fingerprint image (INPUT). The other two keys key 2 and key 3 will be the 1-bit left rotated versions of the previous ones. That means key 2 will be the 1-bit left rotated version of key 3 and soon as shown in the above figure.

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 1: Encryption algorithm with 3 different keys

As per the Figure, the fingerprint image will be first XORed with key 1 and the output of the first XOR Cipher will be again XORed with key 2 and soon. The resulting output will be the encrypted image which was XORed three times using a set of 3 different keys. This is about the encryption algorithm used for encrypting the fingerprint image.

Algorithm: Fingerprint encrypting procedure
Image for - Bio-hiding for Smart Swipe Card: A Secret Security

Decryption algorithm: The decryption algorithm will be the same as that of the encryption algorithm which we have discussed earlier but in the reverse order as shown in the Fig. 1. The encrypted fingerprint image will be the input to the decryption algorithm and the keys are given in the reverse order.

The same procedure will be repeated for the decryption algorithm but the only change is that here the input to the first XOR cipher will be the encrypted fingerprint image and the key to it will be key 3. The same procedure is repeated as shown in Fig. 1 and the resulting output will be the original fingerprint image.

Algorithm: Fingerprint decrypting procedure
Image for - Bio-hiding for Smart Swipe Card: A Secret Security

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 2: Decryption algorithm with 3 different keys

PROPOSED METHOD

LSB is a simplest plus effective technique in data embedding technique. It directly embeds the secret bits in LSB of cover image. Even it introduces distortion when the embedded bits are more than three. This classical paradigm buries the data within cover via., engaging the bit stream of the message to substitute that of the cover’s LSB sequentially. Image steganography intends for preserving numerical traits of congregating image in order to withstand or foil steganalysis. Nevertheless, LSB routines pioneer a little deformation in geometric properties of carrier signal or image to vindicate manoeuvring by means of steganalysis runs. To facilitate this susceptibility, a modus operandi as shown in Fig. 3 which performs scattered LSB embedding in addition to preservation of cover images’ histogram is proposed.

In this technique, the secret is going to be embedded in a non-linear fashion based on Pseudo Random Sequence Generation (PRNG) contrary to the classical LSB steganography, where the confidential data is embedded inside a carrier file in a linear fashion. The pseudo random number is generated depending upon the size of the carrier. This process will be same as that of the classical LSB substitution method but the secret will be embedded in the pixels as decided by the pseudo random number. This pseudo random number must be produced during the extraction process.

As discussed earlier, the main aim of this study is to hide the fingerprint of a person in his/her own photo. For embedding the fingerprint in the cover image, a new Steganographic technique Scattered LSB embedding has been proposed.

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 3: Block diagram of proposed method

This model suggests a method, where the surreptitious information gets rooted in the non-linear fashion as discussed above. As an improvement, prior to embedding, the bits are encrypted and then embedded.

ENCRYPTION AND DATA HIDING

Algorithm: Embedding process
Image for - Bio-hiding for Smart Swipe Card: A Secret Security

Algorithm: Extracting/retrieving process
Image for - Bio-hiding for Smart Swipe Card: A Secret Security

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 4: Flowchart illustrating the embedding process along with encryption block

Obtained fingerprint output from retrieval process and the original fingerprint can be compared later:

• Flow charts
• Embedding process
• Extracting/retrieving process

The final result will be the stego image containing the encrypted fingerprint image in the cover image. This stego image can later be printed on ID cards or Smart card for authentication as well as identification purpose. The encrypted fingerprint image is retrieved back using this defined extracting process and decrypted using decryption algorithm. Then the decrypted fingerprint image can be compared with the original fingerprint image.

RESULTS AND DISCUSSION


To execute the algorithm four different fingerprints are taken which are of unique dimensions as shown in Fig. 6. These four are encrypted using four keys. The encryption keys are defined as 68, 89, 142, 222. The encrypted fingerprints are represented in Fig. 7 which w ill be embedded in the covers.

Four 256x256 gray images are chosen as cover as shown in Fig. 8. The embedded results (stego images) are shown for k = 1, 2, 3, 4 bit embedding are given in Fig. 9, 10, 11 and 12, respectively. One cannot visualize the artifacts as the stego result is very much closer to the cover.

At the same time, if we see the recovery part, though it is not a cake walk, we have presented the extracted results and finally decrypted fingerprints. One can go for more complex procedures that may include other faces of mathematics, encryption, steganography and advanced computing:

• For K = 1 bit embedding
• For K = 2 bit embedding
• For K = 3 bit embedding
• For K = 4 bit embedding

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 5: Flowchart illustrating the extracting process along with the decryption block

Table 1: MSE and PSNR values of random embedding
Image for - Bio-hiding for Smart Swipe Card: A Secret Security

MSE and PSNR values for each image: The tabulated result confirms that, if amount of bits in embedding gets increased, Mean Square Error is increasing resulting in decreasing PSNR values as in Table 1. If we compare the MSE and PSNR values of the four taken covers, it is observed that PSNR for student 1 is relatively high.

Indeed it points out that, of all the four, the first image has high imperceptibility. It escapes human perception and free from visual artifacts. Thus stego and original cover remain the same thus making it a tricky task for the invader.

Extracted images from the stego images: Recovery process is done through by the same keys used for encryption and the results are displayed in Fig. 13 and 14.

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 6(a-d): Fingerprint images (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 7(a-d): Encrypted fingerprint images (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 8(a-d): Cover images (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 9(a-d): Stego images for K = 1 bit, (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 10(a-d): Stego images for K = 2 bit, (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 11(a-d): Stego images for K = 3 bit, (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 12(a-d): Stego images for K = 4 bit, (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 13(a-d): Extracted images from the stego images (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

Image for - Bio-hiding for Smart Swipe Card: A Secret Security
Fig. 14(a-d): Decrypted fingerprint images after extraction (a) Student 1, (b) Student 2, (c) Student 3 and (d) Student 4

The fingerprint images of four students are taken and are encrypted using the encryption algorithm as specified earlier with the keys as the last three digits for the register numbers. The encrypted fingerprint images are embedded in their pictures using the scattered LSB Steganographic Technique. As opposed to rooting secret bits in hosting image in linear fashion as in casual LSB substitution method, this methodology embeds encrypted data bits within the cover in some non-linear fashion based on a pseudo random sequence generation. It is so generated according to cover files’ range; lying upon this PRNG, bits for embedding inside pixels of cover file is decided.

The final output will be result will be the stego image containing the encrypted fingerprint image in the cover image. This stego image can later be printed on ID cards or Smart card for authentication as well as identification purpose. The encrypted fingerprint image gets retrieved back as of the stego output image using extracting formula and decrypted using decryption algorithm. Then the decrypted fingerprint image can be compared with the original fingerprint image.

CONCLUSION


In this study, the available Cryptographic and Steganographic techniques to hide the fingerprint (Brindha and Vennila, 2011; Chan and Cheng, 2004) of a person in his/her own image and this can later be printed on ID cards or Smart card for authentication as well as identification purpose. From the printed stego image, the fingerprint can be retrieved back and can be compared with the live fingerprint. Thus the two techniques namely encryption and PRNG based embedding are used in LSB embedding to enhance its security (Yang et al., 2007; Hmood et al., 2010b). The experimental values of MSE and PSNR for each case are given in the results.

REFERENCES


  1. Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2008. Biometric inspired digital image steganography. Proceedings of the 15th Annual Conference and Workshop on the Engineering of Computer Based Systems, March 31-April 4, 2008, Belfast, Northern Ireland, pp: 159-168.
    CrossRef

  2. Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad, 2010. Robust adaptive image watermarking using visual models in DWT and DCT domain. Inform. Technol. J., 9: 460-466.
    CrossRefDirect Link

  3. Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    CrossRefDirect Link

  4. Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRefDirect Link

  5. Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRefDirect Link

  6. Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRefDirect Link

  7. Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRefDirect Link

  8. Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRefDirect Link

  9. Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRefDirect Link

  10. Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRefDirect Link

  11. Brindha, S. and I. Vennila, 2011. Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system. Int. J. Comput. Appl., 26: 51-55.
    Direct Link

  12. Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
    CrossRefDirect Link

  13. Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRefDirect Link

  14. Yang, C.N., T.S. Chen, K.H. Yu and C.C. Wang, 2007. Improvements of image sharing with steganography and authentication. J. Syst. Software, 80: 1070-1076.
    CrossRefDirect Link

  15. Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
    CrossRefDirect Link

  16. Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    CrossRefDirect Link

  17. Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    CrossRefDirect Link

  18. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRefDirect Link

  19. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRefDirect Link

  20. Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    CrossRefDirect Link

  21. Mohammad, N., X. Sun and H. Yang, 2011. An excellent Image data hiding algorithm based on BTC. Inform. Technol. J., 10: 1415-1420.
    CrossRefDirect Link

  22. Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRefDirect Link

  23. Provos, N. and P. Honeyman, 2003. Hide and seek: An introduction to steganography. IEEE Secur. Privacy, 1: 32-44.
    CrossRef

  24. Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRefDirect Link

  25. Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRefDirect Link

  26. Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784.

  27. Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK.

  28. Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2011. Wave (let) decide choosy pixel embedding for stego. Proceedings of the International Conference on Computer, Communication and Electrical Technology, March 18-19, 2011, India, pp: 157-162.
    CrossRefDirect Link

  29. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link

  30. Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRefDirect Link

  31. Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
    CrossRefDirect Link

  32. Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRefDirect Link

  33. Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
    CrossRefDirect Link

  34. Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373.
    CrossRef

  35. Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216.
    CrossRefDirect Link

  36. Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
    CrossRefDirect Link

Search


Related Articles

Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved