@IJRTER-2016, All Rights Reserved 96 BIOMETRIC STEGANOGRAPHY: A NEW APPROACH USING HAND GEOMETRY Priya Yankanchi 1 , Shanmukhappa A. Angadi 2 1 Department of Computer Science and Engineering, Visvesvaraya Technological University, Centre for PG Studies, Belagavi, Karnataka, India 2 Department of Computer Science and Engineering, Visvesvaraya Technological University, Centre for PG Studies, Belagavi, Karnataka, India, Abstract— With the growth of data communication over computer network, the security of information has become a major issue and thus data hiding technique has attracted many people around the globe. This paper presents a new framework for secure data hiding by combining steganography technique with biometrics traits. Steganography is the art and science of hiding the secret data in to the cover file in such a way that no one apart from sender and intended recipient, suspects the secret message. Here image steganography technique is used, in which secret data is embedded in the image file which acts like cover file. Traditional steganographic techniques uses sequential LSB data embedding method, in which secret data is going to embed in the least significant bit position of cover image pixels in sequential manner, this method is easily vulnerable to the attacks and attacker can easily get know to the data embedded position because data is embedded in sequential pixel position in least significant bits. Hence to overcome from this problem this paper proposes new framework called “Biometric steganography”. In this proposed framework steganography is implemented by utilizing one of the biometric traits i.e. Hand geometry. Here features are extracted from hand images of individuals and by utilizing these features one unique key is generated. This generated key is employed to find a particular pixel position from which, to embed the secret data in least significant bits of the cover image. Stego image is generated which contains secret data, and embedded secret message is extracted from the stego image by utilizing generated unique key, during information extraction. This approach gives a double layered data security. Keywords— Biometric Steganography, Data Hiding, Key Generation, Hand Geometry, Secret Data. I. INTRODUCTION Nowadays the security has become one of the essential issues in the case of secure data transmission. We should take care that the transmission of a data won’t get altered by any kind of network attacks and secure transmission of data won’t susceptible to any kind of malicious attacks while the data is in transmission mode. Steganography techniques are used to conceal the secret data and to protect the confidential data. Steganography is the art of invisible communication by concealing information inside other information. The term steganography is derived from Greek word which means “covered writing”. Steganography plays an important role in information security. The goal of Steganography is to avoid drawing suspicion to the existence of a hidden message. This approach of information hiding technique has recently become popular in a number of application areas. This paper presents new framework called “Biometric steganography” which gives double layered security for data which has been embedded in the cover file. “Biometric Steganography” is an art of hiding the data in to another data by using some of the biometric traits”. Biometrics is metrics related to the human characteristics and it automatically recognizes individuals based on “physical or behavioral” characteristics.
9
Embed
BIOMETRIC STEGANOGRAPHY: A NEW APPROACH USING HAND … · 2017-03-04 · Data hiding is one of best topic in secret communication. A lossless data hiding technique using LSB in images
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
@IJRTER-2016, All Rights Reserved 96
BIOMETRIC STEGANOGRAPHY: A NEW APPROACH USING
HAND GEOMETRY
Priya Yankanchi1, Shanmukhappa A. Angadi
2
1Department of Computer Science and Engineering,
Visvesvaraya Technological University, Centre for PG Studies, Belagavi, Karnataka, India 2Department of Computer Science and Engineering,
Visvesvaraya Technological University, Centre for PG Studies, Belagavi, Karnataka, India,
Abstract— With the growth of data communication over computer network, the security of
information has become a major issue and thus data hiding technique has attracted many people
around the globe. This paper presents a new framework for secure data hiding by combining
steganography technique with biometrics traits. Steganography is the art and science of hiding the
secret data in to the cover file in such a way that no one apart from sender and intended recipient,
suspects the secret message. Here image steganography technique is used, in which secret data is
embedded in the image file which acts like cover file. Traditional steganographic techniques uses
sequential LSB data embedding method, in which secret data is going to embed in the least
significant bit position of cover image pixels in sequential manner, this method is easily vulnerable
to the attacks and attacker can easily get know to the data embedded position because data is
embedded in sequential pixel position in least significant bits. Hence to overcome from this problem
this paper proposes new framework called “Biometric steganography”. In this proposed framework
steganography is implemented by utilizing one of the biometric traits i.e. Hand geometry. Here
features are extracted from hand images of individuals and by utilizing these features one unique key
is generated. This generated key is employed to find a particular pixel position from which, to embed
the secret data in least significant bits of the cover image. Stego image is generated which contains
secret data, and embedded secret message is extracted from the stego image by utilizing generated
unique key, during information extraction. This approach gives a double layered data security.
Keywords— Biometric Steganography, Data Hiding, Key Generation, Hand Geometry, Secret Data.
I. INTRODUCTION Nowadays the security has become one of the essential issues in the case of secure data transmission.
We should take care that the transmission of a data won’t get altered by any kind of network attacks
and secure transmission of data won’t susceptible to any kind of malicious attacks while the data is
in transmission mode.
Steganography techniques are used to conceal the secret data and to protect the confidential data.
Steganography is the art of invisible communication by concealing information inside other
information. The term steganography is derived from Greek word which means “covered writing”.
Steganography plays an important role in information security. The goal of Steganography is to
avoid drawing suspicion to the existence of a hidden message. This approach of information hiding
technique has recently become popular in a number of application areas.
This paper presents new framework called “Biometric steganography” which gives double layered
security for data which has been embedded in the cover file. “Biometric Steganography” is an art of
hiding the data in to another data by using some of the biometric traits”. Biometrics is metrics related
to the human characteristics and it automatically recognizes individuals based on “physical or
behavioral” characteristics.
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 02, Issue 09; September - 2016 [ISSN: 2455-1457]
@IJRTER-2016, All Rights Reserved 97
In this frame work steganography technique is used in combination with biometric traits.
Steganography is the technique of concealing the secret data in to the one of the cover file, so that no
one can suspect the data apart from the sender and receiver.
Here image steganography strategy has been used in which the secret data is going to embed
in the cover image. In this proposed system new embedding technique is implemented in which
secret data is secretly embedded in cover image based on key, unique key is generated by using
extracted hand features and this key identifies particular pixel of cover image in which data is going
to embed. First hand image has been taken out from CASIA database and taken image is pre-
processed by cropping unwanted part of the hand image after this process by utilizing the boundary
tracing algorithm hand features being extracted and valley and tip point are located using Euclidean
distance, by using these extracted features a unique key has generated, this key identifies a particular
pixel of cover image in which secret data embeds in the least significant bits position of that selected
pixel. Stego image is generated which contains secret data within it, from this stego image data being
extracted by performing reverse process of embedding, secret data is extracted using the same hand
key which has been used while embedding. Here we have taken 25 individual’s hand images from
CASIA data base for testing and here system performance is analyzed by checking how the proposed
system works for different message lengths and the distortion of original cover image and stego
image are calculated using PSNR and MSE. As the message length increases the system’s response
time increases, MSE value increases and PSNR value decreases.
This paper is organized in to 5 sections. In section II literature survey has done which are related to
steganography techniques and hand geometry. Section III presents the proposed methodology.
Experiment results are discussed in section IV. Section V presents the conclusion.
II. LITERATURE SURVEY This section gives review of the work done by researchers on steganography technique and hand
geometry.
Arun Kumar Singh et.al. [1]. In this paper, a novel data-hiding technique based on the LSB technique
of digital images is presented. Data hiding is one of best topic in secret communication. A lossless
data hiding technique using LSB in images is presented in this paper. LSB data hiding technique
does not affect the visible properties of the image. This paper deals with hiding text in an image file
using Least Significant Bit (LSB) technique. The LSB algorithm is implemented in spatial domain in
which the payload bits are embedded into the least significant bits of cover image to derive the stego-
image.
Souvik Bhattacharyya et.al. [2]. The biometric frame work is at risk to range of assaults. These
assaults are expected to bypass the security framework or to suspend the typical working. This paper
proposes a new safety concept that has been built up by making the framework more secure with the
support of Steganography along with “Biometric safety”. Here the biometric data has been inserted
in to a skin tone part of an image with the assistance of proposed steganographic method.
Rahul Joshi et.al. [3]. This paper introduces the concept of steganography using “LSB METHOD”.
Least significant bit (LSB) insertion is a common and simple approach to embed information in an
image file. In this method the LSB of a byte is replaced with data bits.
Nader A. Rahman Moham [4]. This paper proposes a novel encryption technique with password
security in view of an upgraded form of multimodal hand geometry validation which utilizes 3
authentications layers based on “geometry verification”, “digital Steganography”, and “password
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 02, Issue 09; September - 2016 [ISSN: 2455-1457]
@IJRTER-2016, All Rights Reserved 98
authentication”. This paper explains about the biometric authentication system by using
Steganography technique.
Poonam Rathi et.al. [5]. This paper proposes a system for “Hand geometry” Feature extraction
utilizing hand outline matching. Geometric estimations of the human hand have been utilized for
“identity-authentication” as part of various business frameworks.
Nidhi Saxena et.al. [6]. This paper reviews a study about personal authentication utilizing hand
geometry. Hand geometry is used as a part of this exploration comprises of the lengths and widths of
fingers and width of a palm.
Further papers [7-10] discuss various implementations of the biometric steganography and general
stego techniques. The ensuing section describes in detail the methodology proposed in this work.
III. PROPOSED METHODOLOGY In this paper new framework is proposed i.e. “Biometric steganography using hand geometry
biometrics”. Here steganography technique is implemented along with using one of the biometric
trait i.e. hand geometry. Individual’s hand images are captured from those hand geometric features
are extracted, these extracted features are used to generate unique key for deciding the secret data
embedding position in cover image. Secret data is going to embed in the particular pixel position
which is decided by the generated key; here key selects one particular pixel in that pixel’s least
significant bit the data is going to embed. And extraction of data is done in reverse process of
embedding and here the key which has used in embedding also used while extracting. This leads to
the highest security for the embedded data.
Figure 1. Block diagram of biometric steganography.
The proposed system has implemented in following important phases.
� Feature Extraction
� Key generation
� Data Embedding
� Data Extraction
A. Feature Extraction: Here hand geometric features are extracted by following 3 steps.
• Image Acquisition:
Here in this proposed system CASIA database is used for hand images. We have used 25 hand
images for feature extraction. CASIA database involves 5,502 hand images which are captured from
312 subjects. Proposed system uses CASIA database for hand images which is already available
hence image acquisition stage is not necessary in actual. But normally in this image acquisition phase
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 02, Issue 09; September - 2016 [ISSN: 2455-1457]
@IJRTER-2016, All Rights Reserved 99
system consist of “CCD digital camera”, “light source”, “black flat surface”. User normally places
his hand on black flat surface and image is captured by the CCD digital camera.
• Image preprocessing:
We have acquired the hand image which is colored image; we have to convert it in to the black and
white image and unnecessary part of the captured hand image has cropped. “Median filter” had used
to remove the background noise of the image. There is specific intensity between hand and
background which we can observe because of the black colored background. Thus histogram of the
hand image is “bimodal”. The hand image can easily changed over to the “binary image” by
thresholding. The threshold value consequently figured by utilizing “Otsu” method. Hand image
outline can be smoothened by applying some of the morphological operations.
• Feature Extraction:
After preprocessing stage the feature extraction of hand has performed by using boundary tracing
algorithm and some of the calculations are used to find valley and tip points. Euclidean distance is
calculated between tip and valley points.
B. Key Generation:
• Key has generated in four ways
- From extracted features tip and valley points are located
- Pair wise distance has calculated using Euclidean distance.
- Variance has calculated for pair wise distance
- And lastly unique key has generated using variance result.
Pair wise distance calculated using Euclidean distance
Given an m-by-n data matrix X, which is treated as m (1-by-n) row vectors x1, x2... xm, the various
distances between the vector xr and xs are defined as follows:
Variance The mathematical formula to calculate the variance is given by:
σ
2 = variance
∑ (X - µ)2 = The sum of (X - µ)
2 for all data points
Standard Deviation Formula The standard deviation formula is similar to the variance formula. It is given by:
σ = standard deviation
xi = each value of dataset
x (with a bar over it) = the arithmetic mean of the data (This symbol will be indicated as mean from
now)
N = the total number of data points
∑ (xi - mean)^2 = The sum of (xi - mean)^2 for all data points.