A new model of securing iris authentication using steganography
The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. In this paper, we propose...
Published in: | Communications in Computer and Information Science |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
2011
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960361917&doi=10.1007%2f978-3-642-22170-5_47&partnerID=40&md5=431208fc2b6a5da48979cf8a616056ff |
id |
2-s2.0-79960361917 |
---|---|
spelling |
2-s2.0-79960361917 Zainal Abidin Z.; Manaf M.; Shibghatullah A.S. A new model of securing iris authentication using steganography 2011 Communications in Computer and Information Science 179 CCIS PART 1 10.1007/978-3-642-22170-5_47 https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960361917&doi=10.1007%2f978-3-642-22170-5_47&partnerID=40&md5=431208fc2b6a5da48979cf8a616056ff The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. In this paper, we proposed an enhancement of temporal-spatial domain algorithm which involves the scheme of Least Significant Bits (LSB) as the new model which converts iris images to binary stream and hides into a proper lower bit plane. Here, the stego key, n, will be inserted into the binary values from the plane which concealed the information; where n is the input parameter in binary values which inserted to the iris codes, m. These values produce the output which is the new iris stego image after binary conversion. Theoretically, the proposed model is promising a high security performance implementation in the future. © 2011 Springer-Verlag. 18650929 English Conference paper |
author |
Zainal Abidin Z.; Manaf M.; Shibghatullah A.S. |
spellingShingle |
Zainal Abidin Z.; Manaf M.; Shibghatullah A.S. A new model of securing iris authentication using steganography |
author_facet |
Zainal Abidin Z.; Manaf M.; Shibghatullah A.S. |
author_sort |
Zainal Abidin Z.; Manaf M.; Shibghatullah A.S. |
title |
A new model of securing iris authentication using steganography |
title_short |
A new model of securing iris authentication using steganography |
title_full |
A new model of securing iris authentication using steganography |
title_fullStr |
A new model of securing iris authentication using steganography |
title_full_unstemmed |
A new model of securing iris authentication using steganography |
title_sort |
A new model of securing iris authentication using steganography |
publishDate |
2011 |
container_title |
Communications in Computer and Information Science |
container_volume |
179 CCIS |
container_issue |
PART 1 |
doi_str_mv |
10.1007/978-3-642-22170-5_47 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960361917&doi=10.1007%2f978-3-642-22170-5_47&partnerID=40&md5=431208fc2b6a5da48979cf8a616056ff |
description |
The integration of steganography in biometric system is a solution for enhancing security in iris. The process of biometric enrollment and verification is not highly secure due to hacking activities at the biometric point system such as overriding iris template in database. In this paper, we proposed an enhancement of temporal-spatial domain algorithm which involves the scheme of Least Significant Bits (LSB) as the new model which converts iris images to binary stream and hides into a proper lower bit plane. Here, the stego key, n, will be inserted into the binary values from the plane which concealed the information; where n is the input parameter in binary values which inserted to the iris codes, m. These values produce the output which is the new iris stego image after binary conversion. Theoretically, the proposed model is promising a high security performance implementation in the future. © 2011 Springer-Verlag. |
publisher |
|
issn |
18650929 |
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1812871802055032832 |