Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography

A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being. Statistically analyzing these biological characteristics has become known as the science of biometrics. These days, biometric technologies are typically used to analyze human characteristics for security purposes. In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. In this paper we will present some schemes for strengthening personal authentication over insecure channels with biometric concepts or how to securely transfer or use vein biometric characteristics. Our concept can be applied on any biometric authentication scheme and is universal for all systems

[1]  K. V. Arya,et al.  An Image Compression Algorithm for Discontinuous Series of Similar Pixels , 2010 .

[2]  Shalini Bhatia,et al.  Comparison of different Fingerprint Compression Techniques , 2010 .

[3]  B. B. Zaidan,et al.  New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files , 2010, ArXiv.

[4]  Brian C. Lovell,et al.  Biometric Authentication Based on Infrared Thermal Hand Vein Patterns , 2009, 2009 Digital Image Computing: Techniques and Applications.

[5]  Debnath Bhattacharyya,et al.  Vascular Pattern Analysis towards Pervasive Palm Vein Authentication , 2009, J. Univers. Comput. Sci..

[6]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[7]  B. B. Zaidan,et al.  Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.

[8]  B. Zaidan,et al.  New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .

[9]  M. Umamaheswari,et al.  Analysis of Different Steganographic Algorithms for Secured Data Hiding , 2010 .

[10]  B. B. Zaidan,et al.  Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.

[11]  Yang Shuangyuan,et al.  An asymmetric image encryption based on matrix transformation , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[12]  Phalguni Gupta,et al.  A New Vein Pattern-based Verification System , 2010 .

[13]  Chander Kant,et al.  Biometrics Security using Steganography , 2008 .

[14]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[15]  Zyad Shaaban,et al.  Image Encryption Using DCT and Stream Cipher , 2009 .

[16]  Eman Abdelfattah,et al.  PERFORMANCE ANALYSIS OF MULTIMEDIA COMPRESSION ALGORITHMS , 2010 .

[17]  Kussay N. Mutter,et al.  Hybrid Hopfield Neural Network, Discrete Wavelet Transform and Huffman Coding for Image Recognition , 2009 .

[18]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[19]  Naushad Mamode Khan,et al.  Feature Extraction of Dorsal Hand Vein Pattern Using a Fast Modified PCA Algorithm Based On Cholesky Decomposition and Lanczos Technique , 2010 .