IRIS BIOMETRICS STEGANOGRAPHIC METHOD WITH PIXELVALUE DIFFERENCING AND HOUGH TRANSFORMFOR HIGHER SECURITY SYSTEM

In biometric security, steganography has become one of the techniques used in defending biometrics data and system. This is due to fraud to the biometric data and illegal activites occured at the biometrics point of system. The biometric data, which in this study, iris, is preprocessed using Hough Transform in producing the iris feature. The pixel values of iris feature is formed, in order to embed the iris feature with the stego key which gained from the cover image (thumbprint from the same trained sample). Studies showed that various techniques of embedding such as least significant bits and pixel value differencing are among popular researches. However, none has been designed for iris implementation in biometrics system. Therefore, a new technique is presented in this paper which integrates pixel value differencing with Hough method in the iris biometrics system. The proposed method modified the pixels values by modifying the most conservative pixels of the block. The theoritical estimation and results produce a scheme which provide a better embedding. The new simulation method provides an embedding capacity, human visual quality and PSNR value is 39.34 dB which is better than the previous methods.

[1]  Cheng-Hsing Yang,et al.  Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy , 2007 .

[2]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[3]  Ahmed S. Salama,et al.  Wavelet-pixel value differencing technique for digital images data hiding , 2011, 2011 IEEE International Conference on System Engineering and Technology.

[4]  Heung-Kyu Lee,et al.  STEGANALYSIS METHOD DEFEATING THE MODIFIED PIXEL-VALUE DIFFERENCING STEGANOGRAPHY , 2010 .

[5]  Jiwu Huang,et al.  A more secure steganography based on adaptive pixel-value differencing scheme , 2011, Multimedia Tools and Applications.

[6]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[7]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[8]  Ali Hamzeh,et al.  A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.

[9]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[10]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[11]  Joseph P. Noonan,et al.  Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform , .

[12]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[13]  M. Padmaa,et al.  ZIG-ZAG PVD - A Nontraditional Approach , 2010 .

[14]  S.Maruthu Perumal,et al.  Sorted Pixel Value Difference on Fuzzy Watermarking Scheme , 2012 .

[15]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[16]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[17]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.