Robust information security system using steganography, orthogonal code and joint transform correlation

Abstract The paper presents a novel and efficient information security technique by employing orthogonal coding scheme, encoded steganography and nonlinear encryption scheme involving joint transform correlation. Multiple biometric signatures are encoded using individual orthogonal codes and then multiplexed together. The encoded and multiplexed image is then embedded inside a cover image utilizing a new steganography technique. Here, a color cover image is first decomposed into three color components, red, green and blue, each of which is used to embed one set of biometric signatures. In each component image, one bit from the three least significant bits is selected using another secret key which is then replaced by the information bit. The component stego images are combined to form the color stego image, which is again encrypted using a multiple phase-shifted reference joint transform correlation (MRJTC) technique. The MRJTC technique is a nonlinear encryption process which increases the security strength significantly against any unauthorized access. The encoded steganography process reduces the vulnerability of an intruder retrieving any information through any steganalysis attack. In addition, the orthogonal encoding scheme enhances the robustness by making the biometric information almost inaccessible without authorization.

[1]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[2]  Fan Chung Graham,et al.  Optical orthogonal codes: Design, analysis, and applications , 1989, IEEE Trans. Inf. Theory.

[3]  Juline E. Mills,et al.  Cybercrimes against Consumers: Could Biometric Technology Be the Solution? , 2006, IEEE Internet Computing.

[4]  Rainer Böhme,et al.  Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.

[5]  James T. Curran,et al.  Fortuna: Cryptographically Secure Pseudo-Random Number Generation In Software And Hardware , 2006 .

[6]  Deepthi Bala,et al.  Biometrics and information security , 2008, InfoSecCD2008 2008.

[7]  Jiying Zhao,et al.  A fuzzy vault implementation for securing revocable iris templates , 2011, 2011 IEEE International Systems Conference.

[8]  Vinod Chandran,et al.  Biometric template security using Higher Order Spectra , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[10]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[11]  Kevin Curran,et al.  Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).

[12]  M. N. Islam Color image encryption using multiple reference joint transform correlation , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[13]  Muhammad Faysal Islam,et al.  Efficient and Robust Information Security System Employing Color Encoded Steganography and Orthogonal Encryption , 2012 .

[14]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[15]  M. N. Islam,et al.  A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography , 2012, Defense + Commercial Sensing.

[16]  Pong C. Yuen,et al.  Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Caroline Viola,et al.  A NOVEL APPROACH TO FINGERPRINT IDENTIFICATION USING GABOR FILTER-BANK , 2015 .

[18]  Xiangyang Luo,et al.  A secure LSB steganography system defeating sample pair analysis based on chaos system and dynamic compensation , 2006, 2006 8th International Conference Advanced Communication Technology.

[19]  Ana González-Marcos,et al.  Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[20]  M. Nazrul Islam Encryption and multiplexing of fingerprints for enhanced security , 2011, 2011 IEEE Long Island Systems, Applications and Technology Conference.