Steganography Using Biometrics

Steganography Using Biometrics

Manashee Kalita (NERIST, India) and Swanirbhar Majumder (NERIST, India)
Copyright: © 2018 |Pages: 19
DOI: 10.4018/978-1-5225-2255-3.ch432
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In this smart age, smart gadgets with internet connectivity have become necessity of modern life. While enjoying these facilities one must count the security of their private or confidential information. With due time, a lot of cryptographic methods have been developed for enforcing security. On the other hand, with the advancement of technologies the intruders and hackers have also developed their skills and tools. Therefore, many times we fail to protect our information. To get rid of this situation, the developers have to focus on some other method besides cryptography. Steganography can be considered as the solution to overcome this problem, as it is the technique which conceal the existence of any secret information in a usual media file. Moreover, inclusion of biometric with steganography enhances the security level, as biometric systems are dominating the field of authentication nowadays. Here, various techniques of steganography, biometric and steganography using biometrics will be discussed. Finally present scenario of steganography using Biometrics will be demonstrated.
Chapter Preview
Top

Background

Steganography is a prehistorical practice. From the ancient times, steganography has been using to provide security to the confidential information. Italian mathematician Jerome Cardan reinvented Chinese ancient secret writing method. In that method two parties share a paper mask with holes and after that fill up the blank spaces. The final message appears as an innocuous text. Many secret writing techniques were invented during World War II, such as null cipher, microdot, invisible ink, etc. In the5th century, BC Hiatus wanted to send some message to his friend secretly. He shaved one of the trusted slave’s head and tattooed a message on it. The slave was sent after his hair grew back. During World War II, Morse codes were encoded in pictures, like long Blades of grass indicate dashes and dots were indicated by short blade.

The word biometrics is also originated from Greek word “Bio” which means life and “metric” means measure. Biometric define the measurement of statistical analysis of people’s physical and behavioral characteristics. This is mainly used for authentication, access control, identification. Nowadays, authentication tool/machine developers start to prefer biometrics characteristics as identification or authentication measure rather than passwords, smart card, etc. Because biometrics is a property which can defines or identify “who are you.” Various biometric characteristics are being used by different authentication machine such as palm geometry, fingerprints, iris, face, skin, etc.

Physical characteristics are related to the feature of the body, such as palm veins, retina, face recognition, DNA, fingerprint, hand geometry, etc. On the other hand, the behavioral characteristic is related to the behavior of a person. It includes signature, voice, gait, typing speed, handwriting, etc. Biometric gets the preference to be a reliable authentication measure than a password, smart card, etc. because biometric characteristics are virtually impossible to steal. Therefore, biometric starts dominating the field of authentication. We can observe the large application of biometric in regular life, e.g. Bank employees use Thumbprint to login into their system, in many universities, offices use biometric punching machine where the biometric feature of employees is used to keep the attendance.

Now, if we focus on the steganography using biometrics, it can be done in two ways, one hides your biometric information in some cover file, and another is the reserve one, i.e., biometric information will carry some secret information. Here a brief discussion related to these two mentioned types are presented.

Key Terms in this Chapter

Cryptography: Cryptography is a technique to secure a communication. It converts the message into some meaning text (cipher) using encryption algorithm, so that no one can read that massage without knowing the decryption algorithm. Depending on the secret key used in the algorithm it is divided into two categories: symmetric - if one key is used for encryption as well as decryption and asymmetric- if two different keys are used for encryption and decryption.

Cover Media: In steganography, a carrier media is selected to hide the message or to carry the message in it, that carrier media is called cover media. A cover media can be any unsuspicious file, such as natural picture, family photo, video, audio clip, etc.

Steganography: It is a technique to provide security to the secret information using data hiding technique. In steganography, a cover media is selected to hide the information. Depending on the place of data hiding it is mainly divided into two categories: Spatial domain- if information is embedded directly in the pixel values and Transform domain- if information is embedded in the coefficient values which are calculated from the pixel values of the cover image.

Stego Image: Stego image is the output of the embedding process. Stego image contain the hidden message either in pixel values or in optimally selected coefficients.

Biometrics: It refers to the technology to measure physical and behavioral characteristics of an individual, such as fingerprint, palm print, iris, DNA, retina, signature, keystroke etc. Biometric characteristic are extensively used in authentication and verification process as most of the characteristics are unique.

Watermarking: It is a data hiding technique which primary motive is to authenticate. Watermarking can be visible or invisible. Here the cover image is also important along with the embedded message. Robustness is the main criteria for selection of embedding algorithm.

Complete Chapter List

Search this Book:
Reset