Defending Biometric Templates by Multilevel Authentication using BioCryptography and Steganography Techniques

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-36 Number-1
Year of Publication : 2016
Authors : T. Leena Premakumari, Dr. S. Arul Jothi


T. Leena Premakumari, Dr. S. Arul Jothi "Defending Biometric Templates by Multilevel Authentication using BioCryptography and Steganography Techniques". International Journal of Computer Trends and Technology (IJCTT) V36(1):43-47, June 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Defending information against some intruders is a most demanding task in our computer world. Now a day’s information sharing and transferring are the common task performed over the network. In this paper we are defending the biometric templates from the malicious users. Biometric templates may be modified by attacker. Here we are using steganography techniques and biocryptography techniques as a multilevel authentication. Biometric is a method of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics such as knuckles, skin, nail etc. The biometric system offers a greater security when compared to the password authentication or token based system. Biometric templates are acquired from the subject as a raw biometric data and we are extracting a feature from the data and compare the feature set against the template stored in the database in order to identify the person. And at the same time it is possible for the intruders to identify or access the data from the database where the data is stored as the biometric data. So defending the data is the major concern for that we are using the following techniques such as steganography and biocryptography. In biocryptography we can defend the important data from the hackers. Cryptography provides the means to further protect Biometric Templates at these critical junctures. It is the science of scrambling information and data which is transit across a network medium, and then descrambling it at the receiving end into a decipherable format. That way, if the scrambled information and data were to be intercepted by a third party, there is not much which can be done unless they possess the keys for descrambling the information. These concepts of scrambling and descrambling can be very easily applied to biometrics. This is known as “Bio- Cryptography”. The next level of protection is by using the steganography which is one of the major techniques used for secret communication. “Steganography is an art of sending secret messages over public channel in such a way that only the intended recipient knows about the existence of the message” and it is a skill as science of hiding a top secret communication in a cover media such as image, text, signal or sound in such manner that nobody, apart from the deliberate recipient knows the existence of the data In other words, the biometric templates are protected by scrambling and descrambling keys while they are stored in the database, or in movement across a network.

[1] K. S. Sandha, “Performance Evaluation of Symmetric Cryptography Algorithms,” International Journal of Electronics and Communication Technology, vol. 2, Sep. 2011.
[2] D. Das, J. Nath, M. Mukherjee, N. Chaudhury and A. Nath, ”An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm”, Proceedings of IEEE conference WICT-2011 held at Mumbai University, Dec. 2011.
[3] J. Nath. et. al. ”Symmetric key Cryptography using twoway updated -Generalized Vernam Cipher method: TTSJA algorithm”, IJCA, Vol. 42, Mar. 2012.
[4] D. Chatterjee, J. Nath, S. Das, S. Agarwal and A. Nath, “Symmetric key Cryptography using modified DJSSA symmetric key algorithm”, Proceedings of International conference Worldcomp 2011 held at Las Vegas, USA, July 2011.
[5] Ismail Avcıbas, Nasir Memon, and Bülent Sankur, “Steganalysis Using Image Quality Metrics”, IEEE Transactions On Image Processing, vol. 12, Feb. 2003.
[6] Ajay.B.Gadicha, “Audio Wave Steganography”, International Journal of Soft Computing and Engineering (IJSCE), vol. 1, Nov. 2011.
[7] Pratap Chnadra Mandal, “Superiority of Blowfish Algorithm,” International Journal Of Advanced Research in Computers Science and Software Engineering , vol. 2, Sep. 2012.
[8] J. Daemen and V. Rijmen, “Rijndael: The Advanced Encryption Standard", Dr. Dobb's Journal, Mar. 2001.
[9] M. Sreerama Murty, D. Veeraiah, and A. Srinivas Rao, “Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis,” Signal & Image Processing : An International Journal, vol. 2, pp. 170–179, Jun. 2011.
[10] J.S. LeenaJasmine, L. Prabha, “An Efficient Secure Image Watermarking Using Wavelet Transform”, International Journal of Computer Trends and Technology, vol. 17, pp. 133–137, Nov. 2014.
[11] G.Shyamala, I.Jasmine Selvakumari Jeya and M.Revathi, “Secure and Reliable Watermarking in Relational Databases”, International Journal of Computer Trends and Technology, vol. 11, pp. 13–18, May. 2014.

Steganography, Biocryptography, biometric templates, keys, Intruders, hackers.