An Authentication Protocol for Secure Processing of ATM Systems by Fusion of Biometric and Crypt-Steganography Techniques

© 2020 by IJCTT Journal
Volume-68 Issue-4
Year of Publication : 2020
Authors : P.Anitha, M.Grace
DOI :  10.14445/22312803/IJCTT-V68I4P122

How to Cite?

P.Anitha, M.Grace, "An Authentication Protocol for Secure Processing of ATM Systems by Fusion of Biometric and Crypt-Steganography Techniques," International Journal of Computer Trends and Technology, vol. 68, no. 4, pp. 132-138, 2020. Crossref,

Biometric authentication mechanisms are receiving a lot of public attention. Biometrics based authentication is a potential candidate to replace password-based authentication. This paper aims at developing a novel authentication protocol by fusion of Biometric and Steganography techniques for secure processing of ATM Systems. Visual Steganography provides a very powerful technique by which one secret can be distributed in two or more shares. During the enrollment phase in the bank terminal, the user has to enroll his/her fingerprint and finger vein and these enrolled biometric images are required to undergo certain processing and the resultant images are encrypted using RSA algorithm with a secret key and by using the visual steganographic technique, the encrypted secret key is shared between the two images. In the verification procedure, new finger vein and fingerprint images are obtained in the ATM terminals and af ter processing of the acquired biometric images, it will be decrypted by RSA algorithm using the same secret key and those are verified with the images stored in the bank’s database. If matches with the database, then the user can carry out the money transactions and every user has three trials to access the ATM systems and if exceeds, the system will automatically logout the transaction. Since ATMs are now a normal part of daily life, the application of multimodal biometric techniques in every ATM Center’s in our country, leads to reduce the stealing and forging and it is very useful for all the people.

[1] Hatim A. Aboal samh, “A Multi Biometric System using combined Vein and Fingerprint Identification”, International Journal of Circuits, Systems and Signal Processing, pp 29-36, Issue 1, Vol.5, 2011.
[2] Riaz, N.; Riaz, N.; Riaz, A.; Riaz, A.; Khan, S.A.; Khan, S.A. “Biometric template security: An overview”, Sensor Rev. 2017, 38, 120–127.
[3] The FBI Now Has the Largest Biometric Database in the World. Will It Lead to More Surveillance? Available online: leadmore-surveillance-2345062 (accessed on 27 November 2018).
[4] U.S. Security Officials Will Begin Scanning All 10 Fingerprints of Most Non- Americans Traveling to the United States. Available online: (accessed on 27 November 2018).
[5] Anitha P, Grace M, “Multimodal Approach on Finger vein and Fingerprint by using Visual Steganography for Efficient Biometric Security”, International Journal of Computer Sciences & Engineering (IJCSE), E-ISSN:2347-2693, Vol 5,Issue 11,pp.140-145, November 2017.
[6] Neha Chhabra, “Visual Cryptographic Steganography in Images”, International Journal of Computer Science and Network Security, pp 126-131, Vol.12, No.4, 2012.
[7] K. Sankareswari, S. Arul Jothi, “Hybrid Approach for Securing Biometric Templates Using Visual Cryptography”, International Journal of Advance Research in Computer Science and Management Studies, pp 61-65, Vol.3, Issue 9, 2015.
[8] R.Saranya , S.Prabhu, “Image Encryption using RSA Algorithm with Biometric Recognition”, International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 11 Nov. 2016, Page No. 19149-19154.
[9] Shireen Nisha, Mohammed Farik, ” RSA Public Key Cryptography Algorithm – A Review”, International Journal Of Scientific & Technology Research, Volume 6, Issue 07, pp. 187-191, July 2017.
[10] Joseph Mwema, Michael Kimwele, Stephen Kimani, ”A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates”, International Journal of Computer Trends and Technology (IJCTT) ISSN: 2231-2803 – Volume 20 Number 1,pp.12-18, 2015.
[11] Humairah Hamid, V.K. Narang, Priti Singh, “Review on Vein Pattern Based Biometric Systems”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.6, Issue 5, 2017.
[12] A. L. Kabade, "Canny edge detection algorithm", International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), 5(5):1292-1295, 2016
[13] Kayode A. Akintoye, M. Rahim M. Shafry, Abdul Hanan Abdullah, “ A Novel Approach for Finger Vein Pattern Enhancement using Gabor and Canny Edge Detector”, International Journal of Computer Applications (0975 – 8887), Vol.157, No 2, 2017.
[14] Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng and Craig Valli, “Security and Accuracy of Fingerprint- Based Biometrics: A Review”, Symmetry, January 2019.
[15] Mohammad Mohsen Ahmadinejad, Elizabeth Sherly, “A Comparative Study on PCA and KPCA Methods for Face Recognition”, International Journal of Science and Research (IJSR), ISSN: 2319-7064, Vol. 5, Issue 6, 2016.
[16] Shaik Riyaz Ulhaq, Shaik Imityaz, Selvakumar, L.Gopinath, “Multimodel Biometric Template Authentication of Fingervein and Signature using Visual Cryptography”, International Journal of Engineering and Techniques, Vol. 3, Issue 3, 2017.

Biometric, Crypt-Steganography, RSA, fingerprint, finger vein, ATM systems