CFP last date
20 May 2024
Reseach Article

Article:Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography

by Madhumita Kathuria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 8
Year of Publication: 2010
Authors: Madhumita Kathuria
10.5120/1702-2237

Madhumita Kathuria . Article:Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography. International Journal of Computer Applications. 12, 8 ( December 2010), 1-5. DOI=10.5120/1702-2237

@article{ 10.5120/1702-2237,
author = { Madhumita Kathuria },
title = { Article:Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 8 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number8/1702-2237/ },
doi = { 10.5120/1702-2237 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:05.465499+05:30
%A Madhumita Kathuria
%T Article:Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 8
%P 1-5
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being. Statistically analyzing these biological characteristics has become known as the science of biometrics. These days, biometric technologies are typically used to analyze human characteristics for security purposes. In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. In this paper we will present some schemes for strengthening personal authentication over insecure channels with biometric concepts or how to securely transfer or use vein biometric characteristics. Our concept can be applied on any biometric authentication scheme and is universal for all systems

References
  1. Han Shuihua and Yang Shuangyuan ,”An Asymmetric Image Encryption Based on Matrix Transformation”,ECTI TRANSACTIONS ON COMPUTER AND INFORMATION TECHNOLOGY, VOL.1, NO.2 NOVEMBER 2005,pp.126-133.
  2. Lala Krikor,Sami Baba,Thawar Arif,Zyad Shaaban,” Image Encryption Using DCT and Stream Cipher”European Journal of Scientific Research ISSN 1450-216X, Vol.32 No.1 (2009), pp.47-57.
  3. Mehdi Kharrazi, Husrev T. Sencar,”Performance study of common image steganography and steganalysis techniques”, Journal of Electronic Imaging, 15(4), 041104 (Oct–Dec 2006), pp.041104-1- 041104-16.
  4. Chander Kant, Ranjender Nath & Sheetal Chaudhary,” Biometrics Security using Steganography”,International Journal of Security, Volume (2) : Issue (1) pp.1-5.
  5. Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta,” A New Vein Pattern-based verification System”, International Journal of Computer Science and Information Security, Vol. 8, No. 1, pp.58-63, 2010.
  6. Maleika Heenaye-Mamode Khan, Naushad Mamode Khan and Raja K.Subramanian,”Feature Extraction of Dorsal Hand Vein Pattern using a fast modified PCA algorithm based on Cholesky decomposition and Lanczos technique”, World Academy of Science, Engineering and Technology, vol. 61, pp.279-282, 2010.
  7. Amioy Kumar M. Hanmandlu Vamsi K. Madasu Brian C. Lovell, “Biometric Authentication based on Infrared Thermal Hand Vein Patterns”, Digital Image Computing: Techniques and Applications, pp.331-338, 2009.
  8. Debnath Bhattacharyya, Poulami Das, Tai-hoon Kim, Samir Kumar Bandyopadhyay.” Vascular Pattern Analysis towards Pervasive Palm Vein Authentication”, Journal of Universal Computer Science, vol. 15, no. 5, pp. 1081-1089, 2009.
  9. Dr.M.Umamaheswari,S.Sivasubramanian, S.Pandiarajan, ”Analysis of Different Steganographic Algorithms for Secured Data Hiding” ,IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010,pp.154-160.
  10. Kshitiz Agarwal,Karm Veer Arya,”An Image Compression Algorithm for Discontinuous Series of Similar Pixels”, International Journal of Computer Applications (0975 - 8887),Volume1-No. 17,2010,pp. 89-90.
  11. Ms.Mansi Kambli, Ms.Shalini Bhatia,” Comparison of different Fingerprint Compression Techniques”,Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.1, September 2010,DOI : 10.5121/sipij.2010.11.03 27,pp. 27-39.
  12. Eman Abdelfattah, Asif Mohiuddin ,” PERFORMANCE ANALYSIS OF MULTIMEDIA COMPRESSION ALGORITHMS”, International journal of computer science & information Technology (IJCSIT) Vol.2, No.5, October 2010,DOI : 10.5121/ijcsit.2010.2501 1, pp. 1-10.
  13. Mahmoud Elnajjar, A.A Zaidan, B.B Zaidan, Mohamed Elhadi ,M.Sharif and Hamdan.O.Alanazi ,” Optimization Digital Image Watermarking Technique for Patent Protection”, Journal of Computing (JOC), Vol.2, Issue 2, ISSN: 2151-9617, February 2010, Lille, France. P.P 142-148
  14. Hamdan.O.Alanazi, A.A.Zaidan, B.B.Zaidan, Hamid A.Jalab and Zaidoon Kh. AL-Ani, ”New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files”, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617,pp. 144-151.
  15. A.W. Naji, Shihab A. Hameed, B.B.Zaidan, Wajdi F. Al-Khateeb,Othman O. Khalifa, A.A.Zaidan and Teddy S. Gunawan, “ Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standared and Distortion Techniques”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 3, No 1 ISSN: 1947-5500, 3 Aug 2009, USA, P.P 73-78,
  16. Kussay Nugamesh Mutter, Zubir Mat Jafri ,Azlan Bin Abdul Aziz,” Hybrid Hopfield Neural Network, Discrete Wavelet Transform and Huffman Coding for Image Recognition”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009 ,pp. 73-78.
  17. Hamdan. Alanazi, Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan, “New Frame Work of Hidden Data with in Non Multimedia File”,International Journal of Computer and Network Security, 2010, Vol.2, No.1, ISSN: 1985-1553, 30 January, Vienna, Austria, P.P 46-54.
  18. B.B Zaidan , A.A Zaidan ,Alaa Taqa , Fazidah Othman ,“ Stego-Image Vs Stego-Analysis System”, International Journal of Computer and Electrical Engineering (IJCEE),Vol.1 ,No.5 , ISSN:1793-8163, December (2009), Singapore,pp.572-578 .
  19. Alaa Taqa, A.A Zaidan, B.B Zaidan ,“New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm”, International Journal of Computer and Electrical Engineering (IJCEE) ,Vol.1 ,No.5, ISSN: 1793-8163, December (2009). Singapore, p.p. 566-571.
  20. Hamid.A.Jalab, A.A Zaidan and B.B Zaidan,” Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation”, Journal of Computing (JOC), Vol.1, Issue 1, ISSN: 2151-9617, December 2009, Lille, France, P.P 108-113.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Template Compression Steganography Cryptography Preprocessing