Integration of Biometrics and Steganography: A Comprehensive Review
<p>The defence-in-depth security model protects assets behind multiple defensive layers, each layer utilising a different strategy, so that if one layer is breached, overall security of the system is not compromised (Adapted from [<a href="#B6-technologies-07-00034" class="html-bibr">6</a>]).</p> "> Figure 2
<p>Fingerprint authentication involves image acquisition, image processing, feature extraction, and subsequent comparison to registered fingerprint features stored in a template database [<a href="#B17-technologies-07-00034" class="html-bibr">17</a>].</p> "> Figure 3
<p>A face-recognition system (FRS) has seven main modules, consisting of enrolment, detection, normalisation, feature extraction, template storage, feature matching, and decision-making stages [<a href="#B19-technologies-07-00034" class="html-bibr">19</a>].</p> "> Figure 4
<p>An iris recognition system will usually consist of eight modules, consisting of acquisition, preprocessing, normalisation, enhancement, feature extraction, template storage, feature matching, and decision-making stages [<a href="#B21-technologies-07-00034" class="html-bibr">21</a>].</p> "> Figure 5
<p>Keyboard dynamics involves an enrolment stage in which a support vector machine (SVM) is used for the learning step and the output is stored in a template database. A verification stage compares the results of the SVM algorithm for a new biometric capture with stored templates. If the decision shows agreement, the data from the new biometric capture replaces the stored template to cater for changes in behavioural characteristics over time [<a href="#B39-technologies-07-00034" class="html-bibr">39</a>].</p> "> Figure 6
<p>Biometric authentication system attack points [<a href="#B44-technologies-07-00034" class="html-bibr">44</a>].</p> "> Figure 7
<p>Discrete cosine transform (DCT)-based data-hiding using the JPEG compression model. A cover image is divided into 8 × 8-sized non-overlapping blocks, each block is applied to DCT in a raster scan order, and the transformed DCT coefficients are quantised using a quantization table. As a result of this process secret data can be embedded [<a href="#B53-technologies-07-00034" class="html-bibr">53</a>].</p> "> Figure 8
<p>Discrete wavelet transform (DWT)-based data-hiding. A cover image is decomposed by a row and column operations into two low frequency (L) and high frequency (H) components. After image decomposition, the embedding algorithm is performed on the sub bands [<a href="#B53-technologies-07-00034" class="html-bibr">53</a>].</p> "> Figure 9
<p>Object-oriented embedding. A proposed skin-based steganography system for hiding medical data in a face image: original image (<b>A</b>), skin blob of the segmented skin area (<b>B</b>), eyes’ centroid detection (<b>C</b>), eye regions (<b>D</b>), distance transformation based on face features (<b>E</b>), construction of ellipses (<b>F</b>), CT scan image (<b>G</b>), CT scan encrypted (<b>H</b>) and stego-image carrying the embedded CT image (<b>I</b>) [<a href="#B58-technologies-07-00034" class="html-bibr">58</a>].</p> "> Figure 10
<p>Distribution of biometric feature types.</p> "> Figure 11
<p>Distribution of steganographic methods.</p> "> Figure 12
<p>Distribution of other methods/applications.</p> ">
Abstract
:1. Introduction
2. Biometrics
2.1. Overview
- (a)
- Physiological, which uses certain physical identifying attributes.
- (b)
- Behavioural, which uses certain identifying attributes from an individual’s movement or the manner in which they interact with peripheral devices.
2.2. Fingerprint Authentication
- (a)
- Level 1—macro details: such as friction ridge flow, pattern type (arch, loop, or whorl), and singular points.
- (b)
- Level 2—minutiae: such as ridge ending, ridge bifurcations, independent ridge, island, ridge enclosure, spur, crossover, delta, and core.
- (c)
- Level 3—dimensional attributes: such as ridge path deviation, ridge width, ridge shape, pores, edge contour, incipient ridges, creases, and scars.
2.3. Facial Recognition
2.4. Iris and Retina Detail
2.5. Other Methods
- Ease of use—high for fingerprint, hand geometry, signature and voice. Low for retina scans.
- Sources of error—dirt, dryness, injury, age, glasses, lighting, hair, background noise, behavioural changes over time.
- Accuracy—highest for retina and iris scans.
- User acceptance—highest for signature and voice.
- Stability over time—highest for fingerprint, retina, and iris.
- Cost—variable depending on the level of technology employed.
2.6. Advantages and Disadvantages of Typical Biometric Methods
2.7. Security of Biometric Authentication Systems
- (a)
- A biometric sensor.
- (b)
- A biometric feature extractor.
- (c)
- A secure database to hold registered biometric templates.
- (d)
- A matcher to compare stored biometric information with data extracted from a new scan from the same user.
- (e)
- A decision maker to permit or deny access based on the accuracy of the match.
- (1)
- An attack on the sensor.
- (2)
- The resubmission of previously stored data (replay attack).
- (3)
- Override the feature extractor.
- (4)
- The submission of false biometric feature representation (substitution attack).
- (5)
- An attack on the matcher.
- (6)
- The alteration of stored biometric templates (modification attack).
- (7)
- The alteration of data in transit between template database and matcher (interception attack).
- (8)
- Override the final accept/reject decision.
- (a)
- Cryptography—the secure encryption of digitised data whereby the contents can only be decrypted if the recipient has the appropriate key.
- (b)
- Watermarking—the overt embedding of, for example, a visible mark in order to provide authentication of a biometric image.
- (c)
- Steganography—the covert embedding of, for example, digitised biometric data into a host image file so that the real purpose of the host image is obscured.
3. Steganography
3.1. Overview
3.2. Least Significant Bit (LSB) Embedding
3.3. Discrete Cosine Transform (DCT) Embedding
3.4. Discrete Wavelet Transform (DWT)
3.5. Object-Oriented Embedding (OOE)
- (A)
- Selection of the host image to be used.
- (B)
- Region of interest segmentation to highlight skin-tone areas.
- (C)
- Determination of the eye-centre locations.
- (D)
- Separation of the eye regions.
- (E)
- Distance transformations based on facial features, which are determined for calculations to reduce rotational-distortion errors.
- (F)
- Construction of ellipses, with centre equidistant between the eye centres, minor axis length equal to the distance between eye centres, and the major axis length equal to twice the minor axis length.
- (G)
- Selection of the biometric data to be embedded.
- (H)
- Encryption of the biometric data to be embedded.
- (I)
- Production of the stego-image consisting of the encrypted biometric data embedded into the host image.
3.6. Advantages and Disadvantages of Selected Steganographic Methods
4. Integration of Biometrics and Steganography
- (a)
- Types of biometric features utilised
- (b)
- Methods of steganography employed
- (c)
- Other methods or applications.
- (a)
- Secure online voting systems as proposed, for example, by Katiyar et al. (2011) [69]. Katiyar et al. [69] combined simultaneous cryptography and LSB steganography to propose a biometric and password security method applicable to an online voting system. Their system requires pre-existing biometric and key information at both ends of the system before voting takes place.
- (b)
- Secure online shopping systems as proposed, for example, by Ihmaidi et al. (2006) [64]. The Ihmaidi et al. [64] paper discusses a proposed online shopping system that involves a customer receiving an online shopping card and software. The software issues a unique electronic internet shopping card (EISC) image embedded with customer information, including a fingerprint scan, and transaction details. However, there are two problems: (1) the paper does not indicate whether the card issuer or the customer supplies the fingerprint scanner, and (2) the system ties the customer to the PC to which the fingerprint scanner is connected to conduct online shopping.
- Health Legislation Amendment (eHealth) Act 2015, No. 157, 2015, assented to 26 November 2015 [78].
- The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104–191, enacted on 21 August 1996 [76].
- Digital Imaging and Communications in Medicine (DICOM), the standard for the communication and management of medical imaging information and related data [79].
- Health Level Seven International, a framework (and related standards) for the exchange, integration, sharing, and retrieval of electronic health information [80].
- UN/CEFACT, the United Nations Centre for Trade Facilitation and Electronic Business [81].
- UN/EDIFACT, United Nations rules for Electronic Data Interchange for Administration, Commerce and Transport [82].
- OASIS, “Advancing open standards for the information society” [83].
- eStandards CSA, a European consortium work-in-progress on “eHealth standards and Profiles in Action for Europe and Beyond” [84].
- CEN/TC 251, a European Committee for Standardisation (CEN) work-in-progress to standardise European Union Health Information and Communications Technology (ICT) [85].
- ISO/IEEE 11073, medical/health device communication standards enable communication between medical, health care and wellness devices and with external computer systems [86].
- (a)
- The embedding of digitised and encrypted biometric data into an image of the individual being authenticated to diversify access control verification.
- (b)
- The embedding of digitised and encrypted biometric data into an image unrelated to the individual for the covert transmission of sensitive data.
- Video surveillance.
- Face and gesture recognition.
- Human-computer interaction.
- Human pose modelling.
- Image and video indexing and retrieval.
- Image editing.
- Vehicle drivers’ drowsiness detection.
- Controlling users’ browsing behaviour.
5. Future Direction
- (a)
- Acceptable level of embedding: the capacity to embed data in a cover medium, such as a facial image, varies depending on multiple factors, such as the resolution, dimensions, and content of the host image, as well as the embedding technique employed. The tolerance for the distortions caused by embedding can therefore vary depending on the application. For example, biometrics authentication using facial images could have a higher tolerance compared to eHealth medical imagery, where the slightest foreign visual artefact could lead to a misdiagnosis.
- (b)
- Secure steganography key exchange: one issue that still needs to be resolved is that of the initial stego key exchange, otherwise known as the prisoner’s problem [100]. Various authors have tried to address this conundrum in recent years, but it remains a field of active research to this day. Nonetheless, this issue applies equally to cryptography, where a public/private key exchange is necessary to enable encryption and decryption between a sender and a receiver.
- (c)
- Legal implications of source alteration: steganography essentially manipulates the source medium (i.e., a facial image or patient medical imagery), consequently rendering the data at the sender and receiver different. The integrity of the data is therefore altered, which raises concerns, for example, from a forensic perspective. Therefore, further research is required to determine and introduce provisions into the current legal framework to accommodate steganographic alteration of data.
- (d)
- Industry standards: finally, existing standards need to be extended and/or new standards introduced to govern the use of steganography. Perhaps we are still far from industry adoption of steganography in real-world applications. However, the best approach is to be prepared early rather than relying on impulsive reactions as issues arise.
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
CEN | European Committee for Standardisation |
DCT | Discrete cosine transform |
DICOM | Digital Imaging and Communications in Medicine |
DWT | Discrete wavelet transform |
EISC | Electronic internet shopping card |
FRS | Face recognition system |
HIPAA | Health Information Portability and Accountability Act |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
ISO | International Organisation for Standardisation |
LSB | Least significant bit |
OOE | Object-oriented embedding |
OTP | One-time pin |
PCA | Principal component analysis |
RGB | Red–green–blue |
ROI | Regions of interest |
SVM | Support vector machine |
UN/CEFACT | United Nations Centre for Trade Facilitation and Electronic Business |
UN/EDIFACT | United Nations rules for Electronic Data Interchange for Administration, Commerce and Transport |
References
- Meng, W.; Wong, D.S.; Furnell, S.; Zhou, J. Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 2015, 17, 1268–1293. [Google Scholar] [CrossRef]
- Campisi, P. Security and Privacy in Biometrics; Springer: Berlin/Heidelberg, Germany, 2013; Volume 24. [Google Scholar]
- Marqués, I.; Graña, M. Image security and biometrics: A review. In International Conference on Hybrid Artificial Intelligence Systems; Springer: Berlin/Heidelberg, Germany, 2012; pp. 436–447. [Google Scholar]
- Sirull, E. What Is the Dark Web? 2018. Available online: https://www.experian.com/blogs/ask-experian/what-is-the-dark-web/ (accessed on 11 May 2018).
- Stack, B. Here’S How Much Your Personal Information Is Selling for on The Dark Web. 2018. Available online: https://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/ (accessed on 11 May 2018).
- Hillman, S. Physical security 101: Evolving ‘defense in depth’. InTech Magazine, May/June 2011. [Google Scholar]
- Zheng, G.; Yang, W.; Valli, C.; Qiao, L.; Shankaran, R.; Orgun, M.A.; Mukhopadhyay, S.C. Finger-to-Heart(F2H): Authentication for Wireless Implantable Medical Devices. IEEE J. Biomed. Health Inform. 2018. [Google Scholar] [CrossRef]
- Okoh, E.; Awad, A.I. Biometrics Applications in e-Health Security: A Preliminary Survey. In Health Information Science; Yin, X., Ho, K., Zeng, D., Aickelin, U., Zhou, R., Wang, H., Eds.; Springer: Cham, Switzerland, 2015; pp. 92–103. [Google Scholar]
- Awad, A.I.; Hassanien, A.E.; Zawbaa, H.M. A Cattle Identification Approach Using Live Captured Muzzle Print Images. In Advances in Security of Information and Communication Networks; Awad, A.I., Hassanien, A.E., Baba, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 143–152. [Google Scholar]
- Awad, A.I. From classical methods to animal biometrics: A review on cattle identification and tracking. Comput. Electron. Agric. 2016, 123, 423–435. [Google Scholar] [CrossRef]
- Jain, A.K.; Feng, J.; Nandakumar, K. Fingerprint matching. Computer 2010, 43, 36–44. [Google Scholar] [CrossRef]
- Awad, A.I.; Baba, K. Fingerprint Singularity Detection: A Comparative Study. In Software Engineering and Computer Systems; Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 122–132. [Google Scholar]
- Awad, A.I.; Baba, K. An Application for Singular Point Location in Fingerprint Classification. In Digital Information Processing and Communications; Snasel, V., Platos, J., El-Qawasmeh, E., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 262–276. [Google Scholar]
- Feng, J.; Jain, A.K. Fingerprint Reconstruction: From Minutiae to Phase. IEEE Trans. Pattern Anal. Mach. Intell. 2011, 33, 209–223. [Google Scholar] [CrossRef] [Green Version]
- Peralta, D.; Galar, M.; Triguero, I.; Paternain, D.; García, S.; Barrenechea, E.; Benítez, J.M.; Bustince, H.; Herrera, F. A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation. Inf. Sci. 2015, 315, 67–87. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry 2019, 11, 141. [Google Scholar] [CrossRef]
- Masdari, M.; Ahmadzadeh, S. A Survey and Taxonomy of the Authentication schemes in Telecare Medicine Information Systems. J. Netw. Comput. Appl. 2017, 87, 1–19. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Zheng, G.; Chaudhry, J.; Valli, C. ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures. J. Supercomput. 2018, 74, 4893–4909. [Google Scholar] [CrossRef]
- Akhtar, Z.; Rattani, A. A Face in any Form: New Challenges and Opportunities for Face Recognition Technology. Computer 2017, 50, 80–90. [Google Scholar] [CrossRef]
- Galbally, J.; Ortiz-Lopez, J.; Fierrez, J.; Ortega-Garcia, J. Iris liveness detection based on quality related features. In Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB), New Delhi, India, 29 March–1 April 2012; pp. 271–276. [Google Scholar]
- Mehrotra, H.; Sa, P.K.; Majhi, B. Fast segmentation and adaptive SURF descriptor for iris recognition. Math. Comput. Model. 2013, 58, 132–146. [Google Scholar] [CrossRef]
- Doroz, R.; Wrobel, K.; Porwik, P. An accurate fingerprint reference point determination method based on curvature estimation of separated ridges. Int. J. Appl. Math. Comput. Sci. 2018, 28, 209–225. [Google Scholar] [CrossRef] [Green Version]
- Kshirsagar, V.; Baviskar, M.; Gaikwad, M. Face recognition using Eigenfaces. In Proceedings of the 2011 3rd International Conference on Computer Research and Development (ICCRD), Shanghai, China, 11–15 March 2011; Volume 2, pp. 302–306. [Google Scholar]
- Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit. 2018, 78, 242–251. [Google Scholar] [CrossRef]
- Kumar, A.; Wu, C. Automated human identification using ear imaging. Pattern Recognit. 2012, 45, 956–968. [Google Scholar] [CrossRef]
- Harb, A.; Abbas, M.; Cherry, A.; Jaber, H.; Ayache, M. Palm print recognition. In Proceedings of the 2015 International Conference on Advances in Biomedical Engineering (ICABME), Beirut, Lebanon, 16–18 September 2015; pp. 13–16. [Google Scholar]
- Zhang, D.; Kanhangad, V. Hand geometry recognition. In Encyclopedia of Cryptography and Security; Springer: Berlin/Heidelberg, Germany, 2011; pp. 529–531. [Google Scholar]
- Kang, B.J.; Park, K.R.; Yoo, J.H.; Kim, J.N. Multimodal biometric method that combines veins, prints, and shape of a finger. Opt. Eng. 2011, 50, 017201. [Google Scholar]
- Wrobel, K.; Doroz, R.; Porwik, P.; Naruniec, J.; Kowalski, M. Using a Probabilistic Neural Network for lip-based biometric verification. Eng. Appl. Artif. Intell. 2017, 64, 112–127. [Google Scholar] [CrossRef]
- Wrobel, K.; Doroz, R.; Porwik, P.; Bernas, M. Personal identification utilizing lip print furrow based patterns. A new approach. Pattern Recognit. 2018, 81, 585–600. [Google Scholar] [CrossRef]
- Hashiyada, M. DNA biometrics. In Biometrics; InTech: London, UK, 2011. [Google Scholar] [Green Version]
- Rashed, A.; Santos, H. Odour user interface for authentication: Possibility and acceptance: Case study. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, China, 17–19 March 2010; Volume 1. [Google Scholar]
- Bhatnagar, M.; Jain, R.K.; Khairnar, N.S. A survey on behavioral biometric techniques: Mouse vs. Keyboard dynamics. In Proceedings of the International Conference on Recent Trends in Engineering and Technology, Tamilnadu, India, 15–16 March 2013; pp. 27–30. [Google Scholar]
- Preis, J.; Kessel, M.; Werner, M.; Linnhoff-Popien, C. Gait recognition with kinect. In Proceedings of the 1st International Workshop on Kinect in Pervasive Computing, New Castle, UK, 18–22 June 2012; pp. 1–4. [Google Scholar]
- Rudrapal, D.; Das, S.; Debbarma, S.; Kar, N.; Debbarma, N. Voice recognition and authentication as a proficient biometric tool and its application in online exam for PH people. Int. J. Comput. Appl. 2012, 39, 6–12. [Google Scholar]
- Kumar, P.; Singh, S.; Garg, A.; Prabhat, N. Hand written signature recognition and verification using neural network. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 558–565. [Google Scholar]
- Doroz, R.; Kudlacik, P.; Porwik, P. Online signature verification modeled by stability oriented reference signatures. Inf. Sci. 2018, 460–461, 151–171. [Google Scholar] [CrossRef]
- Pleva, M.; Bours, P.; Ondáš, S.; Juhár, J. Improving static audio keystroke analysis by score fusion of acoustic and timing data. Multimedia Tools Appl. 2017, 76, 25749–25766. [Google Scholar] [CrossRef]
- Amin, R.; Gaber, T.; ElTaweel, G.; Hassanien, A.E. Biometric and traditional mobile authentication techniques: Overviews and open issues. In Bio-Inspiring Cyber Security and Cloud Services: Trends and Innovations; Springer: Berlin/Heidelberg, Germany, 2014; pp. 423–446. [Google Scholar]
- Saini, R.; Rana, N. Comparison of various biometric methods. Int. J. Adv. Sci. Technol. 2014, 2, 2. [Google Scholar]
- Alsaadi, I.M. Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review. Int. J. Sci. Technol. Res. 2015, 4, 285–289. [Google Scholar]
- Tiwari, S.; Chourasia, J.; Chourasia, V.S. A review of advancements in biometric systems. Int. J. Innov. Res. Adv. Eng. 2015, 2, 187–204. [Google Scholar]
- Buciu, I.; Gacsadi, A. Biometrics systems and technologies: A survey. Int. J. Comput. Commun. Control 2016, 11, 315–330. [Google Scholar] [CrossRef]
- Akhtar, Z. Security of Multimodal Biometric Systems Against Spoof Attacks; Department of Electrical and Electronic Engineering, University of Cagliari: Cagliari, Italy, 2012; Volume 6. [Google Scholar]
- Joseph, A.; Sundaram, V. Cryptography and steganography—A survey. Int. J. Comput. Technol. Appl. 2011, 2, 626–630. [Google Scholar]
- Jain, A.K.; Uludag, U. Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 2003, 25, 1494–1498. [Google Scholar] [CrossRef]
- Challita, K.; Farhat, H. Combining steganography and cryptography: New directions. Int. J. New Comput. Archit. Their Appl. (IJNCAA) 2011, 1, 199–208. [Google Scholar]
- Mahale, P.S. A survey on various patterns regarding encryption, a efficient based method regarding cryptography and steganography. Int. J. Latest Trends Eng. Technol. 2013, 2, 341–344. [Google Scholar]
- Pitropakis, N.; Yfantopoulos, N.; Geneiatakis, D.; Lambrinoudakis, C. Towards an augmented authenticator in the Cloud. In Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Noida, India, 15–17 December 2014; pp. 296–300. [Google Scholar]
- Akhtar, N.; Johri, P.; Khan, S. Enhancing the security and quality of LSB based image steganography. In Proceedings of the 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, India, 27–29 September 2013; pp. 385–390. [Google Scholar]
- Kapczyński, A.; Banasik, A. Biometric logical access control enhanced by use of steganography over secured transmission channel. In Proceedings of the 2011 IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Prague, Czech Republic, 15–17 September 2011; Volume 2, pp. 696–699. [Google Scholar]
- Kaur, B.; Kaur, A.; Singh, J. Steganographic approach for hiding image in DCT domain. Int. J. Adv. Eng. Technol. 2011, 1, 72. [Google Scholar]
- Shaik, A.; Thanikaiselvan, V.; Amitharajan, R. Data security through data hiding in images: A review. J. Artif. Intell. 2017, 10, 1–21. [Google Scholar]
- Shejul, A.A.; Kulkarni, U.L. A DWT based approach for steganography using biometrics. In Proceedings of the 2010 International Conference on Data Storage and Data Engineering (DSDE), Bangalore, India, 9–10 February 2010; pp. 39–43. [Google Scholar]
- Kumar, V.; Kumar, D. Performance evaluation of DWT based image steganography. In Proceedings of the 2010 IEEE 2nd International Advance Computing Conference (IACC), Patiala, India, 19–20 February 2010; pp. 223–228. [Google Scholar]
- Cheddad, A.; Condell, J.; Curran, K.; Mc Kevitt, P. Biometric inspired digital image steganography. In Proceedings of the ECBS 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, Belfast, UK, 31 March–4 April 2008; pp. 159–168. [Google Scholar]
- Chaves-González, J.M.; Vega-Rodríguez, M.A.; Gómez-Pulido, J.A.; Sánchez-Pérez, J.M. Detecting skin in face recognition systems: A colour spaces study. Digit. Signal Process. 2010, 20, 806–823. [Google Scholar] [CrossRef]
- Cheddad, A.; Condell, J.; Curran, K.; Mc Kevitt, P. A skin tone detection algorithm for an adaptive approach to steganography. Signal Process. 2009, 89, 2465–2478. [Google Scholar] [CrossRef]
- Zhao, Y.; Dai, S.; Xi, X. A Mumford-Shah level-set approach for skin segmentation using a new color space system. In Proceedings of the International Conference on Simulation and Scientific Computing, Beijing, China, 10–12 October 2008; pp. 307–310. [Google Scholar]
- Prajapati, H.A.; Chitaliya, N.G. Secured and Robust Dual Image Steganography: A Survey. Int. J. Innov. Res. Comput. Commun. Eng. 2015, 3, 30–37. [Google Scholar] [CrossRef]
- Goli, M.S.; Naghsh, A. A comparative study of image-in-image steganography using three methods of least significant bit, discrete wavelet transform and singular value decomposition. Bull. De La Société R. Des Sci. De Liège 2016, 85, 1465–1474. [Google Scholar]
- Thanikaiselvan, V.; Shastri, S.; Ahmad, S. Information hiding: Steganography. In Intelligent Techniques in Signal Processing for Multimedia Security; Springer: Berlin/Heidelberg, Germany, 2017; pp. 65–91. [Google Scholar]
- Ambalakat, P. Security of Biometric Authentication Systems. 2005. Available online: https://pdfs.semanticscholar.org/e1d7/7b951c55d7d1f322d1f96942daa77ec6c4ee.pdf (accessed on 27 March 2019).
- Ihmaidi, H.D.; Al-Jaber, A.; Hudaib, A. Securing online shopping using biometric personal authentication and steganography. In Proceedings of the 2006 2nd International Conference on Information and Communication Technologies, Damascus, Syria, 24–28 April 2006; Volume 1, pp. 233–238. [Google Scholar]
- Kant, C.; Nath, R.; Chaudhary, S. Biometrics security using steganography. Int. J. Secur. 2008, 2, 1–5. [Google Scholar]
- Agrawal, N.; Savvides, M. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Miami, FL, USA, 20–25 June 2009; pp. 85–92. [Google Scholar]
- Na, W.; Chiya, Z.; Xia, L.; Yunjin, W. Enhancing iris-feature security with steganography. In Proceedings of the 2010 the 5th IEEE Conference on Industrial Electronics and Applications (ICIEA), Taichung, Taiwan, 15–17 June 2010; pp. 2233–2237. [Google Scholar]
- Barve, S.; Nagaraj, U.; Gulabani, R. Efficient and secure biometric image stegnography using discrete wavelet transform. Int. J. Comput. Sci. Commun. Netw. 2011, 1, 96–99. [Google Scholar]
- Katiyar, S.; Meka, K.R.; Barbhuiya, F.A.; Nandi, S. Online voting system powered by biometric security using steganography. In Proceedings of the 2011 Second International Conference on Emerging Applications of Information Technology (EAIT), Kolkata, India, 19–20 February 2011; pp. 288–291. [Google Scholar]
- Shejul, A.A.; Kulkarni, U.L. A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theory Eng. 2011, 3, 16. [Google Scholar] [CrossRef]
- Sonsare, P.M.; Sapkal, S. Stegano-crypto system for enhancing biometric-feature security with RSA. In Proceedings of the International Conference on Information and Network Technology; IACSIT Press: Singapore, 2011; pp. 196–200. [Google Scholar]
- Shanthini, B.; Swamynathan, S. Multimodal biometric-based secured authentication system using steganography. J. Comput. Sci. 2012, 8, 1012. [Google Scholar]
- Al-Assam, H.; Rashid, R.; Jassim, S. Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. In Proceedings of the 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), London, UK, 9–12 December 2013; pp. 369–374. [Google Scholar]
- Whitelam, C.; Osia, N.; Bourlai, T. Securing multimodal biometric data through watermarking and steganography. In Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 12–14 November 2013; pp. 61–66. [Google Scholar]
- French, M. Maine Startup Puts Biometric Touch on Data. 2002. Available online: https://www.bizjournals.com/boston/blog/mass-high-tech/2002/08/maine-startup-puts-biometric-touch-on-data.html (accessed on 15 May 2018).
- 104th United States Congress. Health Insurance Protability and Accountability Act of 1996. 1996. Available online: https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm (accessed on 21 May 2018).
- 106th United States Congress. Gramm–Leach–Bliley Act 1999. 1999. Available online: http://www.gpo.gov/fdsys/pkg/STATUTE-113/pdf/STATUTE-113-Pg1338.pdf (accessed on 21 May 2018).
- Parliament of Australia. Health Legislation Amendment (eHealth) Act 2015. 2015. Available online: https://www.legislation.gov.au/Details/C2015A00157 (accessed on 21 May 2018).
- National Electrical Manufacturers Association. Digital Imaging and Communications in Medicine. 2018. Available online: https://www.dicomstandard.org/current/ (accessed on 21 May 2018).
- Health Level Seven International. Introduction to HL7 Standards. 2018. Available online: http://www.hl7.org/implement/standards/index.cfm?ref=nav (accessed on 21 May 2018).
- United Nations Economic Commission for Europe. UN/CEFACT. 2018. Available online: https://www.unece.org/cefact.html (accessed on 21 May 2018).
- United Nations Economic Commission for Europe. Introducing UN/EDIFACT. 2018. Available online: https://www.unece.org/cefact/edifact/welcome.html (accessed on 21 May 2018).
- OASIS. OASIS Standards. 2018. Available online: https://www.oasis-open.org/standards (accessed on 21 May 2018).
- eStandards. eHealth Standards and Profiles in Action for Europe and Beyond. 2018. Available online: http://www.estandards-project.eu/ (accessed on 21 May 2018).
- European Committee for Standardization (CEN). CEN/TC 251—Health Informatics. 2018. Available online: https://standards.cen.eu/dyn/www/f?p=204:7:0::::FSP_ORG_ID:6232cs=18CA078392807EDD402B798AAEF1644E1 (accessed on 21 May 2018).
- ISO/IEEE. IEEE 11073 Personal Health Devices. 2018. Available online: http://11073.org/ (accessed on 21 May 2018).
- International Organization for Standardization. Standards Catalogue 35.030—IT Security. 2018. Available online: https://www.iso.org/ics/35.030/x/ (accessed on 25 May 2018).
- NEC Australia. NeoFace Facial Recognition—Overview. 2018. Available online: https://au.nec.com/en_AU/solutions/security-and-public-safety/biometrics/neoface-facial-recognition-overview.html (accessed on 25 May 2018).
- UniLink. 2018. Available online: http://www.unilink.com/ (accessed on 25 May 2018).
- Damstra Technology. Damstra. 2018. Available online: https://www.damstratechnology.com/ (accessed on 25 May 2018).
- M2SYS Technology. M2SYS. 2018. Available online: http://www.m2sys.com/ (accessed on 25 May 2018).
- International Security Control Solutions. ISCS. 2018. Available online: http://www.iscs.com.au/ (accessed on 25 May 2018).
- Find Biometrics. 2018. Available online: https://findbiometrics.com/ (accessed on 25 May 2018).
- HID Global. 2018. Available online: https://www.hidglobal.com/ (accessed on 25 May 2018).
- Gemalto. 2018. Available online: https://www.gemalto.com/ (accessed on 25 May 2018).
- Kisi. 2018. Available online: https://www.getkisi.com/ (accessed on 25 May 2018).
- Abloy. 2018. Available online: https://www.abloy.com/en/abloy/abloycom/ (accessed on 25 May 2018).
- University of Bologna. Biometric System Laboratory. Available online: http://biolab.csr.unibo.it/home.asp (accessed on 29 May 2018).
- Michigan State University. Pattern Recognition and Image Processing Laboratory. Available online: http://www.cse.msu.edu/prip/General/ (accessed on 29 May 2018).
- Simmons, G.J. The prisoners’ problem and the subliminal channel. In Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 1984; pp. 51–67. [Google Scholar]
Biometric Method | Advantages | Disadvantages |
---|---|---|
Physiological Characteristics: | ||
Fingerprint |
|
|
Face |
|
|
Iris |
|
|
Retina |
|
|
Vein Geometry |
|
|
Ear Geometry |
|
|
Palm Print |
|
|
Hand Geometry |
|
|
Lip Furrows |
|
|
DNA |
|
|
Odour/Scent |
|
|
Behavioural Characteristics: | ||
Keyboard Dynamics |
|
|
Mouse Dynamics |
|
|
Gait |
|
|
Voice |
|
|
Signature |
|
|
Steganographic Method | Advantages | Disadvantages |
---|---|---|
Least Significant Bit (LSB) |
|
|
Discrete Cosine Transform (DCT) |
|
|
Discrete Wavelet Transform (DWT) |
|
|
Object-Oriented Embedding (OOE) |
|
|
Biometrics | Steganography | Other | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Research Paper | Fingerprint Minutiae | Face Image | Iris or Retina Detail | Keyboard Dynamics | Skin-Tone Detection | LSB (Spatial Domain) | DCT (Spectral Domain) | DWT (Spectral Domain) | Object Oriented | Other or Unspecified | Cryptography | Application Specific | Assumes Key Pre-Sharing | Authentication |
Jain and Uludag (2003) [46] | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Ambalakat (2005) [63] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Ihmaidi et al. (2006) [64] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Cheddad et al. (2008) [56] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||
Kant et al. (2008) [65] | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Agrawal and Savvides (2009) [66] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||
Chedded et al. (2009) [58] | ✔ | ✔ | ✔ | ✔ | ||||||||||
Na et al. (2010) [67] | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Shejul and Kulkami (2010) [54] | ✔ | ✔ | ✔ | ✔ | ||||||||||
Barve and et al. (2011) [68] | ✔ | ✔ | ✔ | ✔ | ||||||||||
Kapczyński and Banasik (2011) [51] | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||||
Katiyar et al. (2011) [69] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Shejul and Kulkami (2011) [70] | ✔ | ✔ | ✔ | ✔ | ||||||||||
Sonsare and Sapkal (2011) [71] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |||||||
Shanthini and Swamynathan (2012) [72] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ||||||||
Al-Assam et al. (2013) [73] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | Once only | ✔ | ||||||
Whitelam et al. (2013) [74] | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |
Category | Count | Percentage |
---|---|---|
Biometrics: | ||
Fingerprint Minutiae | 11 | 36.67% |
Face Image | 8 | 26.67% |
Iris or Retina Detail | 5 | 16.67% |
Keyboard Dynamics | 1 | 3.33% |
Skin-Tone Detection | 5 | 16.67% |
Steganography: | ||
LSB (Spatial Domain) | 8 | 30.77% |
DCT (Spectral Domain) | 4 | 15.38% |
DWT (Spectral Domain) | 7 | 26.92% |
Object-Oriented | 5 | 19.23% |
Other or Unspecified | 2 | 7.69% |
Other: | ||
Cryptography | 9 | 81.82% |
Application-Specific | 2 | 18.18% |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
McAteer, I.; Ibrahim, A.; Zheng, G.; Yang, W.; Valli, C. Integration of Biometrics and Steganography: A Comprehensive Review. Technologies 2019, 7, 34. https://doi.org/10.3390/technologies7020034
McAteer I, Ibrahim A, Zheng G, Yang W, Valli C. Integration of Biometrics and Steganography: A Comprehensive Review. Technologies. 2019; 7(2):34. https://doi.org/10.3390/technologies7020034
Chicago/Turabian StyleMcAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. 2019. "Integration of Biometrics and Steganography: A Comprehensive Review" Technologies 7, no. 2: 34. https://doi.org/10.3390/technologies7020034
APA StyleMcAteer, I., Ibrahim, A., Zheng, G., Yang, W., & Valli, C. (2019). Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), 34. https://doi.org/10.3390/technologies7020034