Abstract
The concept of image steganography involves concealing secret message, using stego key and cover image. The stego key is used both at the sender side and the receiver side, for insertion as well as for extraction of secret message. Thus, the stego key and the insertion algorithm are connected closely in image steganography. The process of insertion requires a unique method of embedding data in the original cover image for generating the stego image, such that it is difficult for the hacker to know the presence of secret data. This process in turn depends on the stego key to a large extent. On the other hand, biometrics has been accepted as one of the strongest ways of confirming the identity of any individual. This paper focuses both on biometrics and steganography for the secret transmission of data. Thus, a unique key has been generated from the fingerprint image, as a part of biometrics, where the special features of the image have been extracted. The special features and their corresponding locations have been found. These locations are used for data embedding in the cover image, thus paving the path for a unique way of insertion of secret bits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://www.trustwave.com. Last accessed 10 Mar 2020
Bhanupriya Katre, B.: Dynamic key based LSB technique for steganography. Int. J. Comput. Appl. 167(13), 0975–8887 (2017)
http://whatis.techtarget.com. Last accessed 10 Mar 2020
https://www.techrepublic.com. Last accessed 10 Mar 2020
https://link.springer.com. Last accessed 21 Feb 2019
https://en.wikipedia.org. Last accessed 10 Mar 2020
Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: concepts and practice. 22 Apr 2004, 1:49 WSPC/Lecture Notes Series: 9in x 6in MAIN
Srilakshmi, P., Himabindu, Ch., Chaitanya, N., Muralidhar, S.V., Sumanth, M.V., Vinay, K.: Text embedding using image steganography in spatial domain. Int. J. Eng. Technol. 7(3.6) 1–4 (2018)
Sahu, A.K., Swain, G.: Digital image steganography using PVD and modulo operation. Internetworking Indonesia J. 10(2) (2018)
Majumder, J., Pradhan, C.: High capacity image steganography using pixel value differencing method with data compression using neural network. Int. J. Innov. Technol. Explor. Eng. (IJITEE). 8(12) (2019). ISSN: 2278–3075
Rashid, RD, Majeed, TF: Edge based image steganography: problems and solution. In: 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Electronic ISBN: 978-1-7281-2085-0, USB ISBN: 978-1-7281-2084-3, Print on Demand (PoD) ISBN: 978-1-7281-2086-7 (March 2019)
Margalikas, E., Ramanauskaitė, S.: Image steganography based on color palette transformation in color space. EURASIP J. Image Video Process. Article number: 82 (2019)
Rachmawanto, E.H., Rosal, D., Setiadi, I.M., Sari, C.A., Andono, P.N., Farooq, O., Pradita, N.: Spread embedding technique in LSB image steganography based on chaos theory. In: 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Electronic ISBN: 978-1-7281-3832-9, USB ISBN: 978-1-7281-3831-2, Print on Demand (PoD) ISBN: 978-1-7281-3833-6 (2019)
Al-Husainy, M.A.F.: Image steganography by mapping pixels to letters. J. Comput. Sci. 5(1):33–38 (2009). ISSN 1549-3636 © 2009 Science Publications
Liu, H.-H., Lee, C.-M.: High-capacity reversible image steganography based on pixel value ordering. EURASIP J. Image Video Process. Article number: 54 (2019)
Hameed, M.A., Hassaballah, M., Aly, S., Awad, A.I.: An adaptive image steganography method based on histogram of oriented gradientand PVD-LSB techniques. Digital Object Identifier 10.1109/ACCESS.2019.2960254. 17th Dec 2019
https://in.mathworks.com. Last accessed 10 Mar 2020
https://www.igi-global.com/dictionary/moving-object-detection-and-tracking-based-on-the-contour-extraction-and-centroid-representation/20697. Last accessed 10 Mar 2020
https://www.cmlab.csie.ntu.edu.tw/cml/dsp/training/coding/motion/me1.html. Last accessed 10 Mar 2020
https://www.usenix.org/legacy/publications/library/proceedings/sec2000/full_papers/dhamija/dhamija_html/node2.html. Last accessed 10 Mar 2020
https://thenextweb.com/future-of-communications/2016/02/17/the-ultimate-guide-to-selecting-a-device-authentication/. Last accessed 10 Mar 2020
The Irish Council for Bioethics, Biometrics: Enhancing Security or Invading Privacy? www.bioethics.ie
Tukur, A.: Fingerprint recognition and matching using matlab. Int. J. Eng. Sci. (IJES) 4(12), 01–06 (2015), ISSN(e):2319-1813, ISSN (p): 2319-1805
Bansal, R., Sehgal, P., Bedi, P.: Minutiae extraction from fingerprint images—a review. IJCSI Int. J. Comput. Sci. 8(5), No 3, ISSN (Online): 1694–0814. www.IJCSI.org (September 2011)
http://biometrics.cse.msu.edu/Publications/Fingerprint/PankantiPrabhakarJain_FpIndividuality_PAMI02.pdf. Last accessed 10 Mar 2020
http://kaheel7.com/eng/index.php/gods-creations/580-humans-fingerprints. Last accessed 10 Mar 2020
https://openclipart.org/tags/fingerprint. Last accessed 10 Mar 2020
Zahed, A., Sakhi, M.R.: A novel technique for enhancing security in biometric based authentication systems. Int. J. Comput. Electr. Eng. 3(4) (2011)
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. http://www.ws.binghamton.edu/fridrich
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) Information hiding, LNCS 1525, pp. 344–354. Springer, Berlin (1998)
Rana, M.S., Sangwan, B.S., Jangir, J.S.: Art of hiding: an introduction to steganography. Int. J. Eng. Comput. Sci. 1(1), 11–22 (2012)
Kumar, A., Pooja, K.M.: Steganography—a data hiding technique. Int. J. Comput. Appl. 9(7), 0975–8887 (2010)
Sharma, V., Kumar, S.: A new approach to hide text in images using steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(4) (2013). ISSN: 2277-128X
Kabay, M.E.: Identification, Authentication and Authorization on the World Wide Web. M. E. Kabay & ICSA (1997)
Zaeri, N.: Minutiae-based fingerprint extraction and recognition. INTECH, Open Science/Open Minds
Keerthana, M.S.: Fingerprint matching incorporating ridge features using contourlet transforms. Int. J. Innov. Res. Comput. Commun. Eng. ISSN(Online): 2320–9801, ISSN (Print): 2320-9798
Parra, P.: Fingerprint Minutiae Extraction and Matching for Identification Procedure. Department of Computer Science and Engineering, University of California, San Diego
Barham, Z.S.: Finger print recognition using MATLAB
Fridrich, J., Goljan, M., Soukal, D.: Searching for the Stego-Key. http://www.ws.binghamton.edu/fridrich
http://blogs.getcertifiedgetahead.com. Last accessed 14 Mar 2019
https://securitycommunity.tcs.com. Last accessed 18 Feb 2019
http://onin.com. Last accessed 15 Apr 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Anuradha, A., Pandit, H.B. (2021). Unique Stego Key Generation from Fingerprint Image in Image Steganography. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-15-7062-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-7062-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7061-2
Online ISBN: 978-981-15-7062-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)