Skip to main content

Unique Stego Key Generation from Fingerprint Image in Image Steganography

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems ( ICTIS 2020)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 196))

  • 1140 Accesses

Abstract

The concept of image steganography involves concealing secret message, using stego key and cover image. The stego key is used both at the sender side and the receiver side, for insertion as well as for extraction of secret message. Thus, the stego key and the insertion algorithm are connected closely in image steganography. The process of insertion requires a unique method of embedding data in the original cover image for generating the stego image, such that it is difficult for the hacker to know the presence of secret data. This process in turn depends on the stego key to a large extent. On the other hand, biometrics has been accepted as one of the strongest ways of confirming the identity of any individual. This paper focuses both on biometrics and steganography for the secret transmission of data. Thus, a unique key has been generated from the fingerprint image, as a part of biometrics, where the special features of the image have been extracted. The special features and their corresponding locations have been found. These locations are used for data embedding in the cover image, thus paving the path for a unique way of insertion of secret bits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.trustwave.com. Last accessed 10 Mar 2020

  2. Bhanupriya Katre, B.: Dynamic key based LSB technique for steganography. Int. J. Comput. Appl. 167(13), 0975–8887 (2017)

    Google Scholar 

  3. http://whatis.techtarget.com. Last accessed 10 Mar 2020

  4. https://www.techrepublic.com. Last accessed 10 Mar 2020

  5. https://link.springer.com. Last accessed 21 Feb 2019

  6. https://en.wikipedia.org. Last accessed 10 Mar 2020

  7. Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: concepts and practice. 22 Apr 2004, 1:49 WSPC/Lecture Notes Series: 9in x 6in MAIN

    Google Scholar 

  8. Srilakshmi, P., Himabindu, Ch., Chaitanya, N., Muralidhar, S.V., Sumanth, M.V., Vinay, K.: Text embedding using image steganography in spatial domain. Int. J. Eng. Technol. 7(3.6) 1–4 (2018)

    Google Scholar 

  9. Sahu, A.K., Swain, G.: Digital image steganography using PVD and modulo operation. Internetworking Indonesia J. 10(2) (2018)

    Google Scholar 

  10. Majumder, J., Pradhan, C.: High capacity image steganography using pixel value differencing method with data compression using neural network. Int. J. Innov. Technol. Explor. Eng. (IJITEE). 8(12) (2019). ISSN: 2278–3075

    Google Scholar 

  11. Rashid, RD, Majeed, TF: Edge based image steganography: problems and solution. In: 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Electronic ISBN: 978-1-7281-2085-0, USB ISBN: 978-1-7281-2084-3, Print on Demand (PoD) ISBN: 978-1-7281-2086-7 (March 2019)

    Google Scholar 

  12. Margalikas, E., Ramanauskaitė, S.: Image steganography based on color palette transformation in color space. EURASIP J. Image Video Process. Article number: 82 (2019)

    Google Scholar 

  13. Rachmawanto, E.H., Rosal, D., Setiadi, I.M., Sari, C.A., Andono, P.N., Farooq, O., Pradita, N.: Spread embedding technique in LSB image steganography based on chaos theory. In: 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Electronic ISBN: 978-1-7281-3832-9, USB ISBN: 978-1-7281-3831-2, Print on Demand (PoD) ISBN: 978-1-7281-3833-6 (2019)

    Google Scholar 

  14. Al-Husainy, M.A.F.: Image steganography by mapping pixels to letters. J. Comput. Sci. 5(1):33–38 (2009). ISSN 1549-3636 © 2009 Science Publications

    Google Scholar 

  15. Liu, H.-H., Lee, C.-M.: High-capacity reversible image steganography based on pixel value ordering. EURASIP J. Image Video Process. Article number: 54 (2019)

    Google Scholar 

  16. Hameed, M.A., Hassaballah, M., Aly, S., Awad, A.I.: An adaptive image steganography method based on histogram of oriented gradientand PVD-LSB techniques. Digital Object Identifier 10.1109/ACCESS.2019.2960254. 17th Dec 2019

    Google Scholar 

  17. https://in.mathworks.com. Last accessed 10 Mar 2020

  18. https://www.igi-global.com/dictionary/moving-object-detection-and-tracking-based-on-the-contour-extraction-and-centroid-representation/20697. Last accessed 10 Mar 2020

  19. https://www.cmlab.csie.ntu.edu.tw/cml/dsp/training/coding/motion/me1.html. Last accessed 10 Mar 2020

  20. https://www.usenix.org/legacy/publications/library/proceedings/sec2000/full_papers/dhamija/dhamija_html/node2.html. Last accessed 10 Mar 2020

  21. https://thenextweb.com/future-of-communications/2016/02/17/the-ultimate-guide-to-selecting-a-device-authentication/. Last accessed 10 Mar 2020

  22. The Irish Council for Bioethics, Biometrics: Enhancing Security or Invading Privacy? www.bioethics.ie

  23. Tukur, A.: Fingerprint recognition and matching using matlab. Int. J. Eng. Sci. (IJES) 4(12), 01–06 (2015), ISSN(e):2319-1813, ISSN (p): 2319-1805

    Google Scholar 

  24. Bansal, R., Sehgal, P., Bedi, P.: Minutiae extraction from fingerprint images—a review. IJCSI Int. J. Comput. Sci. 8(5), No 3, ISSN (Online): 1694–0814. www.IJCSI.org (September 2011)

  25. http://biometrics.cse.msu.edu/Publications/Fingerprint/PankantiPrabhakarJain_FpIndividuality_PAMI02.pdf. Last accessed 10 Mar 2020

  26. http://kaheel7.com/eng/index.php/gods-creations/580-humans-fingerprints. Last accessed 10 Mar 2020

  27. https://openclipart.org/tags/fingerprint. Last accessed 10 Mar 2020

  28. Zahed, A., Sakhi, M.R.: A novel technique for enhancing security in biometric based authentication systems. Int. J. Comput. Electr. Eng. 3(4) (2011)

    Google Scholar 

  29. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. http://www.ws.binghamton.edu/fridrich

  30. Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) Information hiding, LNCS 1525, pp. 344–354. Springer, Berlin (1998)

    Google Scholar 

  31. Rana, M.S., Sangwan, B.S., Jangir, J.S.: Art of hiding: an introduction to steganography. Int. J. Eng. Comput. Sci. 1(1), 11–22 (2012)

    Google Scholar 

  32. Kumar, A., Pooja, K.M.: Steganography—a data hiding technique. Int. J. Comput. Appl. 9(7), 0975–8887 (2010)

    Google Scholar 

  33. Sharma, V., Kumar, S.: A new approach to hide text in images using steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(4) (2013). ISSN: 2277-128X

    Google Scholar 

  34. Kabay, M.E.: Identification, Authentication and Authorization on the World Wide Web. M. E. Kabay & ICSA (1997)

    Google Scholar 

  35. Zaeri, N.: Minutiae-based fingerprint extraction and recognition. INTECH, Open Science/Open Minds

    Google Scholar 

  36. Keerthana, M.S.: Fingerprint matching incorporating ridge features using contourlet transforms. Int. J. Innov. Res. Comput. Commun. Eng. ISSN(Online): 2320–9801, ISSN (Print): 2320-9798

    Google Scholar 

  37. Parra, P.: Fingerprint Minutiae Extraction and Matching for Identification Procedure. Department of Computer Science and Engineering, University of California, San Diego

    Google Scholar 

  38. Barham, Z.S.: Finger print recognition using MATLAB

    Google Scholar 

  39. Fridrich, J., Goljan, M., Soukal, D.: Searching for the Stego-Key. http://www.ws.binghamton.edu/fridrich

  40. http://blogs.getcertifiedgetahead.com. Last accessed 14 Mar 2019

  41. https://securitycommunity.tcs.com. Last accessed 18 Feb 2019

  42. http://onin.com. Last accessed 15 Apr 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Anuradha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anuradha, A., Pandit, H.B. (2021). Unique Stego Key Generation from Fingerprint Image in Image Steganography. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-15-7062-9_4

Download citation

Publish with us

Policies and ethics