Skip to main content
Log in

Securing recognized multimodal biometric images using cryptographic model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The security of recognized biometric images keeps sensitive data from the vindictive behavior in transmission. An optional technique to guarantee the secrecy and abnormal state of security is cryptography. The protection of biometrics images raises significant worries, specifically if calculations over biometric information are performed at untrusted servers. In our previous work, the multimodal biometric images are recognized dependent on optimal features. To ensure these recognized images, a cryptographic strategy is proposed in this investigation. At first, the recognized images are given to the progressive cryptographic method which is utilized to the secret image is shared safely and furthermore, its data is kept up with the most extreme classification. In this research work, various shadows have been produced from one image with the assistance of the Visual Shadow Creation (VSC) Process. The different shadows are utilized to move the secret image by utilizing the encryption and decoding process by methods for Elliptic Curve Cryptography (ECC). The proposed method offers better security for shadows and reduced the fraudulent shares of the secret image. The performance investigation of the proposed cryptographic demonstrates the high security, adequacy, and power compared with existing cryptographic algorithms. The abovementioned systems are actualized in MATLAB programming.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdolrahimpour H, Shahab E (2017) A short survey of visual cryptography and secret image sharing techniques and applications. Int Adv Res J Sci Eng Technol 4(3):58–62

  2. Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin

    Book  Google Scholar 

  3. Abualigah L (2020) Multi-verse optimizer algorithm: a comprehensive survey of its results, variants, and applications. Neural Comput & Applic 32(16):12381–12401

    Article  Google Scholar 

  4. Abualigah L, Khader A (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795

    Google Scholar 

  5. Ali Z, Hossain MS, Muhammad G, Ullah I, Abachi H, Alamri A (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76–87

    Article  Google Scholar 

  6. Allaoui M, Ahiod B, El Yafrani M (2018) A hybrid crow search algorithm for solving the DNA fragment assembly problem. Expert Syst Appl 102:44–56

    Article  Google Scholar 

  7. Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1–12

    Article  Google Scholar 

  8. Bedi P, Bansal R, Sehgal P (2012) Multimodal biometric authentication using PSO based watermarking. Procedia Technol 4:612–618

    Article  Google Scholar 

  9. Chang J, Huang BY, Juan J (2018) A new visual multi-secrets sharing scheme by random grids. Cryptography 2(3):24

    Article  Google Scholar 

  10. Dixit S, Jain DK, Saxena A (2014) An approach for secret sharing using randomised visual secret sharing. In: 2014 fourth international conference on communication systems and network technologies (pp. 847-850). IEEE

  11. Evangelin L, Fred A (2019) Reduced optimal feature based biometric authentication using MALO-MKSVM techniques. Multimed Tools Appl 78(22):31077–31100

    Article  Google Scholar 

  12. Gupta D, Sundaram S, Khanna A, Ella Hassanien A, de Albuquerque VHC (2018) Improved diagnosis of Parkinson’s disease using optimized crow search algorithm. Comput Electr Eng 68:412–424

    Article  Google Scholar 

  13. Gupta S, Buriro A, Crispo B (2019) DriverAuth: a risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. Comput Secur 83:122–139

    Article  Google Scholar 

  14. Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Futur Gener Comput Syst 91:434–449

    Article  Google Scholar 

  15. Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107–122

    Article  Google Scholar 

  16. Jagadiswary D, Saraswady D (2016) Biometric authentication using fused multimodal biometric. Procedia Comput Sci 85:109–116

    Article  Google Scholar 

  17. Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13–15):3026–3031

    Article  Google Scholar 

  18. Kumar S, Singh SK, Singh AK, Tiwari S, Singh RS (2018) Privacy preserving security using biometrics in cloud computing. Multimed Tools Appl 77(9):11017–11039

    Article  Google Scholar 

  19. Leng L, Teoh ABJ (2015) Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn 48(7):2290–2303

    Article  Google Scholar 

  20. Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989

    Article  Google Scholar 

  21. Leng L, Zhang J (2012) Palmhash code for palmprint verification and protection. In: 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. IEEE

  22. Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In: International conference on computational science and its applications, pp. 458–470. Springer, Berlin, Heidelberg

  23. Leng L, Teoh ABJ, Li M (2017) Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76(6):8373–8398

    Article  Google Scholar 

  24. Li P, Li T, Yao ZA, Tang CM, Li J (2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):4349–4359

    Article  Google Scholar 

  25. Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimed Tools Appl 72(1):637–666

    Article  Google Scholar 

  26. Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: 2004 first annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004. IEEE SECON 2004. (pp. 71-80). IEEE

  27. Pavešić N, Savič T, Ribarić S, (2006) Multimodal biometric authentication system based on hand features. In: from data and information analysis to knowledge engineering (pp. 630-637). Springer, Berlin, Heidelberg

  28. Rzouga Haddada L, Dorizzi B, Essoukri Ben Amara N (2017) A combined watermarking approach for securing biometric data. Signal Process Image Commun 55:23–31

    Article  Google Scholar 

  29. Saevanee H, Clarke N, Furnell S, Biscione V (2015) Continuous user authentication using multi-modal biometrics. Comput Secur 53:234–246

    Article  Google Scholar 

  30. Sarier ND (2017) Privacy preserving multimodal biometric authentication in the cloud. In: International conference on green, pervasive, and cloud computing (pp. 90-104). Springer, Cham

  31. Sarier ND (2018) Multimodal biometric identity based encryption. Futur Gener Comput Syst 80:112–125

    Article  Google Scholar 

  32. Sasaki M, Watanabe Y (2017) Visual secret sharing schemes encrypting multiple images. IEEE Trans Inf Forensics Secur 13(2):356–365

    Article  Google Scholar 

  33. Saudy NF, Ali IA, Al Barkouky R (2019) Error analysis and detection procedures for elliptic curve cryptography. Ain Shams Eng J 10(3):587–597

  34. Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138

    Article  Google Scholar 

  35. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  36. Sujatha E, Chilambuchelvan A (2018) Multimodal biometric authentication algorithm using iris, palm print, face and signature with encoded dwt. Wirel Pers Commun 99(1):23–34

    Article  Google Scholar 

  37. Vidya BS, Chandra E (2019) Entropy based local binary pattern (ELBP) feature extraction technique of multimodal biometrics as defence mechanism for cloud storage. Alex Eng J 58(1):103–114

    Article  Google Scholar 

  38. Walia GS, Singh T, Singh K, Verma N (2019) Robust multimodal biometric system based on optimal score level fusion model. Expert Syst Appl 116:364–376

    Article  Google Scholar 

  39. Wang F, Han J (2009) Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electron Rev 17(1):59–64

    Article  Google Scholar 

  40. Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735–3744

    Article  Google Scholar 

  41. Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389–398

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Nisha Evangelin.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Evangelin, L.N., Fred, A.L. Securing recognized multimodal biometric images using cryptographic model. Multimed Tools Appl 80, 18735–18752 (2021). https://doi.org/10.1007/s11042-021-10541-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10541-8

Keywords

Navigation