Abstract
The security of recognized biometric images keeps sensitive data from the vindictive behavior in transmission. An optional technique to guarantee the secrecy and abnormal state of security is cryptography. The protection of biometrics images raises significant worries, specifically if calculations over biometric information are performed at untrusted servers. In our previous work, the multimodal biometric images are recognized dependent on optimal features. To ensure these recognized images, a cryptographic strategy is proposed in this investigation. At first, the recognized images are given to the progressive cryptographic method which is utilized to the secret image is shared safely and furthermore, its data is kept up with the most extreme classification. In this research work, various shadows have been produced from one image with the assistance of the Visual Shadow Creation (VSC) Process. The different shadows are utilized to move the secret image by utilizing the encryption and decoding process by methods for Elliptic Curve Cryptography (ECC). The proposed method offers better security for shadows and reduced the fraudulent shares of the secret image. The performance investigation of the proposed cryptographic demonstrates the high security, adequacy, and power compared with existing cryptographic algorithms. The abovementioned systems are actualized in MATLAB programming.
Similar content being viewed by others
References
Abdolrahimpour H, Shahab E (2017) A short survey of visual cryptography and secret image sharing techniques and applications. Int Adv Res J Sci Eng Technol 4(3):58–62
Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin
Abualigah L (2020) Multi-verse optimizer algorithm: a comprehensive survey of its results, variants, and applications. Neural Comput & Applic 32(16):12381–12401
Abualigah L, Khader A (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795
Ali Z, Hossain MS, Muhammad G, Ullah I, Abachi H, Alamri A (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76–87
Allaoui M, Ahiod B, El Yafrani M (2018) A hybrid crow search algorithm for solving the DNA fragment assembly problem. Expert Syst Appl 102:44–56
Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1–12
Bedi P, Bansal R, Sehgal P (2012) Multimodal biometric authentication using PSO based watermarking. Procedia Technol 4:612–618
Chang J, Huang BY, Juan J (2018) A new visual multi-secrets sharing scheme by random grids. Cryptography 2(3):24
Dixit S, Jain DK, Saxena A (2014) An approach for secret sharing using randomised visual secret sharing. In: 2014 fourth international conference on communication systems and network technologies (pp. 847-850). IEEE
Evangelin L, Fred A (2019) Reduced optimal feature based biometric authentication using MALO-MKSVM techniques. Multimed Tools Appl 78(22):31077–31100
Gupta D, Sundaram S, Khanna A, Ella Hassanien A, de Albuquerque VHC (2018) Improved diagnosis of Parkinson’s disease using optimized crow search algorithm. Comput Electr Eng 68:412–424
Gupta S, Buriro A, Crispo B (2019) DriverAuth: a risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. Comput Secur 83:122–139
Hamidi H (2019) An approach to develop the smart health using internet of things and authentication based on biometric technology. Futur Gener Comput Syst 91:434–449
Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107–122
Jagadiswary D, Saraswady D (2016) Biometric authentication using fused multimodal biometric. Procedia Comput Sci 85:109–116
Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13–15):3026–3031
Kumar S, Singh SK, Singh AK, Tiwari S, Singh RS (2018) Privacy preserving security using biometrics in cloud computing. Multimed Tools Appl 77(9):11017–11039
Leng L, Teoh ABJ (2015) Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn 48(7):2290–2303
Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989
Leng L, Zhang J (2012) Palmhash code for palmprint verification and protection. In: 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. IEEE
Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In: International conference on computational science and its applications, pp. 458–470. Springer, Berlin, Heidelberg
Leng L, Teoh ABJ, Li M (2017) Simplified 2DPalmHash code for secure palmprint verification. Multimed Tools Appl 76(6):8373–8398
Li P, Li T, Yao ZA, Tang CM, Li J (2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):4349–4359
Ma B, Wang Y, Li C, Zhang Z, Huang D (2014) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimed Tools Appl 72(1):637–666
Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: 2004 first annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004. IEEE SECON 2004. (pp. 71-80). IEEE
Pavešić N, Savič T, Ribarić S, (2006) Multimodal biometric authentication system based on hand features. In: from data and information analysis to knowledge engineering (pp. 630-637). Springer, Berlin, Heidelberg
Rzouga Haddada L, Dorizzi B, Essoukri Ben Amara N (2017) A combined watermarking approach for securing biometric data. Signal Process Image Commun 55:23–31
Saevanee H, Clarke N, Furnell S, Biscione V (2015) Continuous user authentication using multi-modal biometrics. Comput Secur 53:234–246
Sarier ND (2017) Privacy preserving multimodal biometric authentication in the cloud. In: International conference on green, pervasive, and cloud computing (pp. 90-104). Springer, Cham
Sarier ND (2018) Multimodal biometric identity based encryption. Futur Gener Comput Syst 80:112–125
Sasaki M, Watanabe Y (2017) Visual secret sharing schemes encrypting multiple images. IEEE Trans Inf Forensics Secur 13(2):356–365
Saudy NF, Ali IA, Al Barkouky R (2019) Error analysis and detection procedures for elliptic curve cryptography. Ain Shams Eng J 10(3):587–597
Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138
Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130
Sujatha E, Chilambuchelvan A (2018) Multimodal biometric authentication algorithm using iris, palm print, face and signature with encoded dwt. Wirel Pers Commun 99(1):23–34
Vidya BS, Chandra E (2019) Entropy based local binary pattern (ELBP) feature extraction technique of multimodal biometrics as defence mechanism for cloud storage. Alex Eng J 58(1):103–114
Walia GS, Singh T, Singh K, Verma N (2019) Robust multimodal biometric system based on optimal score level fusion model. Expert Syst Appl 116:364–376
Wang F, Han J (2009) Multimodal biometric authentication based on score level fusion using support vector machine. Opto-Electron Rev 17(1):59–64
Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735–3744
Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389–398
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Evangelin, L.N., Fred, A.L. Securing recognized multimodal biometric images using cryptographic model. Multimed Tools Appl 80, 18735–18752 (2021). https://doi.org/10.1007/s11042-021-10541-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10541-8