1 Introduction

With an increase in technology, the need for the security of individual’s information is also becoming a major concern. Automated teller machines (ATMs) are a common gadget which is highly used by humans to perform financial and banking related transactions. It has become worldwide famous within the public due to its features like accessibility and user-friendliness. Access of private information in ATM is possible by using passwords or personal identification numbers (PINs) as they are easy to use, but still it’s defenseless against the various types of attack (Phishing attack, Spoofing attack, Sniffing etc.). So as an alternative method i.e. biometrics are being employed. Biometrics utilizes human physiological or behavioral features for individual authentication and provides higher concern to information security, due to which it is being emerged as one of the most popular alternatives to the traditional password or PIN based authentication systems. But some biometrics authentication system like fingerprints, iris, faces, voice or palm have several disadvantages for example the patterns can be forged due to their physical appearance thus making it unprotected against attackers.

Unique finger print authentication also has few disadvantages. As, it can smoothly be ripped off by utilizing a fake finger and can be unrecognized due to presence of injuries or dirts in finger. Since Iris recognition relies on the intensity of the light, its recognition rate is less accurate [1]. The light condition, expression of the face and camera position etc. makes issue in the face identification process. Another biometric process is voice recognition which has some issues like spoofing attack by recorded voice. Henceforth, more secure biometric authentication framework is required. Finger vein recognition strategy is a solution for it.

The primary favorable thing of utilizing finger vein patterns for safety and reliability purpose is that it lies under the skin and is unique. It demonstrates a couple of other advantages and these include:

  • It gives extraordinary distinction between individuals as it incorporates indistinguishable twins and its characteristic is static.

  • Its patterns can’t be effectively duplicated, harmed, or hidden like fingerprints, iris, faces, voice or palm.

  • Other fingers can be utilized as an option for authentication, if one finger of individual gets injured due to accident or something [2].

Although it has several advantages, some disadvantages also persist which needs to be handle for attaining higher efficiency in the today’s world.

  • During the acquisition process the small distance between finger and camera deteriorates the quality of image and create optical blurring [3].

  • The intensity of light at the capturing device may affect image darkness and brightness [4].

  • If position of the finger is not properly maintained, the recognition rate decreases [5].

  • Different thicknesses of skin layer, bones and noise can affect the light scattering, which can decrease the recognition rate [6, 7].

Since finger vein authentication systems are associated with the Internet during transaction from ATM, security threats issues arises. In this paper a finger vein identification system is created by Image acquisition device (built in house) and is utilized in ATM with higher accuracy rate. After that the acquired finger vein image is sent to the ATM server. For securely transferring this image through internet to the central server for classification, a more secured method is employed which uses combined approach of light-weight cryptography and steganography [proposed variable most significant bit–least significant bit (MSB–LSB)] techniques. In central server firstly the captured image is passed through thresholding for extracting the region of interest, and then contrast limited adaptive histogram equalization (CLAHE) is used for the intensification of the captured image. Afterwards, it is transformed to black and white image and edge, texture and feature extraction is done by Gabor filter, fractal dimension and Lacunae. Finally the learning and classification is done by support vector machine.

The consecutive portion of the paper describes literature survey, proposed methodology and conclusion respectively.

2 Literature survey

Since many years, different researchers all through the world have just been researching in the area of finger vein authentication system and its information exchange security. Additionally, some surveys of this type of ongoing research and its relating efficiency and measuring estimation time are explained in this section.

Researcher Wu and Liu [8] have described neural network and component analysis methodology used in finger vein authentication method. In this paper, finger vein patterns are captured by near infrared radiation (NIR) light and charge-coupled device (CCD) camera, after that feature extraction is done by principal component analysis (PCA) and classification is done by using two algorithm back propagation (BP) neural network and adaptive neuro-fuzzy inference system (ANFIS) respectively. To verify the effect of the proposed ANFIS, the BP neural network is compared with ANFIS. The experimental results demonstrated by the proposed architecture using ANFIS has better performance than BP neural network and its classification accuracy reaches to 99%.

Researcher Zhang et al. [9] highlighted the problems of extracting vein patterns from an infrared finger-vein image due to low light conditions, noise and irregular shading, which can seriously weaken the capability of a finger-vein recognition system in practical application. To overcome this problem, in this paper proposed local Radon transform which depends on robust vein pattern extraction procedure is used. For this purpose primarily calculate the values along six directions in the neighborhood of the pixel using local Radon transform. Then on basis of the values along six directions, the primary vein orientation and its normal vector can be determined. Further to reduce the impact of noise, the curvature along the normal vector and verify whether the pixel belongs to vein patterns by certain rules. Finally, a local binarization method is employed for extracting vein patterns and is matched by the template method. This experiment revealed that the suggested approach is better in terms of performance than any another algorithm as its result is 92.46% on database A and 97.55% on database B.

Researcher Khanam et al. [10] observed discriminant analysis method better in terms of space requirement and time complexity and the K-nearest neighbor (KNN) algorithm of machine learning method determines the accuracy of the features of the finger-vein images. Hence the resulting accuracy from KNN is 55.84% while the discriminant analysis method gives the accuracy of 92.21% which makes it more accurate from KNN technique.

Researcher Fairuz et al. [11] explained that the development of finger vein identification method depends on transfer learning of AlexNet model which is then tested by plotting true positive rate and false positive rate by receiver operating characteristic (ROC) curve which is the curve of probability to examine the experiments results where the appropriate result is 95%. Area under the curve (AUC) is used to give the measure of quality of ROC curve which is 0.99 for this test that means 99% of times this experiment is capable to differentiate between positive and negative classes.

Researcher Buchmann et al. [12] have proposed a lightweight cryptographic authentication protocol. It is XOR scheme in radio frequency identification (RFID) tags and readers that effectively opposes any unapproachable assaults propelled in smart environment. Lightweight cryptography strategies are represented considerable in compelled conditions where RFID tags, sensors, contactless smart vehicles and medicinal services gadgets are importantly utilized since such calculations require small code and random access memory (RAM) estimate.

Researcher Boughaci et al. [13] have proposed an uncommon steganographic strategy where confidential information is covered with an image to assure secret communication. The stochastic local search (SLS) which is a local search based-algorithm adopts an initial random solution. Here certain diversification and intensification strategies are associated to locate good quality solutions. A fitness function is evaluated for each and every block. During the position search process, if an image block is found identical to block message, then the process is stopped for this block and is continued for other remaining blocks. The combined approach of steganography only with LSB is not effective as the image size increases with the insertion of information due to which discovery of hidden information gets possible. So to improve it, meta-heuristic is added to LSB.

The successive segment describes the proposed approach.

3 Proposed methodology

For secure financial transaction through ATM, a biometrics authentication system is used and the combined approach of cryptography and steganography is proposed for the transfer of finger vein information. The proposed model is broadly divided into two categories, i.e. finger vein authentication system and secure finger vein information transfer. In this paper, for secure information (finger vein image) transfer a lightweight cryptography and proposed variable MSB–LSB algorithm is used, as depicted in Fig. 1. For authentication purpose consolidated methodology of machine learning and image processing is used as shown in Fig. 2.

Fig. 1
figure 1

Proposed architecture

Fig. 2
figure 2

Finger vein identification system

3.1 Finger vein authentication system

3.1.1 Image acquisition

Finger vein patterns are undetectable to normal eye but are seen by near infrared light (where wavelength varies between 700 and 1000 nm) [6, 14]. 850 nm near infrared radiation (NIR) are utilized for capturing finger vein pictures in this paper as it is the cheapest way to visualize finger vein with highest accuracy since, it passes through fingers to capture the images and is impeded by the hemoglobin and melanin by which dark line of the vein is shown up.

For capturing the finger vein pattern 2 methods are commonly used i.e. “light reflection” and “light transmission” as depicted in Figs. 3 and 4.

Fig. 3
figure 3

Light reflection method

Fig. 4
figure 4

Light transmission method

In this paper a high contrast image is captured using the light transmission procedure in which the finger is situated between NIR light and charge-coupled device (CCD) camera, where the light passes in between the finger and the CCD camera catches the image, therefore most of finger vein imaging device employ this.

3.1.2 Region of interest extraction

However, in image acquisition process, there are some problems, like lower contrast and noise due to light fluctuation and finger rotation and translation problem occurs, so to solve these problems, in this paper region of interest process and histogram equalization is used. Region of interest i.e. image region extraction is done by thresholding of the image, for that purpose multidimensional filtering is used [15]. By using this methodology a better quality of finger vein image is produce without noise, shades and low contrast.

3.1.3 Histogram equalization

Histogram equalization is used for enhancing the finger vein image quality after region of interest procedure. Adaptive histogram equalization is used to adjust the dark and bright region. One weakness of this technique is noise amplification. For this purpose contrast limited adaptive histogram equalization (CLAHE) is utilized. It minimizes the amplification by using cumulative distribution function (CDF) and redistribution is done by cutting the limit of histogram and its neighborhood area. The process is repeated until additional value goes to minimum.

3.1.4 Feature extraction

Enhancement of the precision of finger vein recognition is done by an efficient feature extraction technique. It comprises of two section first is texture extraction later is edges extraction. These are done by three algorithms fractal dimension, Lacunae algorithms and Gabor filter.

3.1.5 Fractal dimension

It determines the quantifiable record of complexity present in fractal geometry and compares the differences minutely present in the scale where the complexity is measured. For measuring it a box counting procedure is used and three dimensional extended box checking procedures is used for determining 3D volumetric information. Similar concept is used to analyze fractal dimensions.

$${\text{FD}} = { \log }({\text{Nr}})/{\text{log(}}1/{\text{r)}}$$
(1)

In this process at first N copies of crude shape is created by the division of fractal object where each and every copy is scaled up to the factor of r and N and r have a logarithmic relation between them. The fractal value can be calculated determining the slope of line along with calculation of Nr for different calculation of r.

3.1.6 Lacunae

Lacunae are taken as gap which can measure intensity by differentiating from one point to another point. But a condition can also come when value of fractal dimensions will vary with varying images and then the lacunae algorithm is used for identifying different images [16].

3.1.7 Gabor filter

For different pattern recognition techniques Gabor filter is used for better feature extraction by using acuteness of direction, detect the feature component and tweaking the particular frequency, which grabs the texture attributes from the images.

It’s determined by modulating a sinusoidal sign along with a Gaussian. Let’s take a function f(x, y, θ, and ϕ) which define the Gabor filter. As θ and ϕ indicates the spatial frequency in the direction, Gabor filter is focused at the origin with θ and ϕ [17]. The Gabor filter can be seen as:

$${\text{f(x}},{\text{y}},\uptheta,\upphi )= {\text{exp(}}( - {\text{x}}^{2} + {\text{y}}^{2} )/\upsigma^{2} ) {\text{exp(}}2\uppi \uptheta {\text{i}}({\text{x cos }}\upphi + {\text{y sin }}\upphi) )$$
(2)

Here, σ is standard deviation which relies upon θ.

3.1.8 Classification

Everyday some new classification algorithms are being invented based on statistical theory of learning. Within these algorithms, support vector machine (SVM) is one of better classification algorithm. As it works with the boundary values unlike all the classifier thus it can classify between a larger ranges, so there is less chance of showing an odd result. SVM is a cluster of training methodology that can solve problems of discrimination and regression. For the purpose SVM uses linear classifiers [18]. Gaussian Kernel avoids non-linearity factors in SVM by changing data space depicted in Fig. 5.

Fig. 5
figure 5

SVM space

3.2 Secure finger vein information transfer

For the transmission of biometric information (finger vein image) between finger vein authentication system in ATM and the ATM server, the combination of a lightweight cryptographic method (such as XOR operation) and steganography (simple LSB substitution technique) scheme is proposed. At the ATM server, the encrypted finger vein image is retrieved using reverse steganography and the original finger vein image is obtained by light weight decryption. During the transfer of the captured finger vein image from the ATM server to the central server through Internet, an integrated approach of steganography (proposed variable MSB–LSB substitution technique) scheme and a light weight cryptographic method (such as XOR operation) is proposed (shown in Fig. 6).

Fig. 6
figure 6

Proposed finger vein transfer scenario

3.2.1 Variable MSB–LSB substitution algorithm

Single bit LSB substitution is a well-known algorithm and it have the feature of substituting single bit of image pixel in each carrier pixel (in case carrier is image) and within it there is no further scope of adding more pixel bits inside the cover medium. If uses MSB and LSB to substitute, it can embed 2 image pixel bits at maximum. It is favorable in the way that the image quality is not degraded much. The proposed algorithm (variable MSB–LSB) is much identical to simple LSB substitution algorithm (degree of substitution is 1), but it has the ability to embed maximum 2 image pixel bits and it can randomly map the cover image pixel, whereas simple LSB have the ability to embed only 1 image pixel bit and it cannot randomly map the embedding cover pixel. For this randomness and variation, a hashing algorithm is used that randomly maps pixel values of cover image to different targeted hash mapped pixel values each time it embed the image pixel bit. So according to this features,this algorithm can provide better security against confidentiality attacks and replay attacks, if launched by intruders.

figure a

In the following section, experimental outcomes are expressed.

4 Experimental results

Experimental result can be defined into two categories. First is for finger vein authentication system which is done by Python IDLE 3.6.4. Later gives the result of transfer of secure finger-vein images using steganography and cryptography schemes using Matlab R2013a.

4.1 Finger vein authentication system

For performing the experiment Python IDLE 3.6.4 is used on Windows 8.1 OS with specification Intel Core i5 with 2.4 GHZ. Data like name and finger subtleties of people is stored using SQLITE 3 database. In this paper in house developed finger vein acquisition system which consists of an infrared sensitive charge-coupled device (CCD) camera and near infrared radiation (850 nm) light (shown in Fig. 7). To overcome the drawback such as optical blurring, deterioration of image quality, finger position displacement and scattering of light due to bones thickness, the CCD camera and high sensitivity NIR light is used.

Fig. 7
figure 7

Finger vein detector and NIR light

The mentioned SQLITE 3 database is used for the purpose of training and testing. The database comprises of 10 sample individuals and each of them have 3 other folders which contains 3 types of finger images i.e. ring, index and middle finger. So there are 6 images in each folder, so for every individual it has 18 images and the resulting total number sample is 180.

When the process of image acquisition is completed, the thresholding is done over finger vein image of 10 individual sample by finger region extraction i.e. region of interest (ROI) which is depicted in Fig. 8. For getting equal contrast in every part of finger vein image, normalization is used by histogram equalization with the help of CLAHE algorithm can be seen in Fig. 9. After that Lacunae and fractal dimension algorithms is used for texture extraction and Gabor filter is used for edge extraction shown in Fig. 10. For classification two processes are used, one is one-versus-one and the other is one-versus-all, both this approaches used training and test set which have 10 classes along with 18 trials which sums up to in total of 180 feature vectors. Venous networks which have 10 classes, each class has contained 4 tests in the test set and are represented by the total of 80 features vectors. Firstly the input images are measured with 180 features by the help of decision functions of N(N − 1)/2 and in case the match is found it is called match successful. The experiment shows that in proposed procedure (one-versus-one and one-versus-all) the average recognition accuracy is 98.75% and 97.92% and the execution time is 0.168 s and 0.187 s respectively. A comparative study of proposed algorithm with other algorithms is given in Fig. 11.

Fig. 8
figure 8

Region of interest extraction

Fig. 9
figure 9

Histogram equalization

Fig. 10
figure 10

Feature extraction

Fig. 11
figure 11

Comparative analysis of classification accuracy

Figure 11 depicts that the two algorithms have better classification accuracy than proposed methodology i.e. adaptive neuro-fuzzy inference system (ANFIS) and convolutional neural network (CNN) with 99% and 99.38% accuracy respectively. However, the execution time of 4.5 s is required for ANFIS which is comparatively greater than proposed procedure and CNN does not give efficient result for low quality finger vein images, whereas the proposed procedure has no such issue.

So as a result it can be said that the proposed methodology is better in terms of classification accuracy when compared with the algorithms except ANFIS and CNN and has advantage of lesser execution time required and give efficient result for low quality finger vein images.

4.2 Secure finger vein information transfer

This experiment is done using Matlab R2013a. As per proposed design, first the finger vein information is encrypted using lightweight encryption algorithm (XOR operation), then embedded it in a randomly selected cover image employing using our newly proposed (variable MSB–LSB substitution scheme) steganography technique. The given procedure is shown in the consecutive image (Figs. 12, 13, 14, 15, 16, 17). The Fig. 18 shows that variable MSB-LSB technique is better than Simple LSB because it requires less number of pixels for embedding.

Fig. 12
figure 12

Finger vein encryption (XOR) and histogram

Fig. 13
figure 13

Random cover image

Fig. 14
figure 14

Encrypted (XOR) finger vein image

Fig. 15
figure 15

Embedded image (cover image + encrypted finger vein image)

Fig. 16
figure 16

Retrieve encrypted finger vein image

Fig. 17
figure 17

Decrypted original finger vein image and histogram

Fig. 18
figure 18

No. of image pixel needed to embed

The accompanying section concludes the paper.

5 Conclusion

Due to an expansion in globalization, the normal individual’s life has being compromised by the expanding grievous events of attacks of individual data and in the case of financial transaction and banking-related tasks in automated teller machines (ATMs). PIN and Password are most common way of accessing ATMs for financial transaction but they can be forged and thus are subjected to attack such as phishing, spoofing etc. In order to overcome such attacks higher security is required. Subsequently the human physiological and behavioral characteristics, for example iris, voice, finger print, face palm and so on are being utilized to give better security arrangements. In any case, they all can be effectively deceived and replicated at one level and a superior arrangement is required for the security necessities which are cost productive and reliable too. Hence, the combined approach (machine learning and image processing) of finger vein authentication method is used and for finger vein image transfer variable MSB–LSB steganography and light weight cryptography is proposed in this paper. The vein authentication method is relatively complicated, so it could be better to use it for some special applications. For finger-vein authentication system, the experiment shows that in proposed classification procedure (one-versus-one and one-versus-all) the average recognition accuracy are 98.75% and 97.92% and the execution time is 0.168 s and 0.187 s respectively. One comparative study is done among 5 algorithms which includes ANFIS, Global Matching and SVM, MLP, SVM and CNN. Adaptive neuro-fuzzy inference system (ANFIS) and convolutional neural network (CNN), the two algorithms have better classification accuracy than proposed methodology i.e. with 99% and 99.38% accuracy respectively. However, the execution time of 4.5 s is required for ANFIS which is comparatively greater than proposed procedure and CNN are not giving efficient result for low quality finger vein images, whereas the proposed procedure has no such issue. Thus, the proposed approach is better in regards to classification accuracy when appeared differently in relation to ANFIS and CNN and furthermore have advantageous if there should be an occurrence of time of execution, noise sensitivity and better for non perfect finger vein cases. Another issue which is to be considered is the means by which this biometric image (finger vein) can be transferred safely. And the variable MSB–LSB algorithm is better than simple LSB algorithm because it requires less number of pixels for embedding and have better randomness, security etc.