steganography in colored images based on biometrics

Main Article Content

Zeena Nabeel Jameel AL-Kateeb
Marriam Raad Jasim Mohammed AL-Bazaz

Abstract

Due to the great significance of the concealment and transfer of confidential data and the many and varied algorithms presented in this field, as well as the big and rapid development of the use of biometrics in the issues of reliability and verification of the identity of people in support of information security. Therefore this research has provided a suggested algorithm to hide confidential data in colorful images based on the features of engineering dimensions of the human hand as one of the types of biometrics; we extracted a set of these characteristics and processed them to build a matrix that specifies the map of the distribution of confidential data in the cover image. The proposed method was applied to a set of images to hide a set of confidential messages and the visual quality of the cover image was not affected after the concealment. The practical results explain the efficiency of this method was measured in terms of comparison between the original image before and after concealment. The performance of the algorithm and the method of its application were measured using measures of efficiency of the work, whereas the Peak Signal Noise Ratio was used, the highest ratio obtained was 81.3417, and Mean Square Error was approximately 0.0008 as a maximum limit, while the error rate was the restored confidential message after hiding Bit Error Rate = 0 in all cases

Article Details

How to Cite
Zeena Nabeel Jameel AL-Kateeb, & Marriam Raad Jasim Mohammed AL-Bazaz. (2019). steganography in colored images based on biometrics. Tikrit Journal of Pure Science, 24(3), 111–117. https://doi.org/10.25130/tjps.v24i3.378
Section
Articles

References

[1] Nilizadeh A. , Mazurczyk W. , Zou C. ; Leavens G. T.,(2017) “Information Hiding in RGB Images Using an Improved Matrix Pattern Approach”, produec Conference: 21-26 July 2017, IEEE.

[2] Katre B.,Bhrati ,(2017),“Dynamic Key based LSB Technique for Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 167 – No.13, June 2017

[3] Hasso Maha, Al-kateeb Zeena N.,(2013), “ Building a system to identify people based on the human hand geometry”, AL-Rafidain Journal of Computer Sciences and Mathematics , Volume 10- Issue: 1 ,Pages 47-60

[4] Batra N., Kaushik P., (2012), "Implementation of Modified 16×16 Quantization Table Steganography on Colour Images", International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 2, Issue 10,PP.(244-250) .

[5] Caldera-Serrano, Jorge (2008), “Changes in the management of information in audio-visual archives following digitization: Current and future outlook”, Journal of Librarianship and Information Science, 40 (1).- pp.(13- 20).

[6] Deb S., (2004), "Multimedia Systemsand Content-Based Image Retrival", Idea Grop Inc. (IGI).

[7] Giesing, Ilse (Compiler), (2003), “Biometrics”, University of Pretoria.- pp. (49-76).

[8] Ríha Zdenek and Matyáš Václav, (2000), “Biometric Authentication Systems”, FI MU Report Series, Masaryk University.

[9] Roberts Chris, (2006), “Biometric Technologies-Palm and Hand”,

http://www.ccip.govt.nz/newsroom/information-notes/2006/biometricstechnologies- palmhand.pdf.

[10] Varchol Peter, Levický Dušan, (2007), “Using of Hand Geometry in Biometric Security Systems”, Radioengineering, VOL. 16, NO. 4, pp(82-87).

[11] Zhang J., Hou D., Ren H.,“Image Encryption Algorithm Based on Dynamic DNA Coding and Chen’s Hyperchaotic System”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, Volume 2016, Article ID 6408741, 11 pages ,http://dx.doi.org/10.1155/2016/6408741.

[12] Bandyopadhyay D., Dasgupta K., Mandal J. K., Dutta P.,”(2014), a novel secure image steganography method based on chaos theory in spatial domain”, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 1,.

[13] Rashied , M.M., (2016),“Image steganography by using SVD and chaotic Zig Zag map ”,Iraqi Journal of Information Technology, Volume: 7- Issue: 2, Pages: 45-56.

[14] Metras Ban, Abo Adeeba, (2013), “ information hiding in DNA sequence by using the secret key as seed for generating random numbers”, IRAOI JOURNAL OF STATISTICAL SCIENCES, Volume - 13 Issue: 25 , Pages 430-440