An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography

K. Lavanya*, C. Naga Raju**
* Assistant Professor in IT, L.B.R.College of Engineering, Mylavaram.
** Principal & Professor in CSE, PACE Institute of Technology & sciences, Ongole.
Periodicity:June - August'2012
DOI : https://doi.org/10.26634/jit.1.3.1911

Abstract

Automated teller machine allows the banks customers to carry out banking transactions like, deposits, transfers, balance enquiries, and withdrawal. Criminal activities at ATM’s have become a nationwide issue. In order to certify safe and secure transactions banks has to meet certain standards. This paper focuses on preventing such activities and enhancing the level of security at ATMs. Biometric authentication technique is proven to address the problems of traditional methods which are presently used in ATMs. Face recognition has received substantial attention from researchers in biometrics. In this approach, a face recognition system for personal identification and verification can be done using Principal Component Analysis (PCA). To enhance the level of security user’s biometric data itself hidden with steganography measures. Spatial based LSB Steganography methods is used for hiding biometric data into another covered image and then receiver can detect the secret message.

Keywords

Biometric, ATM, Steganography, Data Hiding, Face recognition, PCA

How to Cite this Article?

Lavanya. K., and Raju, N. C. (2012). An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography. i-manager’s Journal on Information Technology, 1(3), 25-30. https://doi.org/10.26634/jit.1.3.1911

References

[1]. Richard, B., and Alemayehu, M. (2006). Developing E-banking Capabilities in a Ghanaian Bank: Preliminary Lessons. Journal of Internet Banking and Commerce, August 2006, Vol. 11, No.2.
[2]. Weiqi Luo; Fangjun Huang; Jiwu Huang; (2010). "Edge Adaptive Image Steganography Based on LSB Matching Revisited,"Information Forensics and Security, IEEE Transactions on ,Vol.5, No.2, pp.201-214, June.
[3]. G. Sahoo, R. K. Tiwari, (2008). “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File ybridization”, IJCSNS, Vol. 8, No. 1, pp. 228-233, January.
[4]. Chander Kant, Ranjender Nath & Sheetal Chaudhary,” Biometrics Securityusingsteganography”, International Journal of Security, Volume (2): Issue (1) pp.1-5.
[5]. Mohit Soni, Sandesh Gupta, M.S. Rao, Phalguni Gupta. (2010). A New Vein Pattern-based verification System”, International Journal of Computer Science and Information Security, Vol.8, No. 1, pp.58-63,
[6]. Maleika Heenaye-Mamode Khan, Naushad Mamode Khan and Raja K. Subramanian,” (2010). Feature Extraction of Dorsal Hand Vein Pattern using a fast modified PCA algorithm based on Cholesky decomposition and Lanczos technique”, World Academy of Science, Engineering and Technology, vol. 61,pp.279-282,
[7]. Dr. M. Umamaheswari, S. Sivasubramanian, & S. Pandiarajan, (2010).” Analysis of Different Steganographic Algorithms for Secured Data Hiding” ,IJCSNS International Journal of Computer Science and Network Security, Vol.10 No.8,August , pp.154-160.
[8]. J. Fridrich and M. Goljan, (2002). “Practical steganalysis of digital images—State of the art,” in Proc. SPIE Security Watermarking Multimedia Contents, vol. 4675, E. J. Delp III and P. W. Wong, Eds., , pp. 1–13.
[9]. Westfeld and A. Pfitzmann, (2000). “Attacks on Steganographic Systems,”Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin, pp. 61–75.
[10]. A. Ker, (2005). “Steganalysis of LSB Matching in Grayscale Images.” IEEE Signal Processing Letters, Vol. 12(6), pp. 441–444,
[11]. J. Mielikainen, (2006). “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, NO. 5., MAY.
[12]. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, (2006). “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing 2;2 © www.waset.org Spring.
[13]. Hung-Min Sun, Yao-Hsin Chen, and King-Hang Wang, (2006). “An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,” Image and Vision Computing New Zealand IVCNZ 2006, November 27- 29.
[14]. D.C. Wu and W. H. Tsai, (2003). A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10,pp. 1613-1626,.
[15]. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE, and Hung-Min Sun, (2008). “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, VOL. 3, NO. 3, September pp. 488-497.
[16]. Lin, E.T., and Delp, E.J. (1999). “A Review of Data Hiding in Digital Images”. Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr.
[17]. Petitcolas, F.A.P. “Introduction to Information Hiding”. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000). Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC. Po- Yueh Chen and Hung-Ju Lin “A DWT Based Approach for Image steganography”, International Journal of Applied Science and Engineering, 2006. 4, 3: 275-290
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.