An Approach To Enhance Level Of Security To The ATM Customers By Hiding Face Biometric Data Using Steganography

K. Lavanya *    C. Naga Raju **
* Assistant Professor in IT, L.B.R.College of Engineering, Mylavaram.
** Principal & Professor in CSE, PACE Institute of Technology & sciences, Ongole.

Abstract

Automated Teller Machine allows the banks customers to carry out banking transactions like, deposits, transfers, balance enquiries, and withdrawal. Criminal activities at ATM's have become a nationwide issue. In order to certify safe and secure transactions banks has to meet certain standards. This paper focuses on preventing such activities and enhancing the level of security at ATMs. Biometric authentication technique is proven to address the problems of traditional methods which are presently used in ATMs. Face recognition has received substantial attention from researchers in biometrics. In this approach, a face recognition system for personal identification and verification can be done using Principal Component Analysis (PCA). To enhance the level of security user's biometric data itself hidden with steganography measures. Spatial based LSB Steganography methods is used for hiding biometric data into another covered image and then receiver can detect the secret message.

Keywords :

Introduction

Today's global market automated teller machine, ATM cards, credit card etc are the financial services embedded in the accounts and records of a banking institution. The deployment of ATM becomes more and produces the imperative result. On this note the crime at ATM's has become a nationwide issue that faces both customers and bank operators [1]. Some of the popular ATM frauds are listed below:

The Biometric authentication system has proven to be a practical alternative to address the attacks in conventional methods used in present banking systems. A biometric system is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature set from the acquired data, and comparing this feature set against the template set in the database. Biometric system can operate in verification mode or in identification mode depending upon the application. Biometric systems make use of fingerprints, hand geometry, iris, retina, face, hand vein, facial thermograms, signature, voiceprint, gait, palm print, etc. With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. Basically biometric data is not secret and it is transparent may affect with several types of attacks.

Some of the attacks are listed below:

With wide spread utilization of biometric techniques in various applications, an increased security of the biometric data is necessary. Encryption, watermarking, and steganography are possible techniques to achieve this. Steganography is the branch of information hiding. In image steganography [2], the information is hidden exclusively in an image which is called the cover image. After embedding the secret message, the cover image is called the stego-image. At the end of receiver side stegoimage extraction provide meaningful information. In general, image hiding can be done with two approaches: Spatial domain techniques and Frequency domain techniques. The primary focus of this paper is to developing a Spatial domain Stego based Face recognition system to enhance the security features of the ATM for effective banking transaction. The rest of the paper arranged thus: section 1 examines related work section 2 presents Proposed framework for ATM Security section 3 presents Implementation section 5 provides Experimental results, and finally conclusion section is given.

1. Related Work

An interesting application of steganography and cryptography developed by M.S.Sutaone, M.V. Khandare where a steganography system is designed for encoding and decoding a secret file embedded into an image file using random LSB insertion method. G. Sahoo and R. K. Tiwari in 2008 proposed a good method [3]. In their method works on more than one image using the concept of file hybridization. Han Shuihua and Yang Shuangyuan proposed scheme is especially useful for encryption of large amounts of data, such as digital images. A new idea is presented by Chander Kant, Ranjender Nath & Sheetal Chaudhary [4] to make system more secure by the usage of steganography, where the secret key will be merged in the picture itself in encoding method and at decoding method the authenticated user will be allowed to decode it. Mohit Soni, Sandesh Gupta, M.S. Rao, Phalguni Gupta [5] applied Euclidean Distance based matching technique for making the decision for feature extraction. Maleika, Naushad and Raja [6] applied Principle Component Analysis (PCA), with Cholesky decomposition and Lanczos algorithm to extract the vein features which decreases the number of computation and the processing time. Prof. S.Sivasubramanian, S. Pandiarajan [7] presented the method in which the secret message encrypts with the receiver's public key along with the stego key and embeds both messages in a carrier using an embedding algorithm. Fridrich and Goljan [8] have surveyed more number of techniques for detecting LSB substitution. Among those one of the popular methods is histogram analysis [9].In that method an image is processed with LSB substitution and then the histogram of the image will be showed. To improve LSB substitution a similar idea called LSB matching [10] has been proposed. Later in 2006 a revised version of LSB matching is proposed by Mielikainen [11] by performing expected number of modifications per pixel, from 0.5 to 0.375. A novel approach of image embedding was introduced in [12]. The method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach. Later Sun et al. [13] proposed a data hiding scheme based on arranging the position of pixels and then retains the host image histogram profile perfectly. Wu and Tsai [14] utilized the difference between the two consecutive pixels in the cover image to determine what size the secret message is to be hidden. An Adaptive data hiding method was proposed in [15].In this method Pixels located in the edge areas are embedded by a Kbit LSB substitution method with a larger value of than those of the pixels located in smooth areas.

2. Proposed Framework for ATM Security

In this paper a new frame work is introduced to enhance level of security to the ATM customers with spatial domain LSB Substitution and Principal Component Analysis. Initially the face image is hidden and then it can be recognized. Once the face is verified then the customer is ready to access the system. The architecture of the framework can be shown in Figure 1. The approach can be expressed with following steps:

2.1 Choose Face Database

Face images are collected from ORL Database provided by the AT&T Laboratories from Cambridge University. It contains images with different subjects like slight variations in illumination, facial expression and facial details with glasses/no glasses. Database is worth of 400 images, corresponding to 40 subjects (namely, 10 images for each class). Each image has the size of 112 x 92 pixels with 256 gray levels. Some face images are trained and tested from the ORL database are shown in Figure 2.

Figure 1. Block diagram of Proposed Framework

Figure 2. Training & test Sets from ORL Data base

2.2 Hiding of Face Images with Spatial Domain LSB Substitution

In today's global market have seen an increased interest on the usage of the digital multimedia on the web. At presents the commercial software's are using carrier contents of steganography such as images, audio, and video files. A popular digital steganography technique is least Significant Bit (LSB) method. The method can perform operation in two phases: Embedding Phase and Extracting Phase. In LSB embedding phase two parties in share a private secret key in communication and also it can allows high perceptual transparency [17]. The bits of secret message directly embedded into the LSB plane of the cover image. The embedding procedure does not affect the original pixel value greatly [16]. At receiver's side LSB extracting phase take place for retrieving original image from the stego image. The overall idea of hiding biometric data is shown in Figure 3.

Figure 3. Hiding face data using LSB steganography

Mathematically the embedding message is represented as:

(1)

In equation (1) Xi I is the pixel value of the stego-image and Xi represents that of the cover- image. Where mi represents the decimal value of the ith block in the confidential data. k is the number of LSBs to be substituted [17] .The extraction process is to copy the k-rightmost bits directly.

The mathematically the extracted message is represented as:

(2)

In equation (2) mi represents the original confidential data and Xi I is the pixel value of the stego-image.

2.3 Face Recognition using PCA

Principal Component Analysis (PCA) is a standard technique used in statistical pattern recognition and signal processing for data reduction and Feature extraction. PCA is one of the most successful techniques for face recognition. This method allows to represents high dimension data of images into lower dimensions for reducing the complexity of grouping images. It treats the face images as 2-D data, and classifies the face images by projecting them to the eigenface space which is composed of eigenvectors obtained by the variance of the face images. One can choose to go into depth of one and only one of those methods. The idea of PCA method shown in Figure 4.

Figure 4. Block Diagram for PCA

Approach

Step 1: Select a face database that consists of the face images of known persons.

Step 2: Build the training set that consists of a number of images (M) for each person with and different expressions.

Step 3: Calculate the M x M matrix L, find its Eigen vectors and Eigen values, and choose the M' Eigen vectors with the highest associated Eigen values.

Step 4: Combine the normalized training set of images to produce M' Eigen faces.

Step 5: Store these Eigen faces for later use.

Step 6: For each member in the face database, compute and store a feature vector.

Step 7: Choose a threshold value e that defines the maximum allowable distance from any face class. Optionally choose a threshold f that defines the maximum allowable distance from Face space.

Step 8: For each new face image to be identified, calculate its feature vector and compare it with the stored feature vectors of the face library members.

Step 9: If the comparison satisfies the threshold for at least one member, then classify this face image as "known", otherwise a miss has occurred and classify it as "unknown" and add this member to the face library with its feature vector.

2.4 Matching

Face images are verified on the basis of distance measures between two points. In this paper closest distance is referred with the Euclidean distance. Euclidean distance is the most common use of distance. This classifier calculates the minimum distance between the test image and image to be recognized from the database. If the distance is small, the images are similar and decided to access the system. We obtain the Euclidean distance, D as follows and shown in equation (3):

(3)

Where x, y in the data set X and xi, yi are the ith coordinates of x and y, respectively. This is a dissimilarity measure on X. The minimum possible distance between two vectors of X is 0 .

3. Experimental Results and Discussions

In this experiment, security level of enhancement to the ATM Customer can be done with stego based face recognition with different kinds of poses (views), expressions and varying lighting conditions. In this paper prior to matching the face images are hidden with LSB Substitution. After that face image is retrieved from the stego image and then it is matched with the training set with PCA and the resultant matching score is plotted for each test samples which is shown in Figure 5(a-c). The resultant matching score of different test images shown in Table 1 and the robustness of proposed framework in terms of matching score is shown in Figure 6 .

Figure 5. (a) stego image & extracted image (b) test case with top match (c) matching score

Table 1. Matching Scores of tested image with Euclidian distance the classifier

Figure 6. Propose Frame work performance with matching score

Conclusion

To enhance security level to the ATM Customer Stego based Face recognition strategies with the PCA (Principal Component Analysis) were implemented. Principal Component Analysis gave better results for different subjects and it is proven technology for deploying into ATM System. The results are good for the test samples that we have considered. Further, we can improve the system for providing security to other applications like border and security control checkpoints, crime investigation, entrance control in buildings, access control for computers, passport verification etc. Further, we can improve the system by introducing multimodal biometrics with combination of one or more biometrics like finger print, iris, palm, face and retina.

Acknowledgment

The authors acknowledge the support of the Department of Science and Technology (DST), New Delhi to do this work. They furthermore thanks to Dr.L.Siva Sankar Reddy (Director of Lakkireddy Bali Reddy College of Engineering), Staff and Students of Lakireddy BaliReddy College of Engineering who provided helpful comments and discussions .

References

[1]. Richard, B., and Alemayehu, M. (2006). Developing E-banking Capabilities in a Ghanaian Bank: Preliminary Lessons. Journal of Internet Banking and Commerce, August 2006, Vol. 11, No.2.
[2]. Weiqi Luo; Fangjun Huang; Jiwu Huang; (2010). "Edge Adaptive Image Steganography Based on LSB Matching Revisited,"Information Forensics and Security, IEEE Transactions on ,Vol.5, No.2, pp.201-214, June.
[3]. G. Sahoo, R. K. Tiwari, (2008). “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File ybridization”, IJCSNS, Vol. 8, No. 1, pp. 228-233, January.
[4]. Chander Kant, Ranjender Nath & Sheetal Chaudhary,” Biometrics Securityusingsteganography”, International Journal of Security, Volume (2): Issue (1) pp.1-5.
[5]. Mohit Soni, Sandesh Gupta, M.S. Rao, Phalguni Gupta. (2010). A New Vein Pattern-based verification System”, International Journal of Computer Science and Information Security, Vol.8, No. 1, pp.58-63,
[6]. Maleika Heenaye-Mamode Khan, Naushad Mamode Khan and Raja K. Subramanian,” (2010). Feature Extraction of Dorsal Hand Vein Pattern using a fast modified PCA algorithm based on Cholesky decomposition and Lanczos technique”, World Academy of Science, Engineering and Technology, vol. 61,pp.279-282,
[7]. Dr. M. Umamaheswari, S. Sivasubramanian, & S. Pandiarajan, (2010).” Analysis of Different Steganographic Algorithms for Secured Data Hiding” ,IJCSNS International Journal of Computer Science and Network Security, Vol.10 No.8,August , pp.154-160.
[8]. J. Fridrich and M. Goljan, (2002). “Practical steganalysis of digital images—State of the art,” in Proc. SPIE Security Watermarking Multimedia Contents, vol. 4675, E. J. Delp III and P. W. Wong, Eds., , pp. 1–13.
[9]. Westfeld and A. Pfitzmann, (2000). “Attacks on Steganographic Systems,”Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin, pp. 61–75.
[10]. A. Ker, (2005). “Steganalysis of LSB Matching in Grayscale Images.” IEEE Signal Processing Letters, Vol. 12(6), pp. 441–444,
[11]. J. Mielikainen, (2006). “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, NO. 5., MAY.
[12]. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, (2006). “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing 2;2 © www.waset.org Spring.
[13]. Hung-Min Sun, Yao-Hsin Chen, and King-Hang Wang, (2006). “An Image Data Hiding Scheme being Perfectly Imperceptible to Histogram Attacks,” Image and Vision Computing New Zealand IVCNZ 2006, November 27- 29.
[14]. D.C. Wu and W. H. Tsai, (2003). A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10,pp. 1613-1626,.
[15]. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE, and Hung-Min Sun, (2008). “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, VOL. 3, NO. 3, September pp. 488-497.
[16]. Lin, E.T., and Delp, E.J. (1999). “A Review of Data Hiding in Digital Images”. Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr.
[17]. Petitcolas, F.A.P. “Introduction to Information Hiding”. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000). Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC. Po- Yueh Chen and Hung-Ju Lin “A DWT Based Approach for Image steganography”, International Journal of Applied Science and Engineering, 2006. 4, 3: 275-290