Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Fingerprint Hiding in True Color Image

Fingerprint Hiding in True Color Image

Ratings: (0)|Views: 47 |Likes:
Published by ijcsis
With the progress of the times and the use of technology the importance of the use of biometric is appear to get to the regulations that require identification of persons before using to reduce the risk of security attack. One of the oldest, most prominent and commonly used of these biometrics is the fingerprint, the finger is containing features that have an impact on any surface touched, especially smooth ones, from this the fingerprint become an evidence that inferred by the people. In this work, an algorithm of hiding fingerprint in an image is proposed. the fingerprint is an image of (8 bit) hidden in an image of true color (24bit) form as 1 bit and 2 bits and 4 bits. This is done using the algorithm well known algorithm Least Significant bit (LSB), which helps to hide the images and messages in the less important bits in the original image, also the hiding is applied in one of the three true colors. There is no visually sense on the image before and after hiding, no changes occur on the image. The histogram also used to test the changes on an image.
With the progress of the times and the use of technology the importance of the use of biometric is appear to get to the regulations that require identification of persons before using to reduce the risk of security attack. One of the oldest, most prominent and commonly used of these biometrics is the fingerprint, the finger is containing features that have an impact on any surface touched, especially smooth ones, from this the fingerprint become an evidence that inferred by the people. In this work, an algorithm of hiding fingerprint in an image is proposed. the fingerprint is an image of (8 bit) hidden in an image of true color (24bit) form as 1 bit and 2 bits and 4 bits. This is done using the algorithm well known algorithm Least Significant bit (LSB), which helps to hide the images and messages in the less important bits in the original image, also the hiding is applied in one of the three true colors. There is no visually sense on the image before and after hiding, no changes occur on the image. The histogram also used to test the changes on an image.

More info:

Published by: ijcsis on Sep 11, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/11/2012

pdf

text

original

 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 10, No. 8, August 2012
 
Fingerprint Hiding in True Color Image
Shahd Abdul-Rhman Hasso
1
Maha Abdul-Rhman
 
Hasso
2
Omar Saad
3
 
1
 ,
2
 ,
3
Department of Computer Science, College of Computer Sciences and Math., University of Mosul Mosul, Iraq
 Abstract—
With the progress of the times and the use of technology the importance of the use of biometric is appear toget to the regulations that require identification of personsbefore using to reduce the risk of security attack. One of theoldest, most prominent and commonly used of these biometricsis the fingerprint, the finger is containing features that have animpact on any surface touched, especially smooth ones, fromthis the fingerprint become an evidence that inferred by thepeople.In this work, an algorithm of hiding fingerprint in an imageis proposed. the fingerprint is an image of (8 bit) hidden in animage of true color (24bit) form as 1 bit and 2 bits and 4 bits.This is done using the algorithm well known algorithm LeastSignificant bit (LSB), which helps to hide the images andmessages in the less important bits in the original image, also thehiding is applied in one of the three true colors. There is novisually sense on the image before and after hiding, no changesoccur on the image. The histogram also used to test the changeson an image.
 Keywords-component; LSB; Biometric; Fingerprint; True colorimages.
I.
 
I
NTRODUCTION
As a result of the development in all fields, manymanipulation systems, which form a major threat to the storedinformation, more important than this information is thesecurity of the information itself. Thus, we find scientists andspecialists are working hard to protect them from unauthorized,and which reached to the use of biometrics of the same personto get to the systems that require identification before they areused to reduce the risk of security attacks [1].the most prominent, oldest commonly used of thesebiometrics is the fingerprint, in 1885, William Herschel provedto the world that the fingerprint is quite different from personto person, other Germany researchers proved that thefingerprint remains constant and does not change from birth todeath when he took the fingerprint of his right finger andreturned after forty years and took second fingerprint to thesame finger and compare it with the past and found it did notchange [2].The finger contains features have an impact on anysurface touched, especially smooth ones, from here it becameone of the evidence and unequivocal evidence that inferred bythe people [2].It is also used an alternative to passwords that are highlyvulnerable because of the suffering that many of us use simplewords it is easier to remember which lead to many risks to beeasily guessed and knowledge and also used for issuingpassports in addition to other uses [3].II.
 
BIOMETRIC FEATURES
 The biometric features are a mechanism to identifywhere the person to be verified based on his physiological orbehavioral characteristics. On this basis the biometric featureswill be classified into three sections [4]:Section I: physiological features such as:• Fingers• hand geometry• DNA• Retina and iris of the eye• outline the blood vesselsSection II: behavioral traits such as:• Signature• Handwriting• The rhythm of movement of the hand in theuse of the keyboard.Section III combines physiological and behavioralattributes together, such as:• Voice recognition• Identify the impact of the human footIII.
 
P
REPARE
Y
OUR
P
APER
B
EFORE
S
TYLING
 The fingerprint is one verses of God in His creation, whereeach person imprints of its own – identification card in hisfingers -. The fingerprint is a prominent protrusion in the skinneighboring depressions, everyone has a distinctive form. It hasproven that two people in the world cannot match theirfingerprint even identical twins. These features have its impacton every object you touch; therefore, the fingerprintrecognition refers to the verification mechanism of thematching two fingerprints of a human. It is considered as typesof biometrics that is used in person identification andverification [5].
 A.
 
The fingerprint advantages:
 
Difficult forgery and theft.
 
The verification process does not cost time and donot require an employees to do it.
 
It cannot be guessed or forgotten as passwords.
 
Fixed and does not change with age and even if they removed the skin layer is composed belong tothe same characteristics in the new skin.
 
Easy integration into portable devices, doors andcars. It can use instead of keys.
 
used in the system work instead of theidentification cards to prove attendance forced the
22http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 10, No. 8, August 2012
 staff to attend on their own to have theirfingerprints and prove their identities [3] [4].
 B.
 
The fingerprint disadvantages:
 
Need a special device to capture the image.
 
Depends on the direct touch of the device thus maylead to transmission of infectious diseases.
 
Suffer from the problem of error if found dustgrains on the surface of the reader may not allowan authorized person to enter.
 
Suffer like any other biometric of penetrate thedatabase and change the existing samples thusallow unauthorized to access the system [3] [4].IV.
 
T
HE
S
TEGANOGRAPHY
 The Steganography is the hiding of a message - (data)within another message (other data) in order to hide theexistence of the first message for a specific purpose, thecovered data that is used as a circumstance or a bowl to hidecan be a multimedia file such as images, text, audio or videofiles, ... etc. Also may be an executable files for differentprograms(.exe), thus, the process to hide is needing two files,one called the cover, and the other is the substance to be hidden[6].V.
 
T
HE
S
TEGANALYSIS
 The process of trying to detect the presence of hiddeninformation, read, or to change or delete is called Steganalysis.To success the Steganalysis it must be: [7]
First, discovering that there is hidden information.Second, change, delete or just read it.
All of our technologies is to hide data in a way not raisesuspicions, do not leave any marks or trace evidence of achange. For example, in the case of hiding in images, it mustconsider several factors, including: Do not use well knownimages, or images that anyone can get copies of them (such asGoogle images) that facilitate comparison of two the images.As well as taking into account does not change image or blur itas change the colors clearly. Therefore, it is advised not to hidea lot of data at the same image fear of change in a way of destroying the primary purpose of the use of technology,raising suspicion that mean failure of the process.It is difficult to identify the hidden data if the program isunknown to the intruder, but unfortunately some programs hideinformation in a way have an impact works like a radiobroadcast news password! Therefore, attention should be paidwhen choosing a program to be used in the process of thishiding.The steganography idea is to put a message inside the cover toform the hidden target. This can be represented by thefollowing equation [6] [7]:
Target = hidden message want to hide + cover + stego key
In general, the steganography methods can be divided into fourbasic methods:
 A.
 
text hiding
The text can extracted the hidden message in it, either in away that the text be the first letter of each word represents theletter of the message or hidden in a grammatical or verbal.
 B.
 
voice hiding
The message could be hidden in an audio signal in time orfrequency domain by one of the following methods:
 
Low-bit coding: This method has a high inputcapacity, but vulnerable to discovery.
 
Extending the spectrum: the message is insertedinto the higher frequencies than necessary.
 
Coverage of perception: this way is more of inputcapacity, but the most vulnerable to discovery andis inserted into the text of the message inside theregions of the human person cannot be aware of the traffic light.
C.
 
video hiding
Hiding is derived from the images where the videos are only aset of successive images.
 D.
 
 Image hiding
The most method that has been studied by researchers. [6] [7].VI.
 
S
TEGANOGRAPHY IN
L
EAST
S
IGNIFICANT BIT
(
 
LSB
)
 LSB is the most commonly used method in theapplications, it required to enter one or more bits of themessage to be hidden and replaced with a less important bitsfrom the image [8]. The least significant bit is deciding whohas the lowest value calculations (20 = 1) while the mostimportant decision is deciding which has the largest valuecalculations (27 = 128). For example: If you have an imagemade up of pixels each of which has 24-bit (24-bit image), itcan be extracted 3 bits of each byte of the image by 3-bit of themessage to hide. Therefore, the image of size (1024 × 768) canbe hidden a text of its size (294 × 912) bytes without noticewith the eye.Another example: Imagine that the letter "G" is to hideinside the image carrier of eight bytes binary representation is:10010101 00001101 11001001 1001011000001111 11001011 10011111 00010000We know that the representation of the "G" is 01000111binary, then we can get the character in the imagereplacement becomes the least significant bitrepresentation is:10010100 00001101 11001000 1001011000001110 11001011 10011111 00010001VII.
 
THE COLOR CONCEPT IN THE DIGITAL IMAGES
 The color form red, green, blue (RGB) is a color modelwhich combines the lights red, green and blue with each otherin different ways to generate a wide range of colors.The main objective of the RGB color model is a sense,
23http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 10, No. 8, August 2012
 generate and display the images in electronic devices, such ascomputer screens [8].VIII.
 
THE PROPOSED METHOD
 The purpose of the proposed algorithm is to hide thefingerprint of an authorized person then add it to the databaseand sent through the true image colors (24 bits). The fingerprintimage was converted to a gray image and resized to 64×64pixels then hide it in the less important binary bits of a coverimage.The work is applied to hide the fingerprint in 1 LSBit, 2LSBits and 4 LSBits. The proposed algorithm is applied on theRed, green and blue form of image.The proposed algorithm could be summarized as:1-
 
The fingerprint image file was read from database [9].2-
 
The fingerprint image file was converted to gray formand resized either to 32 × 32 Pixel or 64 × 64 Pixel.3-
 
Convert the fingerprint file to binary form.4-
 
The cover image file is read, it is a true color (24 bit)image file.5-
 
Select one of the three colors of an image (red, greenor blue) to hide data in it by change the LSB of it bythe fingerprint data in it.6-
 
Analyze result visually and by histogram.IX.
 
T
HE
R
ESULTS
 The analysis of results of the work is based on the visual senseof image before and after hiding a fingerprint inside andanalysis of the histogram of the image with true color (24 bit)before and after the masking image fingerprint.Figure (1) shows an image used in this work, thefingerprint image and the image after data hiding, where thefigures (2) to (4) describes the histogram of some models of thecover before and after hiding so you will have three forms of histogram applied to image with the true colors before and afterthe hiding of one, two and 4-bit, respectively. The system hasbeen applied on a set of models of color images andfingerprints we include a small part of them in figures (2) to(4).
Fingerprint Image Image before hidingImage After hidingFigure (1): A sample of an image for hiding fingerprint on it.Histogram before hiding histogram after hidingFigure (2): the histogram of an image before and after hiding data using oneLSBit.Histogram before hiding histogram after hidingFigure (3): the histogram of an image before and after hiding data using twoLSBits.Histogram before hiding histogram after hidingFigure (4): the histogram of an image before and after hiding data using fourLSBits.
24http://sites.google.com/site/ijcsis/ISSN 1947-5500

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->