You are on page 1of 16

A Technical Seminar Report

On

Steganography
Submitted to JNTUK, Kakinada in partial fulfillment of the requirement award of the degree
Bachelor of Technology in Department of Computer Science & Engineering.

Submitted By
Y. Sowjanya
07A41A0579

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

LOYOLA INSTITUTE OF TECHNOLOGY AND MANAGEMENT


Affiliated JNTUK, Kakinada
DHULIPALLA-522 403, Guntur Dst.
Academic Year 2010-11
LOYOLA INSTITUTE OF TECHNOLOGY AND MANAGEMENT
(Affiliated JNTUK, Kakinada)
Dhulipalla – 522 403, Guntur Dist.

Department of Computer Science & Engineering

CERTIFICATE

This is to certify that Y.sowjanya(07A41A0579)have prepared a technical seminar


report entitled “Steganography “ as a partial fulfillment for the award of the degree of
Bachelor of Technology in Computer Science & Engineering. She worked for a period of one
semester under our supervision.

Y.Suresh Sri. K.Ramesh


Assistant Professor Associate Professor
Technical Seminar Supervision Head of the Department of
Computer Science and Engineering
ABSTRACT

This paper encloses the information regarding the present interesting topic, the biometrics;
biometrics technology allows determination and verification of ones identity through physical
characteristics. To put it simply, it turns your body in to your password. We discussed various biometric
techniques like finger scan, retina scan, facial scan hand scan etc. An algorithm have been proposed by
taking a multimodal biometric voting system to authenticate a person and consider his voting .

We conclude that this voting system is superior for use in a general election when compared
with traditonal voting system
Contents

1. Introduction 1

2. Classification Of Biometrics 2

3. How Biometric Technology works 2

3.1During Enrollment 2

3.2.During access to database 2

4. Applications Of Biometrics 3

4.1.E-commerce Applications 3

4.2.Covert Surveillance 3

5. Types of Biometric security technologies 3

5.1 Finger Scan 3

5.2 Hand geometry 4

5.3 Face 4

5.4 Signature 5

5.5 Voice 5
5.6 Retina scan 5

5.7 Iris Scan 6

6. Drawbacks of Traditional voting system 6

7. Future Of Biometrics 7

8. Our works On Biometrics 7

8.1 Algorithm 1 7

8.2 Algorithm 2 8

9. Conclusion 9
LIST OF FIGURES

2.1 Biometrics classification 2

3.1 Working Of Biometric 2

5.1 Finger Scanner 4

5.2 Hand Geometry 4

5.3 Iris Scan 6

8.1 Flowchart-1 8

8.2 Flowchart-2 9
1.INTRODUCTION the Florida 2000 presidential election, is the
importance of human factors. A voting system
Elections allow the people to choose
must be comprehensible to and usable by the
their representatives and express their
entire voting population, regardless of age,
preferences for how they will be governed.
infirmity, or disability. Providing accessibility
Naturally, the integrity of the election process
to such a diverse population is an important
is fundamental to the integrity of democracy
engineering problem and one where, if other
itself. The election system must be sufficiently
security is done well, electronic voting could
robust to withstand a variety of fraudulent
be a great improvement over current paper
behaviors and must be sufficiently transparent
systems. Flaws in any of these aspects of a
and comprehensible that voters and candidates
voting system, however, can lead to indecisive
can accept the results of an election.
or incorrect election results.
Unsurprisingly, history is littered with
In electronic voting system there have
examples of elections being manipulated in
been several threats, and poor software
order to nuence their out come. The design of a
development processes including unauthorized
“good” voting system,whether electronic or
privilege escalation, incorrect use of
using traditional paper ballots or mechanical
cryptography, vulnerabilities to network
devices, must satisfy a number of sometimes
competing criteria. The anonymity of a voter’s 1.1Draw Back Of Traditional And Ele
ballot must be preserved,both to guarantee the ctronic Voting System
voter’s safety when voting against a It need for Biometrics.Up to now the
malevolent candidate, and to guarantee voting systems are taking the data of voting
thatvoters have no evidence that proves which and they are not bothered about the
candidates received their votes. The existence authenticity of the person where by providing a
of such evidence would allow votes to be chance for others to cast the votes i.e
purchased by a candidate. unauthorized privilege escalation .
The voting system must also be tamper- The proposed voting system
resistant to thwart a wide range of attacks, authenticates the person and considers the
including ballot stuffing by voters and voting
incorrect tallying by insiders. Another factor,
as shown by the so-called “butter y ballots” in

1
2.CLASSIFICATION OF THE checking for a particular identity in the
database available.
BIOMETRICS
The setting of the error tolerance of
The two categories of biometric techniques are
these systems is critical to their performance.
The physiological based techniques,
Both errors (False Rejection and False
which measure the physiological
Acceptance).Should be low and they should
characteristics of a person. These include
both are quoted by the manufacturers.
fingerprint verification, iris analysis, facial
3.HOW BIOMETRIC TECHNO
analysis, hand geometry vein patterns, ear
recognition, odor detection and DNA pattern LOGY WORKS
analysis. Process involved in using a biometric
The behavioral based techniques, which system for security is
measure the behavior of a person. These
include hand written signature verification and
speech analysis.

Figure 3.1.working of biometrics


3.1During Enrollment
1.Capture the biometrics, which has to be
stored in theDatabase.

Figure.2.1 Biometrics classification 2.Process the biometric, extract and enroll the
The two major techniques involve two biometric template.
major steps. These are the Authentication & 3.Store the template in a local repository, a
the verification.Authentication is a process of central repository, or a portable token such as a
one-to one comparison, rather than a mass smart card.
searching process. Identification is a process of 3.2.During access to database
4.Live-scan the biometric feature.

2
5.Process the biometric and extract the during identification & authentication
biometric template. ‘hashing’ is used. Hashing is a process of
6.Match the scanned biometric against stored detecting the perfect match of a particular input
templates. record from a large database using a hashing
7.Incase of successful verification; provide a function.
matching score to business application. 4.APPLICATIONS OF BIOME
8.Record a secure audit trail with respect to
TRICS
system use.
All the information regarding the
Biometric applications depend on
fingerprints, retina etc. Are digitalized and
comparing as new measure against previously
stored. This can be compared with a database
captured information. In Biometric application
in seconds and with an extraordinary degree of
some aspect of a person is measured; the
accuracy. Fingerprints have the advantage of
measure is processed; and the resulting data is
being cheaper and simpler than most other
stored; At a subsequent time, the same aspect
biometrics.
of a person is measured and compared against
the stored data .If it is being used for 4.1.E-commerce Applications
authentication, the new data is compared E-commerce developers are exploring

against the data, already in storage for that the use of biometrics to more accurately verify

person. If it is being used for identification, the a trading party’s identity.

entire database is searched, in order to locate 4.2.Covert Surveillance


one or more individuals that are a close fit to Facial and body recognition biometric
the new data. Most biometrics technologies do techniques come in to picture automatically to
not seek exact equality between the new and identify known suspects entering buildings or
the stored measures. Instead they have a pre-set traversing crowed security areas such as
tolerance range within which the two are airports.
deemed to be sufficiently close. In order to 5.TYPES OF BIOMETRIC SEC
reduce transmission time, costs and to require
URITY TECHNOLOGIES
less storage space, compression algorithms are
used. 5.1. Finger Scan
To provide better transfer rate of data Finger-scan biometrics is base on the
distinctive characteristics of the human

3
fingerprint. A fingerprint image is read from a are perhaps less disciplined in their approach to
capture device, features are extracted from the the system. Accuracy can be very high if
image, and a template is created. It involves the desired, and flexible performance tuning and
user placing his finger over a glass-plate, biometric system for security is: configuration
which resides over a high-resolution camera, can accommodate a wide range of applications.
which uses optical or electromagnetic means to Organizations are using hand geometry readers
take its snapshot Fingerprints are used in in various scenarios, including time and
forensic applications: large- scale, one-to-many attendance recording, where they have proved
searches on databases of up to millions of extremely popular. Ease of integration into
fingerprints. These searches can be done within other systems and processes, coupled with ease
only a few hours by using AFIS (Automated of use, makes hand geometry an obvious first
Fingerprint Identification Systems). The basic step for many biometric projects.
in both finger scan and finger prints is that the
curvatures, deltas, crossovers, pores, loops etc,
are of a person are captured and stored in the
database in digitized for and are encrypted in
cases of authentication or identification .
Figure.5.2.Hand Geometry
5.3.Face
Face recognition analyzes facial
characteristics. It requires a digital camera to
develop a facial image of the user for
authentication. Facial recognition tries to
Figure5.1. Finger Scanner match various facial characteristics such as
5.2. Hand Geometry distance between eyes, width of nose,
Hand geometry involves analyzing and cheekbones, jaw line and chin characteristics to
measuring the shape of the hand. This arrive at an identity match. This technique has
biometric offers a good balance of performance attracted considerable interest, although many
characteristics and is relatively easy to use. It people don't completely understand its
might be suitable where there are more users or capabilities. Some vendors have made
where users access the system infrequently and extravagant claims—Multimodal Biometric

4
Voting System which are very difficult, if not Voice authentication is not based on
impossible, to substantiate in practice—for voice recognition but on voice-to-print
facial recognition devices. Because facial authentication, where complex technology
scanning needs an extra peripheral not transforms voice into text. Voice biometrics
customarily included with basic PCs, it is more has the most potential for growth, because it
of a niche market for network authentication. requires no new hardware—most PCs already
However, the casino industry has capitalized contain a microphone. However, poor quality
on this technology to create a facial database of and ambient noise can affect verification
scam artists for quick detection by security addition, the enrollment procedure has often
personnel. been more complicated than with other
5.4.Signature biometrics, leading to the perception that voice

Signature verification analyzes the way verification is not user friendly. Therefore,

a user signs her name. Signing features such as voice authentication software needs

speed, velocity, and pressure are as important improvement. One day, voice may become an

as the finished signature's static shape. additive technology to finger-scan technology.

Signature verification enjoys a synergy with Because many people see finger scanning as a

existing processes that other biometrics do not. higher authentication form, voice biometrics

People are used to signatures as a means of will most likely be relegated to replacing or

transaction-related identity verification and enhancing PINs, passwords, or account names.

most would see nothing unusual in extending 5.6.Retina scan


this to encompass biometrics. Signature Retina scan requires the user to situate
verification devices are reasonably accurate in his or her eye with ½ inch of the capture device
operation and obviously lend themselves to and hold still while the reader ascertains the
applications where a signature is an accepted patterns. It involves imaging of the blood
identifier. Surprisingly, relatively few vessels in the retina of the eye when infrared
significant signature applications have emerged light of a certain frequency and wavelength is
compared with other biometric methodologies. incident upon it this energy is absorbed by the
But if your application fits, it is a technology blood vessels is different in different
worth considering. individuals. The user looks at a rotating green
5.5.Voice light as the patterns of the retina are measured
at over 400 points; which leads a very high

5
level off accuracy in comparison to most other code (somewhat similar to barcode). For
biometrics. Retina scan is designed to use in recording the iris pattern, a monochrome
military facilities, logical security applications camera is used and the distance between the
such as network access or PC logic. The eye and the camera can be at most 3 feet. The
patterns of blood vessels on the back of the iris code constructed contains information the
human eye are unique from person to person. characteristics and position of the unique
The blood vessels on the back of the retina are points. The iris has more unique information
generally stable through one’s lifetime,with the than any other single organ in the body.
exception of degenerative diseases. Since the
retina is an internal portion of the eye, retina
scanning is considered intrusive. Thus the
individual may be hesitant to get exposed to
the scanning. Moreover, retina scanning is a
costly and sophisticated process
5.7.Iris scan
The iris has colored streaks and lines
that radiate out from the pupil of the eye. The Figure5.3 camera of iris scan
iris provides the most comprehensive biometric 6.DRAW BACKS OF TRADIT
data after DNA.Iris security system is
IONAL AND ELECTRONIC
smoother, smarter and more secure
identification system Automated high speed VOTING SYSTEM
iris capturing and precision identification make A major problem with biometrics is
iris identification system the world's most how and where to store the user’s template. Its
advanced access and entry point security storage introduces privacy concerns. On the
identification system And the chance that any other hand, storing the template on a smart
two people may have the same pattern is one in card enhances individual privacy and increases
10 to-the-power-78,which is way above the protection from attack, because individual
current population of the Earth. In this users control their own templates.Inside the
scanning, the characteristics of the iris are eye is a very delicate area and so, many people
taken into account. About 266 unique points are very hesitating to use laser eye device. Two
are recorded andconverted into a 512-byte iris primary causes of errors affect biometric data:

6
time and environmental conditions. Biometrics system with still photos or other images.
may change as an individual ages. Strengthening existing biometric innovations
Environmental conditions may either after the for future growth
biometric directly (for example, if a finger is
cut and scarred) or interfere with the data 8.OUR WORKS ON BIOMER
collection (for instance, background noise
ICS
when using a voice biometric).
Every biometric system has its
7.FUTURE OF BIOMETRICS
limitations. Therefore, identification based on
Biometric technology is one area that
multiple biometrics is an emerging trend as
no segment of the IT industry can afford to
multimode biometrics can provide a more
ignore, biometrics provides security benefits
balanced solution to the security multimode
across the spectrum, from IT vendors to end
systems involve the use of more than one
users, and from security system developers to
biometric system. Our contribution to the
security system users. All these industry
above subject is that we
sectors must evaluate the costs and benefits of
have developed an algorithm on multi modal
implementing such security measures.
biometric voting system. The authenticity is
Biometrics' future will include e-commerce
assured by using finger scan, voice scan, hand
applications for extra security on the checkout
geometry scan and by requesting the password
page, and biometrics will guard against
given by the citizen for a particular user when
unauthorized access to cars and cell phones. In
necessary. The following are the flowcharts
the future, biometric technology will further
and the algorithms
develop 3-D infrared facial recognition access
8.1.Algorithm 1
control, real-time facial recognition passive
Every citizen is given PIN number and his
surveillance, and visitor management
characteristics are
authentication systems. Already A4Vision, a
stored in the corresponding location
provider of 3-D facial scanning and
STEP 1: A person enters the polling booth that
identification software uses specialized
uses multimodal biometric voting system
algorithms to interpret the traditional 2-D
(finger scan, voice scan & hand scan) for
camera image and transfer it into a 3-D
greater degree of security
representation of a registered face. This makes
it almost impossible to deceive the biometric

7
STEP 2: The person is requested to ENTER The fingerprint taken as input in the above step
his or her PIN The PIN is checked whether it is compared with the fingerprints in the
is in voted list or not database of corresponding pin
IF ( PIN is in voted list GOTO STEP8 e) STEP 4: The person is requested to speak

start few words, which is converted into digitalized


code by the voice scanner
f) STEP 5: The code in the above step is
Multi model biometric voting system
compared with the voice codes in the database
of PIN
Finger
(b) IF the code is matched (condition)

Yes (d)
THEN,
©
GOTO ALGORITHM 2
no
Voice ELSE (i.e., if the code does not find a match)
scan
GOTO STEP 6.
(g)
Flow i) STEP6: The person is requested to place
(f) yes
(k) no chart-2 his hand above the hand scanner so that the

Hand scan structure of the hand is recorded


no j) STEP 7: The data in the above step is
yes Flow compared with all the data available in the
(i) chart-2
database.

Access the matched


IF the data is matched
into
file
stop THEN,
database
GOTO STEP8.
ELSE (i.e., the data does not find a
Figure 8.1.Flowchart-1 match)
ELSE GOTO STEP : 3) GOTO Algorithm 2.
STEP 3: The person is requested to give his or k) STEP 8: The person is authorized for voting
her fingerprint (as input) on the finger scan l) STEP 9: The corresponding pin is noted as
pad. voted
8.2.Algorithm 2

8
m) STEP 1: A request is sent to the database
Flow chart
algorithm-2 querying it to send the password file from the
OS security files.
n) The passwords are received in an encrypted
Data
base from (DES-data Encryption Standards).
Password
spoken 0) STEP 2: The person is requested to speak
his password.
p) STEP3: the vocal password spoken in the

Speech processing above step is converted into textual password


circuit. by the speech processing circuit
q)STEP-4:This password is compared with
Operating
system password file from step 1.
searches IF match is found
for security
THEN,
Textual password ELSE,
Voting is denied
r) STEP5: Exit

9.CONCLUSION
(o)
Multimodal Biometric Voting System
Considering various biometric techniques like
finger scan, retina scan etc, finger scan is
Consider the vote.
widely used. Biometric technology has been
around for decades but has mainly been for

Glow the red highly secretive environments with extreme


light indicator security measures. The proposed algorithm for
multimodal biometric voting system minimizes
the corruption involved by human intention .
stop
The technologies behind biometrics are still
emerging. This article gives a snapshot of the
Figure 8.2.Flowchart-2
dynamics under way in this emerging
biometric market, and we hope it will help all

9
the possible alternatives when acquiring new
biometric technologies.

REFERENCES
[1]”Biometrics,personal identification in
Networked society”
Vol.479, Anil K. Jain (Editor). Ruud
Bolle,Sharath Pankanti.
[2]“A Practical Guide to Biometric security
Technology”
Simon Liu and Mark Silverman
[3]“Biometrics and strong Authentication”
Chris Mills, Karl Ware, Christopher Mills,
April 2002,Osborne McGraw-Hill.
[4]“Biometrics: identity Verification in a
Networked Worked”
Samir Nanavati, March 2002, John Wiley
& Sons

10

You might also like