Recursive Visual Secret Sharing Scheme using Fingerprint. Authentication

Similar documents
Information and Knowledge Management ISSN (Paper) ISSN X (Online) Vol 2, No.2, 2012

An Algorithm for Generating New Mandelbrot and Julia Sets

Digital Image Processing for Camera Application in Mobile Devices Using Artificial Neural Networks

Document Image Binarization Using Post Processing Method

Survey on Wireless Intelligent Video Surveillance System Using Moving Object Recognition Technology

On Demand Web Services with Quality of Service

Numerical solution of Fuzzy Hybrid Differential Equation by Third order Runge Kutta Nystrom Method

Selection of Web Services using Service Agent: An optimized way for the selection of Non-functional requirements

Control Theory and Informatics ISSN (print) ISSN (online) Vol 2, No.1, 2012

Dynamic Instruction Scheduling For Microprocessors Having Out Of Order Execution

Bandwidth Recycling using Variable Bit Rate

Location Based Spatial Query Processing In Wireless System

Harvesting Image Databases from The Web

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol.5, No.4, 2014

SQL Based Paperless Examination System

The Fast Fourier Transform Algorithm and Its Application in Digital Image Processing

Mobile Ad hoc Networks Dangling issues of optimal path. strategy

Visual Secret Sharing Scheme using Grayscale Images

Modeling of Piecewise functions via Microsoft Mathematics: Toward a computerized approach for fixed point theorem

Two-stage Interval Time Minimization Transportation Problem with Capacity Constraints

A Heuristic Based Multi-Objective Approach for Network Reconfiguration of Distribution Systems

A Deadlock Free Routing Algorithm for Torus Network

A New Technique to Fingerprint Recognition Based on Partial Window

A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography

A Novel Method to Solve Assignment Problem in Fuzzy Environment

Numerical Flow Simulation using Star CCM+

A Novel Technique for Controlling CNC Systems

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

Secure Transactions using Wireless Networks

A File System Level Snapshot In Ext4

Root cause detection of call drops using feedforward neural network

MSGI: MySQL Graphical Interface

Video Calling Over Wi-Fi Network using Android Phones

Fuzzy k-c-means Clustering Algorithm for Medical Image. Segmentation

A Novel Approach for Imputation of Missing Value Analysis using Canopy K-means Clustering

Recursive Information Hiding in Visual Cryptography

A Probabilistic Data Encryption scheme (PDES)

The Comparative Study on Visual Cryptography and Random Grid Cryptography

Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme

Design and Simulation of Wireless Local Area Network for Administrative Office using OPNET Network Simulator: A Practical Approach

A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications

Clustering Algorithm for Files and Data in Cloud (MMR Approach)

Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication Shabir A. Parah 1, Javaid A. Sheikh 2, G. M.

An FPGA based Efficient Fruit Recognition System Using Minimum Distance Classifier

Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

Visual Cryptography of Animated GIF Image Based on XOR Operation

On Mobile Cloud Computing in a Mobile Learning System

3D- Discrete Cosine Transform For Image Compression

Offering an Expert Electronic Roll Call and Teacher Assessment System Based on Mobile Phones for Higher Education

A Cultivated Differential Evolution Algorithm using modified Mutation and Selection Strategy

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Differential Evolution Biogeography Based Optimization for Linear Phase Fir Low Pass Filter Design

Performance study of Association Rule Mining Algorithms for Dyeing Processing System

Finger Print Enhancement Using Minutiae Based Algorithm

Website Vulnerability to Session Fixation Attacks

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol 3, No.2, 2012 Cyber Forensics in Cloud Computing

Algorithm for Classification

Visual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Digital Rights Management: Improving Online Digital Images Copy Rights Management through an Enhanced Least Significant Bit Steganographic Algorithm

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Audio Compression Using DCT and DWT Techniques

Minutiae Based Fingerprint Authentication System

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA

Advanced Steganographic Technique Based on Extended Visual Cryptography Scheme

Implementation of IRIS recognition for Securing Online Payment

Polar Harmonic Transform for Fingerprint Recognition

Modelling of a Sequential Low-level Language Program Using Petri Nets

BIOMETRIC TECHNOLOGY: A REVIEW

Rainfall-runoff modelling of a watershed

Design of A Mobile Phone Data Backup System

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Identity verification system: a visual cryptography-based approach to prevent fraudulent in admission process

Encryption of Text Using Fingerprints

Robust biometric image watermarking for fingerprint and face template protection

Implementing Security in QR Codes by using Blowfish Algorithm

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

Dynamic Load Balancing By Scheduling In Computational Grid System

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Secret Image Sharing Scheme Based on a Boolean Operation

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Application of Light Weight Directory Access Protocol to Information Services Delivery in Nigerian Tertiary Institutions Libraries

Mody University of Science and Technology Laxmangarh, Sikar, India, Pin

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Gn-Dtd: Innovative Way for Normalizing XML Document

International Journal of Advanced Research in Computer Science and Software Engineering

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Measuring Round Trip Time and File Download Time of FTP Servers

Query Optimization to Improve Performance of the Code Execution

Face Location - A Novel Approach to Post the User global Location

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Transcription:

Recursive Visual Secret Sharing Scheme using Fingerprint Authentication Mayura Kinikar Viraj Thakur Sandesh Sonawane Department of Computer Engineering MAE, Alandi,Pune-411006 University of PUNE,INDIA. Email: thakur.viraj1@gmail.com Abstract Recursive Visual Secret Sharing scheme takes the idea from the basic scheme of Visual cryptography to stack two transparent shares to obtain the original image. The paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. n- secrets equals n/2 levels. The Recursive visual cryptography produces shares from level n-1 when encrypted. For the purpose of user identification Biometric fingerprint authentication using minutiae extraction is provided with pixel pattern match and RGBA intensity match. Thus the proposed scheme would make efficient utilization of data. Keywords: Recursive Visual Cryptography, Embedding secrets, secret sharing, Minutiae pattern match, authentication, levels of shares. 1. Introduction Internet is one of the most popular communication channels but is insecure. Since it is an open and insecure medium, malicious users can intercept data. The fast growth of online applications results in the data security problem. In order to achieve data security, users need secure communication methods for transmitting secret messages over the Internet. Encryption is well-known method for achieving data security. It transforms secret information into an encrypted form, which looks like a random message. Transformation procedure is called encryption process and the result is called cipher text. A computational device is required to perform decryption of the cipher text. Therefore, the cost or efficiency of the hardware, complex algorithms and mathematical computations increase to encrypt and decrypt the data. Therefore, the cost increases and efficiency reduces and mathematical computations increase to encrypt and decrypt the data. 2. Data Security Security of data has been a major issue from many years. Using the age old technique of encryption and decryption has been easy to track for people around. Providing security to data using new technique is the need of the hour. This project uses the technique of Visual cryptography and providing biometric authentication. Thus using the above technique Recursive Visual cryptography would be implemented. 62

2.1 Objectives To provide security in any real time application. To store more than one secret at a time. Providing efficient algorithm for storage and retrieval of images from database. To provide much more security by adding biometric authentication. Providing an algorithm for fingerprint recognition through minutiae pattern extraction and matching. 3. Visual Cryptography One of the best known techniques to protect data such as image is Visual cryptography. Naor and Shamir introduced the visual cryptography scheme as a simple and secure way to allow the secret sharing of images without any cryptographic computations. [1]VCS is a cryptographic technique that allows for the encryption of visual information such that decryption can be performed using the human visual system. [1] The basic scheme is referred to as the 2-out-of-2 VCS which is denoted as VCS.[2] Given an original binary image, it is encrypted in images, such that where a Boolean operation is is an image which appears as white noise, and is the number of noisy images. It is difficult to decipher the secret image using individual s. The encryption is undertaken in such a way that one or more out of the generated images are necessary for reconstructing the original image. In the case of (2, 2) VCS, each pixel in the original image is encrypted into two sub pixels called shares. [1] The paper proposes the scheme of share creation taken from N x N share creation, we hereby propose the scheme of 2X2 Share creation proposed in this paper.fig.1 denotes the shares of a white pixel and a black pixel.[1],[2],[12] Neither share provides any clue about the original pixel since different pixels in the secret image will be encrypted using independent random choices. When the two shares are superimposed, the value of the original pixel can be determined. If is a black pixel, we get two black sub pixels; if it is a white pixel, we get one black sub pixel and one white sub pixel. Therefore, the reconstructed image will be twice the width of the original secret image. [6] 4. Related Work The topic of recursively hiding secrets within a share has been extensively researched. The scheme proposed in this paper applies to images and attempts to increase the efficiency of traditional VC to make it possible to hide extra secret information that serves as a steganographic channel.[10] The scheme involves recursive hiding of smaller secrets within a larger secret. It is obvious from the previous work that many thoughts have been given to the idea of recursive information hiding within visual cryptography.[11] However, the idea of embedding these types of recursive shares within the share and providing biometric security at the last level so that no previous shares would be recovered, to our knowledge, has never been considered. 4.1 Our contribution There are two main contributions that are discussed within this paper. The first deals with recursive creation of shares. This involves a recursive multiple resolution VC scheme which allows smaller secret to be hidden within one large share..[2] 63

The second contribution is providing biometric security to the last level of share, such that when the last share is authenticated the upper level of embedded secrets would be revealed. The Fingerprint recognition algorithm would be used to provide biometric security to last level of client share.[3] The well known algorithm The median metric algorithm would be implemented. 5. Proposed Modules: 5.1 Data storage and retrieval: For the purpose of authentication there would a server database which stores all the biometric images of the User, and the other information related to the user. The database would store all the shares created at the runtime.[5] 5.2 Recursive Visual Cryptography This method put forth has a secret image. Each secret is identified, two shares are created of that secret, as in the above figure.share1 is stored at client side and share 2 is stored at server side. In the next level the secret image 2 is taken and this secret is embedded in the application side share. The share that is stored at the application side has a secret embedded in it. Now this secret and share is converted into 2 shares and one stored at the client side and one store the server side.this method is followed recursively, such that at each level a secret would be embedded in the corresponding sharethus this is the method of recursive visual cryptography. 5.2.1 Visual cryptography Algorithm: Input:A W x H secret image P,p(i,j) of P Output:2 shares Sm,m=1to n; Process: 1.Generate sharing matrices C0 and C1. 2.For each pixel p(i,j),1<i<w and 1<j<H; 3.For l as the expanded pixel 1to n; 4.For m=1 to n 4.1: If pixelp(i,j)=0(white),the pixel value Sm (i,j)=c0(l,m) 4.2: If pixelp(i,j)=1(black),the pixel value Sm (i,j)=c1(l,m) 5.2.2 Recursive storing of secrets Algorithm 1.For each Sm, Sm+1=next secret,m=1to n. 2.Em=Embedded secret in share Cm,m=Odd share; 3.Expand Em using the 2X2 secret sharing scheme 64

4.Go to step 1 of RVC for each new secret 5.Store Sm, m=even share stored at client side, Sm=Odd share stored at application side Our policy is to provide biometric authentication at the client end such that when biometric authentication is provided by the client the secret would be stacked on the application side hare and the secret would be revealed. 5.3 Biometric Authentication There are various techniques provided for authentication in general scheme. Biometric authentication is the scheme provided by recognizing the human visual identity recognition. This paper would be implementing the Fingerprint Recognition with minutiae pattern match system. An efficient method for personal identification based on the pattern of human Fingerprint is proposed.[7] It is composed of image acquisition, image pre-processing to make a flat fingerprint then the minutiae patterns are extracted. Here there are various parameter match proposed,firstly the RGBA pattern match would be done and then for resolution match the fingerprint ratio would be matched against the original registered.[8] Thus the authentication would be carried out. The results show that proposed method is quite effective. 5.3.1 Methodology: In Fingerprint recognition image acquisition is an important step. Since Fingerprint is small in size and dark in colour, it is difficult to acquire good image. The colour image is captured.the image is then changed from RGB to gray level for further processing.[9]first of all to separate the fingerprint(minutiae pattern) from the image the boundaries of the finger and extract the minutiae a rough estimate of its center (Cx, Cy) is performed using the following Formula Cx=arg min(x)(iσ(x,y)) Cy=arg min(y)(i(σ(x,y)) Where I(x, y) is the fingerprint image intensity at point (x, y). To find the exact pixel of the fingerprint, a part of image is binarized. [8]Then using the median matrix method the image pixel intensity would be calculated and median would be calculated and stored in the array. The algorithm used here is the median matrix method; here the edges of the biometric images would be detected by using edge detection algorithm.the RGBA intensity, resolution match by contracting the image to 32 x32 pixel resolution size would be provided for biometric authentication. Thus the above ten parameters along with the median matrix method would be provided for authentication of users. 5.4 Decryption After the biometric authentication is done the customer will give his part of the share. The two shares from 65

the Application side and the client side would be superimposed and if they match the secret would be revealed. [1]This would be done for each level and the embedded secrets at each level will also be revealed. 6. Advantages The advantages of such type of Recursive Visual cryptographic scheme are: Original image security is provided. Secure Authentication is provided. Chance of fake share creation is not possible. More than one image be kept as secret.recursive cryptography is first of the concepts to be implemented for security. Efficient and fast retrieval of images from database by storing the image id rather than the entire image.this scheme can be used in any company whose data is its asset. 7. Experiments And Results Two shares are generated Share1 and Share2 as output of visual cryptography algorithm. One share along with username is kept by system and other is kept on card. For authentication user provides share which is on the card. The share extracted from this card is superimposed with corresponding share that is stored in the database, generates the original image.[7] From this fingerprint template image feature template is generated. Now this feature template is matched with fingerprint feature of newly provided fingerprint by the user.[8] As main intent of this paper is providing security to the Fingerprint template in the database, image processing algorithm for fingerprint feature extraction are derived from.[12] The working of proposed system is shown in shown above. For enrollment the image is taken from CASIA and NIST database.[7][8] After performing segmentation, normalization and feature extraction feature template is generated. Fingerprint template image (generated from feature template) and another binary image which is chosen by system Administrator is given as input to the visual cryptography algorithm. For each of the image the secret images from the shares are reveled.[12] 8.Conclusion We have proposed a scheme to build a secure intense project in which security would a major issue, thus making security with the intense algorithm of Recursive visual cryptography, and adding biometric authentication to it. Various approaches adopted by researchers to secure the raw biometric data and template in database are discussed here. In this paper a method is proposed to store fingerprint template securely in the database using visual cryptography. Experimental results indicate that by applying recursive visual cryptography techniques on fingerprint template for more security, matching performance of fingerprint recognition is unaffected with extra layer of authentication. 9.References [1] Visual Cryptography Moni Naor and Adi Shamir EUROCRYPT -1994 [2] Resolution Variant Visual Cryptography for Street View of Google MapsJonathan,WeirWeiQi YanQueen s University Belfast Belfast, BT7 1NN. [3] Visual Cryptography for Biometric Policy, Arun Ross & Asem Othem IEEE-Information Forensics 2011. 66

[4]User friendly random grid based Visual Secret Sharing-Tzung Chen & Kai Hsiang Tsao, National Chiayi University, Taiwan,ROC. [5] Fast and Efficient Visual cryptography for Medical Images-S.Manimurugan.K.Porukumaran, Anna University Coimbatore,India [6]Progressive Visual Cryptography with Unexpanded shares-young Chang Hou & Zen-Yu Quan, IEEE Information Security and Forensics. [7] N. Agrawal and M. Savvides, Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching, in Proc. Computer Vision and Pattern Recognition Workshop, 2009. [8] A. Jain, P. Flynn, and A. Ross, Handbook of Biometrics. New York: Springer, 2007. [9] R.ItoH. Kuwakado, and H. Tanaka, Image Size Invariant Visual Cryptography, IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences.[10] J. Weir and W.-Q. Yan, Dot-size variant visual cryptography, in IWDW 09: Proceedings of the 8th International Workshop on Digital Watermarking.. [10] M. Gnanaguruparan and S. Kak, Recursive hiding of secrets in visual cryptography, Cryptologia. [11] D. Chaum, Secret-ballot receipts: True voter-verification elections, IEEE Security and Privacy. 67

68

This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE s homepage: http:// The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http:///journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library, NewJour, Google Scholar