We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

High Secured and Authenticated Secret Message Sending using TIRI-DCT-DWT based Iris Recognition and Steganography

by N. Suresh Singh, G. Suganthi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 8
Year of Publication: 2013
Authors: N. Suresh Singh, G. Suganthi
10.5120/11983-7858

N. Suresh Singh, G. Suganthi . High Secured and Authenticated Secret Message Sending using TIRI-DCT-DWT based Iris Recognition and Steganography. International Journal of Computer Applications. 70, 8 ( May 2013), 26-30. DOI=10.5120/11983-7858

@article{ 10.5120/11983-7858,
author = { N. Suresh Singh, G. Suganthi },
title = { High Secured and Authenticated Secret Message Sending using TIRI-DCT-DWT based Iris Recognition and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 8 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number8/11983-7858/ },
doi = { 10.5120/11983-7858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:20.615794+05:30
%A N. Suresh Singh
%A G. Suganthi
%T High Secured and Authenticated Secret Message Sending using TIRI-DCT-DWT based Iris Recognition and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 8
%P 26-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the world of modern communication, securing information is a very important task. Hence Cryptographic systems are integral parts of communication systems in majority applications. Security requirements demand that these systems need to be operated with large secret keys. Since it is very difficult to remember large private keys, these keys are replaced by biometric features and this is called biometric security. The biometric identification system is one of the royal technologies used in the recognition system. Iris recognition system is the most reliable system for an individual identification. Of all biometrics-based techniques, the iris pupils and the outer areas provide very high accuracies in verifying an individual's identity. The iris is unique across peoples. Only the iris bit code template specific to an individual need to be stored for future identity verification. In this paper customer information is embedded in the iris. The Low Distortive Transformation (LDT) method is used to retrieve the information from the stego image in the server system. The iris authentication process is performed after the preprocessing on iris image with the reference of the iris database. Authentication process is implemented using Temporal Informative Restorable Image(TIRI) method. And this paper proposes a method to authenticate a person based on iris. The system will allow the process if the authentication process is success, otherwise it will send non authentication information to the client. The data embedding by LDT ensures the minimization of the mean square error. This paper combines the embedding, reversible data retrieval and iris feature based authentication. It is experimentally verified that the proposed system outperforms existing biometric security systems.

References
  1. Jai shanker K. Pillai, Rama Chellappa, Fellow, IEEE, and Nalini K. Ratha, Fellow, IEEE. IEEE transactions on pattern analysis and machine intelligence, VOL. 33, NO. 9, SEPTEMBER 2011. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.
  2. K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, "Image Understanding for Iris Biometrics: A Survey," Computer Vision and Image Understanding, vol. 110, no. 2, pp. 281-307, 2008.
  3. J. Tian, "Reversible data embedding using a difference expansion,"IEEE Trans. Circuits Syst. Video Technol. , vol. 13, no. 8, pp. 890–896,Aug. 2003.
  4. J. Daugman, "Probing the Uniqueness and Randomness of Iris Codes: Results from 200 Billion Iris Pair Comparisons," Proc. IEEE, vol. 94, no. 11, pp. 1927-1935, Nov. 2006.
  5. E. M. Newton and P. J. Phillips, "Meta-Analysis of Third-Party Evaluations of Iris Recognition," IEEE Trans. Systems, Man, and Cybernetics, vol. 39, no. 1, pp. 4-11, Jan. 2009.
  6. J. Wright, A. Y. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, "Robust Face Recognition via Sparse Representation," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 2, pp. 210-227, Feb. 2009.
  7. H. Proenca and L. A. Alexandre, "Iris Segmentation Methodology for Non-Cooperative Recognition," IEE Proc. Vision, Image and Signal Processing, vol. 153, pp. 199-205, 2006.
  8. Low Distortion Transform for Reversible Watermarking, Dinu Coltuc, Member, IEEEIEEE transactions on image processing, vol. 21, no. 1, January 2012.
  9. X. Li, "Modeling Intra-Class Variation for Non-Ideal Iris Recognition,"Proc. Int'l Conf. Biometrics, pp. 419-427, 2006.
  10. Mani malek Esmaeili,Mehrdad Fatourechi, and Rabab ward. IEEE transactions on information forensics and security, vol. 6, no. 1, march 2011'A Robust and Fast video copy detection system using content-based Fingerprinting.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Multimodel iris feature map low-distortion transform lookup table Temporal Informative Representative Images