Identity document authentication using steganographic techniques: The challenges of noise

Juanita Blue, J. Condell, T. Lunney
{"title":"Identity document authentication using steganographic techniques: The challenges of noise","authors":"Juanita Blue, J. Condell, T. Lunney","doi":"10.1109/ISSC.2017.7983646","DOIUrl":null,"url":null,"abstract":"The term ‘steganography’ encapsulates the practice of secretly embedding data into digital mediums including video, image and audio files. Although steganography is often associated with nefarious activities, conceptually it asserts several characteristics that render it useful in contemporary security applications. Not just a mechanism for criminals to communicate secret information over a digital channel, steganography is also used as a legitimate method of ensuring integrity of digital media artefacts and for identification of same. This application of steganography allows for identification images storing additional information to verify both the identity of the subject as well as the authenticity of the image. Developed methods of steganography invoke various spatial domain techniques that are successful in covertly concealing data within ‘innocent’ carrier images. The techniques include linear methods such as those which replace the least significant bit (LSB) of the bytes in an image and frequency domain methods including discrete cosine transform (DCT), discrete wavelet transform (DWT) and discrete Fourier transform (DFT). The success of a steganographic algorithm is hinged on the method's ability to successfully embed data, so that the data remains concealed within a carrier image; and also to successfully extract the same data uncorrupted. Often modern image coding formats include lossy compression in the frequency domain; this can result in data loss, corruption and noise within the image when carrier images are re-encoded. To ensure data extraction is successful, error correction functions must be invoked to counteract noise and ensure embedded data is extracted without any loss or corruption. In exploring steganographic software, the functionality and reliability of a novel steganographic application ‘Intelligent Identity Authenticator’ (IIA) was assessed. IIA invokes the use of steganography to conceal real-time identity information within images on identity cards. The functionality of IIA is based on a unique algorithm that utilizes DWT to embed a string of characters within an identity image. When data is extracted, it provides a link to further documentation relating to the data subject, allowing for verification of the claimant's identity and authenticity of the identity card. The embedding and extraction functions executed by IIA were found to be mostly reliable, except where data had been embedded within a carrier image that was characterized by a large proportion of black pixels. In these cases, the extracted data string experienced significant loss and corruption, thus preventing access to the identity verification documentation. This paper explores the potential cause of this specific corruption and discusses extensive testing conducted on control images. The results are analysed to identify an improved solution that could rectify the issue, with an aim to improving both the functionality and reliability of the IIA system.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 28th Irish Signals and Systems Conference (ISSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSC.2017.7983646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

The term ‘steganography’ encapsulates the practice of secretly embedding data into digital mediums including video, image and audio files. Although steganography is often associated with nefarious activities, conceptually it asserts several characteristics that render it useful in contemporary security applications. Not just a mechanism for criminals to communicate secret information over a digital channel, steganography is also used as a legitimate method of ensuring integrity of digital media artefacts and for identification of same. This application of steganography allows for identification images storing additional information to verify both the identity of the subject as well as the authenticity of the image. Developed methods of steganography invoke various spatial domain techniques that are successful in covertly concealing data within ‘innocent’ carrier images. The techniques include linear methods such as those which replace the least significant bit (LSB) of the bytes in an image and frequency domain methods including discrete cosine transform (DCT), discrete wavelet transform (DWT) and discrete Fourier transform (DFT). The success of a steganographic algorithm is hinged on the method's ability to successfully embed data, so that the data remains concealed within a carrier image; and also to successfully extract the same data uncorrupted. Often modern image coding formats include lossy compression in the frequency domain; this can result in data loss, corruption and noise within the image when carrier images are re-encoded. To ensure data extraction is successful, error correction functions must be invoked to counteract noise and ensure embedded data is extracted without any loss or corruption. In exploring steganographic software, the functionality and reliability of a novel steganographic application ‘Intelligent Identity Authenticator’ (IIA) was assessed. IIA invokes the use of steganography to conceal real-time identity information within images on identity cards. The functionality of IIA is based on a unique algorithm that utilizes DWT to embed a string of characters within an identity image. When data is extracted, it provides a link to further documentation relating to the data subject, allowing for verification of the claimant's identity and authenticity of the identity card. The embedding and extraction functions executed by IIA were found to be mostly reliable, except where data had been embedded within a carrier image that was characterized by a large proportion of black pixels. In these cases, the extracted data string experienced significant loss and corruption, thus preventing access to the identity verification documentation. This paper explores the potential cause of this specific corruption and discusses extensive testing conducted on control images. The results are analysed to identify an improved solution that could rectify the issue, with an aim to improving both the functionality and reliability of the IIA system.
使用隐写技术的身份文件认证:噪声的挑战
“隐写术”一词概括了将数据秘密嵌入数字媒体(包括视频、图像和音频文件)的做法。虽然隐写术经常与恶意活动联系在一起,但从概念上讲,它具有使其在当代安全应用程序中有用的几个特征。隐写术不仅是犯罪分子通过数字渠道交流秘密信息的一种机制,而且还被用作确保数字媒体工件完整性和识别相同内容的合法方法。这种隐写术的应用允许识别图像存储额外的信息,以验证主体的身份以及图像的真实性。开发的隐写方法调用各种空间域技术,成功地将数据隐藏在“无辜”的载体图像中。这些技术包括线性方法,如替换图像中字节的最低有效位(LSB)的方法和频域方法,包括离散余弦变换(DCT)、离散小波变换(DWT)和离散傅立叶变换(DFT)。隐写算法的成功取决于该方法成功嵌入数据的能力,从而使数据隐藏在载体图像中;并成功地提取相同的数据无损。通常现代图像编码格式包括频域的有损压缩;当载体图像被重新编码时,这可能导致数据丢失、损坏和图像中的噪声。为了确保数据提取成功,必须调用纠错函数来抵消噪声,并确保提取嵌入数据时不会丢失或损坏。在探索隐写软件,功能和可靠性的一种新的隐写应用程序“智能身份验证器”(IIA)进行了评估。IIA使用隐写术来隐藏身份证图像中的实时身份信息。IIA的功能基于一种独特的算法,该算法利用DWT在标识图像中嵌入一串字符。当提取数据时,它提供了与数据主体有关的进一步文件的链接,允许核实索赔人的身份和身份证的真实性。IIA执行的嵌入和提取功能被认为是最可靠的,除非数据被嵌入到以大量黑色像素为特征的载体图像中。在这些情况下,提取的数据字符串经历了严重的丢失和损坏,从而阻止了对身份验证文档的访问。本文探讨了这种特定损坏的潜在原因,并讨论了对控制图像进行的广泛测试。对结果进行分析,以确定一个改进的解决方案,可以纠正这个问题,目的是提高IIA系统的功能和可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信