Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem
{"title":"基于指纹图像能量特性选择数据隐藏算法块的安全生物识别系统实现","authors":"Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem","doi":"10.1109/NTCCIT.2018.8681181","DOIUrl":null,"url":null,"abstract":"this paper is using the fingerprints as a biometric technique to ensure the security of the system. The steganography technique used for hiding data, the image media file is used as cover then embedding the secret data (feature and PIN) inside it.The procedure of this work includes taking the fingerprint image of the person, after that the image should be enhanced due to its low quality and preprocessing steps. After that is dividing the image to numbers of blocks and extracting the features such as (probability to each gray levels, mean, energy and effective pixels to each block) from this image by using Particle Swarm optimization (PSO) algorithm.Later the cryptography step is implemented based on feature that will be taken from nature inspired algorithm. Finally, selecting two hundred blocks from eight images to same person (fingerprint) to work for a high capacity based on histogram reversible data hiding algorithm with a comparatively lower deformation introduced after inserting the secret message.","PeriodicalId":123568,"journal":{"name":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm\",\"authors\":\"Dr. Mustafa Sabah, Dr. Adil Majeed, Haider S. Hatem\",\"doi\":\"10.1109/NTCCIT.2018.8681181\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"this paper is using the fingerprints as a biometric technique to ensure the security of the system. The steganography technique used for hiding data, the image media file is used as cover then embedding the secret data (feature and PIN) inside it.The procedure of this work includes taking the fingerprint image of the person, after that the image should be enhanced due to its low quality and preprocessing steps. After that is dividing the image to numbers of blocks and extracting the features such as (probability to each gray levels, mean, energy and effective pixels to each block) from this image by using Particle Swarm optimization (PSO) algorithm.Later the cryptography step is implemented based on feature that will be taken from nature inspired algorithm. Finally, selecting two hundred blocks from eight images to same person (fingerprint) to work for a high capacity based on histogram reversible data hiding algorithm with a comparatively lower deformation introduced after inserting the secret message.\",\"PeriodicalId\":123568,\"journal\":{\"name\":\"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NTCCIT.2018.8681181\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTCCIT.2018.8681181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm
this paper is using the fingerprints as a biometric technique to ensure the security of the system. The steganography technique used for hiding data, the image media file is used as cover then embedding the secret data (feature and PIN) inside it.The procedure of this work includes taking the fingerprint image of the person, after that the image should be enhanced due to its low quality and preprocessing steps. After that is dividing the image to numbers of blocks and extracting the features such as (probability to each gray levels, mean, energy and effective pixels to each block) from this image by using Particle Swarm optimization (PSO) algorithm.Later the cryptography step is implemented based on feature that will be taken from nature inspired algorithm. Finally, selecting two hundred blocks from eight images to same person (fingerprint) to work for a high capacity based on histogram reversible data hiding algorithm with a comparatively lower deformation introduced after inserting the secret message.