Secured Biometric Signal Transfer using Steganography
نویسندگان
چکیده
منابع مشابه
Multimodal Biometric - based Secured Authentication System using Steganography
Problem statement: The main challenge in the design of a security system for high security mobile ad OC network is how to prevent the attacks against data modification and authentication. Approach: In this novel proposed system the messages communicated between the users are encrypted by the cancellable cryptographic key generated from fingerprint features of the receiver by applying genetic op...
متن کاملFour key Secured Data Transfer Using Steganography and Cryptography
Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...
متن کاملSecured Electronic Voting Protocol Using Biometric Authentication
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...
متن کاملHighly Secured Image Steganography Using Particle Swarm Optimization
Steganography is the art and science of concealing secret information in plain sight without being noticed within an innocent media so as not to arouse an eavesdropper’s suspicion and also it can be securely transmitted through network. In this paper novel steganography method based on Particle Swam Optimization (PSO) algorithm is adopted for hiding secret information with good invisibility, hi...
متن کاملSecured Biometric Authentication using Visual Cryptography and Transforms
Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering and Technology
سال: 2017
ISSN: 2319-8613,0975-4024
DOI: 10.21817/ijet/2017/v9i3/170903s093