Secured Biometric Signal Transfer using Steganography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multimodal Biometric - based Secured Authentication System using Steganography

Problem statement: The main challenge in the design of a security system for high security mobile ad OC network is how to prevent the attacks against data modification and authentication. Approach: In this novel proposed system the messages communicated between the users are encrypted by the cancellable cryptographic key generated from fingerprint features of the receiver by applying genetic op...

متن کامل

Four key Secured Data Transfer Using Steganography and Cryptography

Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...

متن کامل

Secured Electronic Voting Protocol Using Biometric Authentication

This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...

متن کامل

Highly Secured Image Steganography Using Particle Swarm Optimization

Steganography is the art and science of concealing secret information in plain sight without being noticed within an innocent media so as not to arouse an eavesdropper’s suspicion and also it can be securely transmitted through network. In this paper novel steganography method based on Particle Swam Optimization (PSO) algorithm is adopted for hiding secret information with good invisibility, hi...

متن کامل

Secured Biometric Authentication using Visual Cryptography and Transforms

Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering and Technology

سال: 2017

ISSN: 2319-8613,0975-4024

DOI: 10.21817/ijet/2017/v9i3/170903s093