BIOMETRIC STEGANOGRAPHY USING VISUAL OBJECT FOR REMOTE AUTHENTICATION
Keywords:
Remote authentication, QSWT, Stego-object, BiometricsAbstract
Sensitive information is frequently exchanged via wireless network, which requires remote authentication for accessing the information. Remote authentication might be in the form of encrypted information. Intruder attacks such as Trojan Horse may cause serious issues especially in the case of remote operations. Here a robust authentication technique is proposed, which is based on Chaotic encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. Next, user’s biometric signal is encrypted using a chaotic encryption method. Then the encrypted image is vectorized and the data hiding process is carried out using Qualified Significant Wavelet Trees (QSWTs). QSWT is used to achieve the invisibility, resistance to attacks and robustness in data hiding. Subsequently, the Inverse Discrete Wavelet Transform (IDWT) is applied to retrieve the hidden information from the stego-object followed by an appropriate decryption process to get back the biometric image. Experimental results prove that the proposed technique would yield security merits and robustness to steganalytic attacks.