A secure biometric authentication system for smart environment using reversible data hiding through encryption scheme

Publications

A secure biometric authentication system for smart environment using reversible data hiding through encryption scheme

A secure biometric authentication system for smart environment using reversible data hiding through encryption scheme

Year : 2022

Publisher : Elsevier

Source Title : Machine Learning for Biometrics: Concepts, Algorithms and Applications

Document Type :

Abstract

Biometric authentication is used in its fullest potential in all smart environments. Face recognition and fingerprint recognition are the two most popular approaches for biometric authentication. In some places, where a higher level of security is required can be equipped with the combination of face recognition and fingerprint recognition. In general, from the client side, the biometric data will be collected using a camera and fingerprint scanner, and that information will be transmitted to a cloud service provider to do the complex tasks, such as face recognition and fingerprint recognition. In such situations, the transmission of face images and fingerprints from the client side to a server is a major concern since an intruder may try to grab that information, and later, they can use that information to control the authentication system. In this chapter, we discuss a secure mechanism to send the face images and the fingerprints with the aid of a reversible data hiding (RDH) through the encryption scheme. RDH is a process of hiding some data by using a concealing medium in such a way that later the extraction of the hidden message is possible along with the recovery of the original images. In a RDH through encryption scheme, the RDH process and the image encryption process will be combined into a single task to hide the secret message in an image. In this chapter, we propose a new model in which the compressed fingerprint data as a secret message will be embedded into the face image through a reversible data hiding through the encryption scheme. The encrypted image obtained after RDH through encryption will be transmitted to the cloud service provider for further processing.