Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Rejuaro O. O. , Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., Adebajo O. O.
DOI Link: https://doi.org/10.22214/ijraset.2023.49548
Certificate: View Certificate
Recently, biometric was being integrated with cryptography (crypto-biometric system) to alleviate the limitations of the biometric or cryptography system. However, the main shortcoming of cryptography is poorly-chosen or forgotten password while challenges with biometrics include interclass similarities in the feature sets used to represent traits. In this work, a combination of cryptography and bimodal biometric was developed, an Advanced Encryption Standard based Fast Fourier Transform (AES-FFT) was developed and used as the cryptography technique. Hence, an attempt was made to develop an improved access control system using an enhanced bimodal bio-cryptography. Biometric features was extracted from individual face and iris after application of suitable preprocessing techniques for each modality using Principal Component Analysis (PCA) while cryptography key was generated using fused features from the face and iris by Advanced Encryption System based Fast Fourier Transform (AES-FFT). The two captured biometric data at acquisition module via webcam were subjected to appropriate pre-processing and feature extraction module. The features extracted were fused at feature level using weighted average and optimal features were selected using genetic programming (GP). The classification technique used was Support Vector Machine (SVM). To supplement the enhancement of the system’s integrity, templates and encrypted data were stored in a database. Access to the database was secured with AES-FFT algorithm. Thereafter, an Access Control System was simulated using MATLAB (version R2020b) and evaluated using False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (ERR) and Accuracy. The evaluation results showed that the FAR, FRR, ERR and Accuracy of the fused features using AES-FFT were 1.67, 2.22, 2.78 and 97.92% respectively at 0.76 threshold while for AES, the best values obtained for FAR, FRR, ERR and Accuracy were 3.33, 4.44, 7.90 and 95.83% respectively at same threshold. In view of this, an automated bi-modal crypto-biometric system based on fused iris and face (that is, both face and iris), produced a more reliable accurate and secure system on any repository system as a result of its high accuracy. In other words, the developed AES-FFT technique ensured scalable encrypting capacity, good imperceptibility and security performance, and robustness against various attacks with optimal computational efficiency in terms of its accuracy and time.
I. INTRODUCTION
Access control in computing is motivated by the need to divulge access to information and available computing resources and services to authorized entities only, through authentication, authorization, and access control. A secure transmission of data for access control system become very important in Information and Communication Technology. A third party can trap data or steal important data stored in a computer. To prevent this, it is advocated to encrypt the messages to provide Information Security (Oluwadamilola et al., 2017).
Biometric identification is an emerging technology which gains more attention in recent years. It employs physiological or behavioral characteristics to identify an individual (Richard et al., 2007, Omidiora et al., 2015). The combination of biometric data systems and biometrics recognition/identification technologies create the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, individuals will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data (Falohun et al., 2016).
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. The integration of biometric with cryptography, deals with either cryptographic key release or cryptographic key generation, and is promising in many aspects. Cryptography is the science of using mathematics to encrypt and decrypt data to keep messages secured by transforming intelligible data form (plaintext) into unintelligible form (ciphertext) (Marwa et al., 2016). Cryptography is also a branch of science that define the art of secret writing, and it is a technique in which secret data is changed by its character in such a way that any intruder cannot identify the message. As biometric is directly linked with the owner, it removes the problem of memorizing the cryptographic key and confirms the non-repudiation of users (Jain et al., 2014). The authentication systems which integrate biometric traits with cryptography are called crypto-biometric systems (Hao et al. 2006).
In this research, a combination of cryptography and bimodal biometric was developed, an Advanced Encryption Standard based Fast Fourier Transform (AES-FFT) was developed and used as the cryptography technique.
II. RELATED WORKS
Jagadeesan et al., (2010) proposed an efficient approach based on multimodal biometrics (iris and fingerprint) for generating a secure cryptographic key, where the security is further enhanced with the difficulty of factoring large numbers. At first, the features, minutiae points and texture properties are extracted from the iris and fingerprint images respectively. Then, the extracted features are fused at the feature level to obtain the multi-biometric template. Finally, a multi-biometric template is used for generating a 256-bit cryptographic key. For experimentation, the study used the fingerprint images obtained from publicly available sources and the fingerprint images from CASIA Iris Database. The experimental results showed that the generated 256-bit cryptographic key is capable of providing better user authentication and better security.
Wang et al., (2011) proposed a novel multimodal biometric system using face-iris fusion feature. Face feature and iris feature are first extracted respectively and fused in feature-level. However, existing feature level schemes such as sum rule and weighted sum rule are inefficient in complicated condition. In this paper, we adopt an efficient feature-level fusion scheme for iris and face in series. The algorithm normalizes the original features of iris and face using z-score model to eliminate the unbalance in the order of magnitude and the distribution between two different kinds of feature vectors, and then connect the normalized feature vectors in serial rule. The proposed algorithm is tested using CASIA iris database and two face databases (ORL database and Yale database). Experimental results show the effectiveness of the proposed algorithm.
Zuva et al., (2014) proposed using both fingerprint and face for authentication in access system. The study integrated fingerprint and face biometric to improve the performance in access control system. This paper considered restoration of distorted and misaligned fingerprints caused by environmental noise such as oil, wrinkles, dry skin, dirt, displacement etc. The noisy, distorted and/or misaligned fingerprint produced as a 2-D on x-y image, is enhanced and optimized using a hybrid Modified Gabor Filter-Hierarchal Structure Check (MGF-HSC) system model. In face biometric, Fast Principal Component Analysis (FPCA) algorithm was used in which different face conditions (face distortions) such as lighting, blurriness, pose, head orientation and other conditions are addressed. The algorithms used improved the quality of distorted and misaligned fingerprint image. They also improved the recognition accuracy of distorted face during authentication. The results obtained showed that the combination of both fingerprint and face improve the overall performance of biometric authentication system in access control.
Barman et al., (2015) proposed an approach to generate cryptographic key from cancelable fingerprint template of both communicating parties. Cancelable fingerprint templates of both sender and receiver are securely transmitted to each other using a key-based steganography. Both templates are combined with concatenation-based feature level fusion technique and generate a combined template. Elements of combined template are shuffled using shuffle key and hash of the shuffled template generates a unique session key.
In this approach, revocable key for symmetric cryptography is generated from irrevocable fingerprint and privacy of the fingerprints is protected by the cancel able transformation of fingerprint template. Our experimental results show that minimum, average, and maximum Hamming distances between genuine key and impostor’s key are 80, 128, and 168 bits, respectively, with 256-bit cryptographic key. This fingerprint-based cryptographic key can be applied in symmetric cryptography where session based unique key is required.
Abuguba et al., (2015) presented an efficient approach to secure cryptographic key generation from iris and face biometric traits. Features extracted from preprocessed face and iris images are fused at the feature level and the multimodal biometric template is constructed from the Gabor filter and Principal Component Analysis outputs. This template is used to generate strong 256-bit cryptographic key. Experiments were performed using iris and face images from CASIA and ORL databases and the efficiency of the proposed approach is confirmed.
Selvarani and Visu (2015) presented personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud computing to become the most dominant computing in the recent years. Even though the cloud provide secured service, it also undergoes with some security problem especially form hackers. The existing unimodal bio cryptography techniques often have limitations such as consciousness to noise, intra class consistency, data aspect and other factors. This research study presents personal identification using fingerprint, iris and cryptographic technologies. Combined biometric technology will secure the data from unauthorized users. The purpose of this study is to study the combination of fingerprint and iris and also to include the cryptographic methods to achieve the higher accuracy and more security. The result of this study can overcome some of the limitations of using single biometric technology. The combination of Finger print and Iris form the key for Blowfish algorithm to store the secured data from unauthorized users in cloud environment.
Oluwadamilola et al., (2017) presented combination of cryptography and biometrics; a bimodal biometric cryptosystem, using fingerprint and face as trait for authentication. Subjects’ information was encrypted using Advanced Encryption Standard (AES) and biometric templates were stored as Binary Large Object (BLOB) in MYSQL database secured with Message Digest 5 (MD 5) Hashing Algorithm. The system was developed and implemented to operate on one-try, two-try and three-try configurations at varying threshold values. The developed system’s performance was evaluated using False Reject Rate (FRR), False Accept Rate (FAR) and Receiver Operating Characteristic Curve (ROC graph) as performance metrics. On ROC graph, three-try configuration gave optimal performance at all threshold values.
Okokpujie et al., (2018) proposed bimodal biometrics (fingerprint and iris) as a means of ensuring the full integrity of the bank’s vault system, thus, further reducing the rate of compromise and theft within the bank’s vault system. A scanner captures the fingerprint and the iris of authorized users. The images of the fingerprint and iris captured by the scanner are segmented, normalized and made into templates that are stored in a database along with the particulars of the users. The accuracy of the system is measured in terms of sample acquisition error and recognition performance using False Accept Rate (FAR), False Identification Rate (FIR) and False Reject Rate (FRR). The result shows that the proposed system is very effective.
Komal (2019) studied a robust multimodal biometric crypto system, in which two modalities (FKP and face) are used for authentication of a person and one modality (fingerprint) is used for key generation. AES algorithm with fingerprint-based key is used for securing the biometric templates. At authentication time, decision level fusion with AND rule is used for making the final decision. The proposed multimodal biometric crypto system is more robust and secure as compare with other multimodal biometric systems.
Venna and Inampudi (2019) developed a multimodal biometric authentication system (MMBAS) using face, fingerprint and retina images and key generation is also done using these images. Images were pre-processed using adaptive median filtering and Otsu’s segmentation algorithm for background subtraction. Then minutiae feature of these images were extracted with the use of Local Binary Pattern (LBP) algorithm and then the feature vectors of face, fingerprint and retina are fused using XOR operation. Later the fused feature vector was used for cryptographic key generation. The evaluation was performed on network security for showing the reliability of the newly introduced approach in terms of Precision, Recall, Accuracy and false rejection rate.
In light of the above reviewed work, Seshadri and Trivedi (2011) described several types of cryptosystems available for biometry applications such as key release, key binding and key generation cryptosystems, most of the researchers majorly focused on key release cryptosystems but paid less attention to key binding cryptosystems, the computational cost of the encryption and decryption of images as well as the required memory space for the encrypted data. Also, it was discovered that some of these techniques were susceptible to attack and were characterized with visual distortions after authentication. Therefore, this work will adopt an enhanced AES technique which focuses on key binding for encryption and decryption for data security and confidentiality. The scheme that will be used in this study, is targeted at ensuring scalable encrypting capacity, good imperceptibility and security performance, and robustness against various attacks with optimal computational efficiency.
III. METHODOLOGY
The bimodal biometric-cryptography system comprised of quite a few modules to authenticate or verify subjects. The system was divided into two stages; enrolment and authentication as shown in Figure 3.1. In this approach, biometric features were extracted from individual’s face and iris after application of histogram equalization for face and iris, iris localization using Hough transform and iris normalization using Daugman’s rubber sheet model for each modality. Features were extracted using Principal Component Analysis (PCA) while cryptography key was generated using fused features from the face and iris by Advanced Encryption System based Fast Fourier Transform (AES-FFT). The features extracted were fused at feature level using weighted average and optimal features were selected using genetic programming (GP). Support Vector Machine (SVM) was used to classify the extracted features. To enhance the integrity of the system, templates and encrypted data were stored in a database.
Details of the modules are as follows:
A. Enrolment Stage
Enrolment stage comprised of collection of biometric information (face and iris). At this stage, fused features of face and iris were the means for subject to indicate personal identity for authentication. The dataset used contained 600 iris images and 600 face images, 360 of the iris images and 360 of the face images were used in training the model while 240 of the iris images and 240 of the face images were used to test the model used for authentication. The enrolment stage of the system was made up of the sensor module (enrolment module), pre-processing module, feature extraction module, fusion and feature selection module and encryption and decryption module. At this phase, a webcam device was used to acquire face and iris biometric data of users. Face and iris images of 600 subjects with 3 different samples were captured with a size of 640 by 480 pixels. The two biometric traits were downsized into 128 by 128 pixel without any alteration in the images. All images taken had equal uniform illumination conditions and light color background. The database was populated with 1200 images.
A. Conclusion This project evaluated the essential features of unimodal (irises and faces) and multi-modal (fused irises and faces) on the performance of multi-modal crypto-biometric system. Three hundred and sixty (360) irises were trained and two hundred and forty (240) irises were used to test the developed technique at different thresholds. The experimental results obtained revealed that the fused irises and faces under AES-FFT encryption technique with SVM classifier gave 98.33% in terms of recognition accuracies, 0.83% false acceptance rate, 97.50% false rejection rate, 99.17% specificity and 32.99s recognition time compare with irises and faces modality. In view of this, an automated bi-modal crypto-biometric system based on fused irises and faces (that is, both faces and irises), would produce a more reliable accurate and secure system on any repository system as a result of its high accuracy. In other words, the developed AES-FFT technique has ensured scalable encrypting capacity, good imperceptibility and security performance, and robustness against various attacks with optimal computational efficiency in terms of its accuracy and time. The techniques developed in this work proved through empirical evidence to be efficient with reduced complexity and robustness against common attacks. It will be applicable to encrypt confidential or personal data. It will eliminate the flaws, vulnerabilities to attack and threats of adulterating digital content. It can also be useful for security purposes in commercial activities which include physical access control, computer network login, door security system, electronic data security and medical records management. B. Recommendation With regards to the performance of the developed technique, SVM based iris system can be used to enhance security challenges in an automated machine such as ATM. It is recommended that: Some evolutionary search algorithm such as Ant Colony Optimization (ACO), Evolutionary Programming (EP), GLCM (GP), Differential Evolution (DE), Artificial Immune Systems (AIS), can be introduced as feature selection techniques in other to aid recognition process. Other Artificial Neural Network techniques could be compared with SVM in other to determine its computational efficiency on iris systems A computer system with higher configuration and capability should be employed in other to handle more datasets because test-running the system with large dataset took a longer time to process.
[1] Abuguba, S., Milosavljevi?, M. M., and Ma?ek, N., (2015). An Efficient Approach to Generating Cryptographic Keys from Face and Iris Biometrics Fused at the Feature Level, IJCSNS International Journal for Computer Science and Network Security, vol. 15, no. 6, 6–11. [2] Al-Shaaby, A. and Alkharobi, T., (2017). Cryptography and Steganography: New Approach. Society for Science and Education, Vol. 5, No. 6. ISSN: 2054-7420. [3] Amin, M. M, Salleh, S. I., Katmin, M. R. and Shamsuddin, M. Z. (2003). Information Hiding using Steganography. Proceedings on National Conference of Telecommunication Technology (pp. 234 – 238), Shah Alam, Malaysia, IEEE ISBN 0-7803-7773. [4] Anupriya A. and Sarita S. (2018). A literature review on various recent steganography techniques. International Journal on Future Revolution in Computer Science and Communication Engineering, 4(1), 143-149. [5] Babu, K. R., Kumar, S. U., and Babu, A. V. (2010). A Survey on cryptography and Steganography methods for information security. International Journal of Computer Applications, 12(3), 13-17. [6] Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-biometric system for network security. EURASIP Journal on Information Security, 2015(1), 3, pp. 2-17. [7] Benantar, M. (2010). Access Control Systems: Security, Identity Management and Trust Models. IBM Corp, Austin, TX, USA [8] Boehm, Benedikt (2014) StegExpose: A Tool for Detecting LSB Steganography (Master Thesis).School of Computing, University of Kent, England, 1 - 17. [9] Bonneau J., Herley P.C., Oorschot V., Stajano F., (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. University of Cambridge Computer Laboratory, Tech Report 817. www.cl.cam.ac.uk/techreports/UCAM-CL-TR-817.html [10] Bowers M., (2010). Physical Access Control. Bowers Engineering, Randallstown MD. [11] Chander K., Kaur, P and Chanda A. (2008). Biometric Security using Steganography. International Journal of Security, 2(1), 11 - 18. [12] Cheddad, A. Condell, K. Curran, K. and Mc Kevitt, P. (2010). Digital Image Steganography: Survey and Analyses of Current Methods. Signal Processing Journal, 90(3), 727 – 752. [13] Cheng, B., and Titterington D., (1994). Neural networks: a review from a statistical perspective. Statistical Science 9, no. 1, pp 2–54. [14] Colores, J., García-Vázquez, M., Ramirez, A., Perez-Meana, H., and Nakano-Miyatake, M. (2013). Video Images Fusion to Improve Iris Recognition Accuracy in Unconstrained Environments. 7914. 114-125. 10.1007/978-3-642-38989-4_12. [15] Davison, A. (2009). Java Programming Techniques for Games. Java Art. National Academy Press, Newyork, pp. 99. [16] Deepa, S., and Umarani, R. (2015). A Prototype for Secure Information using Video Steganography. International Journal of Advanced Research in Computer and Communication Engineering, 4(8): 442 – 444. [17] Deepesh, R. and Bhandari, V. (2013). A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image. International Journal of Computer Applications 64(20), 15 - 19. [18] Dhiren, R. Patel (2010), “Information Security: Theory and Practice”. PHI Learning Private Limited Publisher, New Delhi. 35-117. [19] Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373. [20] Eggers, E., Salter, J and Shieneir, W. (2002). A Communication Approach to Image Steganography, Security and Watermarking of Multimedia Contents IV. San Jose, California: Proceedings of SPIE , 22 - 30. [21] Falohun, A. S., Fenwa, O. D., & Oke, A. O. (2016). An access control system using bimodal biometrics. International Journal of Applied Information Systems, Foundation of Computer Science-FCS, New York, USA, 10(5), 41-47. [22] Finkenzeller, K., (2003). RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification, John Wiley and Sons Ltd. [23] Fridrich, J. and Goljan, M. (2012). Practical Steganalysis of Digital Images – State of the Art. http://www.ssie.binghamton.edu/fridrich. pp 1 -13. [24] Gale, A., and Salankar, S., (2015). Performance Analysis on Iris Feature Extraction using PCA, Haar Transform and Block Sum Algorithm. International Journal of Engineering and Advanced Technology (IJEAT). ISSN: 2249 – 8958, Volume -4 Issue -4. [25] George, J. P., (2012). Development of efficient biometric recognition algorithms based on fingerprint and face. A thesis submitted to the Christ University, pp. 1-9. [26] Gurney, K., (2004). An introduction to neural networks. University of Sheffield, UCL Press Limited 11 New Fetter Lane London EC4P 4EE. [27] Gupta, R., Yadav, P., and Kumar, S. (2017). Race identification from facial images using statistical techniques. Journal of Statistics and Management Systems, 20(4), 723-730. [28] Hao, F., Anderson, R., and Daugman, J. (2006). Combining crypto with biometrics effectively. IEEE transactions on computers, 55(9), 1081-1088. [29] Jagadeesan, A., Thillaikkarasi, T. and Duraiswamy, D. K., (2010). “Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature,” Int. J. Comput. Appl., vol. 2, no. 6, 16–26. [30] Jain, A. K, Ross, A., and Prabhakar, S.” (2004). “An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1): 4–20. [31] Jain, A. K., Hong, L., and Bolle, R. (1997). On-line fingerprint verification. IEEE Transactionson Pattern Analysis and Machine Intelligence, vol. 19(4): 302-314. [32] Jain, A. K., Nandakumar, K., and Nagar, A., (2013). Fingerprint Template Protection: In Security and privacy in biometrics. From Theory to Practice, London: Springer, 187–214. [33] S, Joshna. (2016). Symmetric Key Algorithms: A Comparative Analysis. International Journal of Innovative Research in Computer and Communication Engineering. 4. 15772-15775. [34] Kaur, J. and Kumar, S (2011).”Study and Analysis of Various Image Steganography Techniques” Proc. International Journal of Computer Science and Technology 2(3), pp. 55 – 64. [35] Kaur, R., and Sharma, N. (2015). A novel approach to enhance the Security in Vehicular Ad- Hoc Network through Node Authentication using Hash Value and Steganography Schema. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 2(2):23-29. [36] Kaur, R., and Singh, T. (2015). Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography. International Journal of Computer Applications, 117(18): 34-57. [37] Kaushal, A. and Chaudhary, V. (2013): Secured Image Steganography using Different Transform Domain. International Journal of Computer Applications. 7(2), pp. 24 -28. [38] Khalid I. R., Arora, K., and Pal, N. (2014). A crypto-steganography: A survey. International Journal of Advanced Computer Science and Application, 5, 149-154. [39] Komal, C. K., (2019). A Robust Multimodel Biometric Crypto System. International Journal of Recent Technology and Engineering (IJRTE), Volume-8 Issue-2S8, 1953-1961. [40] Maltoni, D., Maio, D., Jain, A. K., and Prabhakar, S. (2009). “Handbook of fingerprint recognition (2nd ed.). New York: Springer-Verlag. [41] Marwa, S. E., Aly, A. A., and Omara, F. A. (2016). Data security using cryptography and steganography techniques. IJACSA) International Journal of Advanced Computer Science and Applications, 7(6), 390-397. [42] McAteer, I., Ibrahim, A., Zheng, G., Yang, W., & Valli, C. (2019). Integration of biometrics and steganography: A comprehensive review. Technologies, 7(2), 34. [43] Murray Meg C., (2010). Database Security: What Students Need to Know. Journal of Information Technology Education: Innovations in Practice Volume 9. [44] Nitin Kanzariya, K., and Nimavat Ashish, V. (2013). Comparison of Various Images Steganography Techniques. International Journal of Computer Science and Management Research, 2(1), 1213-1217. [45] Nithya S., and George P., (2014). Survey on Asymmetric Key Cryptography Algorithms. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1. niyaa20@yahoo.co.in, georgeprakashraj@yahoo.com [46] Okokpujie, K. O., Odusami, M., Noma-Osaghae, E., Abayomi-Alli, O., & Oluwawemimo, E. (2018). A Bimodal Biometric Bank Vault Access Control System. International Journal of Mechanical Engineering and Technology (IJMET), 9(9), 596-607 [47] Oluwadamilola, K. O., Ayodeji, A. O., Martins, O. O., Olufunmi, I. S., & Rapheal, O. A. (2017). An improved authentication system using hybrid of biometrics and cryptography. In 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), 457-463. [48] Omidiora, E. O., Adegoke, B. O, Falohun, S. A. and Ojo, D. A.(2015). Iris Recognition Systems: Technical Overview. International Journal of Research in Engineering and Technology. 3(6): 63-72 [49] Omidiora E.O., Ojo O., Yekini N.A. and Tubi T.O (2012). Analysis, Design and Implementation of Human Fingerprint Patterns System “Towards Age & Gender Determination, Ridge Thickness to Valley Thickness Ratio (RTVTR) & Ridge Count on Gender Detection. International Journal of Advanced Research in Artificial Intelligence (IJARAI), Vol. 1, No. 2, pp: 57-63. [50] Oppliger, R. (2016). SSL and TLS: Theory and Practice. Artech House. [51] Prachi P. Sadawarte, P. A. and Tijare (2017). Video data hiding using Video Steganography, International Journal of Advanced Research in Computer and Communication Engineering. 6(2): 305 – 307. [52] Rahmani, K. I. Arora, K. and Pal, N. (2014). A Crypto-Steganography: A Survey. International Journal of Advanced Computer Science and Applications, (IJACSA) , 5(3), 149-155. [53] Richard, Y. F. N. and Yong, H. T. (2007). Kai Ming Mok,“An effective segmentation method for iris recognition system”, Int. [54] Ross A. (2009). Multibiometrics. In: Li S.Z., Jain A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_147 [55] Ross A., (2007). An introduction to Multibiometrics. Appeared in the Proc. Of the 15th European Signal Processing Conference (EUSIPCO), Poznan, Poland. arun.ross@mail.wvu.edu, http://www.csee.wvu.edu/˜ross [56] Sahu, P. and Sinha, S. (2017). Discrete wavelet packet transform based video steganography. International Journal of Mineral Processing and Extractive Metallurgy, 2(1), 7-12. [57] Salau A. and Jain S. (2019). Feature Extraction: A survey of the Types, Techniques, Applications. 10.1109/ICSC45622.2019.8938371, 158-164. [58] Samad A. and Hussain S. (2006). Introduction to Fusion Techniques. Rome Air development center, final technical report RACDCTR 81-161. [59] Selvarani, P., & Visu, P. (2015). Multi-model bio-cryptographic authentication in cloud storage sharing for higher security. Research Journal of Applied Sciences, Engineering and Technology, 11(1), 95-101.2 [60] Seshadri, R., & Trivedi, T. R. (2011). Efficient cryptographic key generation using biometrics. International Journal of Computer Technology and Applications, 2(1), 1-9. [61] Smith, L., (2002). A tutorial on Principal Components Analysis. Cornell Univ. USA, 51, 52. [62] Souvik, Roy and P. Venkateswaran (2014). Online payment system using steganography and visual cryptography. In 2014 IEEE Students\' Conference on Electrical, Electronics and Computer Science, 1-5. [63] Suthakar J., Monica E., Annapoorani D. and Richard S. (2014). Study of Image Fusion-Techniques, Method and Applications. International Journal of Computer Science and Mobile Computing ISSN 2320–088X Vol.3 Issue.11 pg.469 – 476. [64] Suri, S., Joshi, H., Mincoha, V. and Tyagi, A. (2014). Comparative Analysis of Steganography for Coloured Images. International Journal of Computer Sciences and Engineering, 2(4), 180 – 184. [65] Tharwat, A., (2016). Principal Component Analysis (PCA): An Overview. [66] Tharwat, A., (2016). Principal component analysis-a tutorial. International Journal of Applied Pattern Recognition. 3(3) 197-240. [67] Tutorialspoint (2015). Cryptography Just for Beginners. tutorialspoint Simply Easy Learning. www.tutorialspoint.com. [68] Venna, S. R., and Inampudi, R. B., (2019). MMBAS-NS: Multimodal Biometric Authentication System and Key Generation Algorithm for Network Security on Mobile Phones. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7 Issue-5S2, 189-199. [69] Verlag S., (1991). Handbook of fingerprint recognition. [70] Vipula M. W. and Suresh K. (2013). Stegocrypto - A Review of Steganography Techniques using Cryptography. International Journal of Computer Science and Engineering Technology, 4: 423-426. [71] Walia, E., Jain, P. and Navdeep, A. (2010). An Analysis of LSB and DCT based Steganography, Global Journal of Computer Science and Technology, 10(1), 4 - 8. [72] Wang, Z., Wang, E., Wang, S., & Ding, Q. (2011). Multimodal Biometric System Using Face- Iris Fusion Feature. JCP, 6(5), 931-938. [73] Zuva, T., Esan, O. A., & Ngwira, S. M. (2014). Hybridization of bimodal biometrics for access control authentication. International Journal of Future Computer and Communication, 3(6), 444.
Copyright © 2023 Rejuaro O. O. , Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., Adebajo O. O.. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET49548
Publish Date : 2023-03-14
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here