Integration of Biometrics and Steganography: A Comprehensive Review

Author:

McAteer IanORCID,Ibrahim AhmedORCID,Zheng GuanglouORCID,Yang WenchengORCID,Valli CraigORCID

Abstract

The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards.

Publisher

MDPI AG

Reference100 articles.

1. Surveying the Development of Biometric User Authentication on Mobile Phones

2. Security and Privacy in Biometrics;Campisi,2013

3. Image security and biometrics: A review;Marqués,2012

4. What Is the Dark Web?https://www.experian.com/blogs/ask-experian/what-is-the-dark-web/

5. Here’S How Much Your Personal Information Is Selling for on The Dark Webhttps://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/

Cited by 20 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication;International Journal of Computational and Experimental Science and Engineering;2024-09-02

2. WITHDRAWN: Hybrid Architecture for Secure Data Communication Within the Private Cloud;2024-05-07

3. Exploiting multimodal biometrics for enhancing password security;Logic Journal of the IGPL;2024-03-16

4. A Wavelet Transformation Technique and Cryptographic Encryption for Image Steganography;Lecture Notes in Networks and Systems;2024

5. A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3