Git Product home page Git Product logo

avaneesh2001 / novel-access-control-id-system-using-visual-cryptography-and-lsb-watermarking Goto Github PK

View Code? Open in Web Editor NEW
5.0 1.0 0.0 10.78 MB

This project proposes a solution to enhance the security and encryption of fingerprints in authentication systems by combining visual cryptography and LSB watermarking techniques. The system encrypts each pixel of the original fingerprint image into two shares using visual cryptography, ensuring that neither share provides any clue about the origin

Home Page: https://sites.google.com/view/ravaneesh/home

License: GNU General Public License v3.0

biometric-authentication cryptography lsb-steganography visual-cryptography

novel-access-control-id-system-using-visual-cryptography-and-lsb-watermarking's Introduction

Visual Cryptography for Biometric Privacy

Table of Contents

  1. Abstract
  2. Motivation
  3. System Implementation
  4. System Design Description
  5. Cryptanalysis
  6. Conclusion
  7. Limitation of the System
  8. References

Abstract

Biometric data, such as fingerprints, is widely used for authentication systems due to its uniqueness and reliability. However, the security of this sensitive biometric information is a significant concern. In this project, we propose a solution using visual cryptography and LSB watermarking to enhance the security and encryption of fingerprints.

Fingerprint security is crucial as it is commonly employed for convenient and secure authentication, such as on smartphones or in businesses to protect confidential data. Storing fingerprints in a database poses security risks, as a compromise of the database could lead to unauthorized access and potential misuse of the fingerprint data. To address these concerns, encrypted versions of fingerprints are typically stored in the database.

In this project, we propose a visual cryptography scheme (VCS) for encrypting fingerprints. The VCS encrypts each pixel of the original fingerprint image into two subpixels called shares. The choice of shares is randomly determined, ensuring that neither share provides any clue about the original pixel. By separating the shares and storing them in different locations, it becomes challenging to reconstruct the actual fingerprint even if an attacker gains access to one of the shares.

To further enhance security and prevent attackers from detecting hidden information, LSB watermarking is employed. LSB watermarking involves embedding the shares generated by VCS into an innocent cover image. This technique ensures that the hidden information remains concealed, even if an attacker gains access to the database where the shares are stored.

The proposed system addresses the security concerns related to fingerprint authentication by combining visual cryptography and LSB watermarking techniques. By doing so, the system ensures the confidentiality and integrity of fingerprint data, making it challenging for attackers to reconstruct the original fingerprints even if they compromise the database.

Motivation

The motivation behind this study arises from the need for secure and efficient fingerprint authentication systems in confidential locations, such as restricted areas in companies. Storing fingerprints in a database for authentication purposes presents several challenges, including security concerns and computational power limitations.

The security concern arises from the potential compromise of the fingerprint database, which could lead to unauthorized access and misuse of sensitive information. Unlike passwords, fingerprints cannot be changed, making their security even more critical.

Computational power is another factor to consider, as the decryption process for fingerprints should be feasible on lightweight fingerprint scanners. These devices have limited computational capabilities, and implementing decryption schemes requiring significant resources would be impractical.

To address these challenges, this study aims to develop a system that ensures:

  1. Stored fingerprints cannot be effectively decoded, even if the database is compromised.
  2. The decryption process can be performed efficiently on lightweight fingerprint scanners without imposing significant computational burdens.

By utilizing visual cryptography and LSB watermarking techniques, this study aims to provide a secure and efficient solution for fingerprint authentication in confidential locations. These techniques enhance the security of stored fingerprints and enable a practical implementation on lightweight fingerprint scanning devices.

The outcomes of this study will contribute to the development of robust biometric privacy mechanisms, ensuring that access to confidential areas is restricted to authorized personnel while maintaining the integrity and security of fingerprint data.

System Implementation

The proposed system for visual cryptography and fingerprint authentication involves the following steps:

  1. Fingerprint Enrollment: Authorized personnel have their fingerprints scanned and stored in the company's database. The fingerprints are encrypted using a secure encryption algorithm to protect them from unauthorized access.

  2. Fingerprint Scanner: At the entrance of the confidential location, a fingerprint scanner is used for authentication. When an employee wants to gain access, they provide their fingerprint for scanning.

  3. Decryption and Watermark Extraction: Upon scanning the fingerprint, the fingerprint scanner retrieves the corresponding fingerprint share from the company's database. The share is determined based on the employee's ID reduced mod 3, indicating the layer of LSB watermarking performed on the image.

  4. Extraction Algorithm: The extraction algorithm is used to extract the second share from the layer of the image obtained in the previous step. Both shares are now available for decryption.

  5. Decryption Process: The shares are decrypted using simple XOR operations, combining the shares to obtain the original fingerprint image. This process ensures that the actual fingerprint cannot be decoded even if the data stored in the database is compromised.

  6. Validation: To authenticate the employee, the decrypted image matrix is XORed with the scanned fingerprint matrix. The resulting matrix indicates the amount of pixel/bit mismatches. If the mismatch is below a predetermined threshold (e.g., 10%), it is considered a match, and the user is authenticated to access the confidential location.

By incorporating visual cryptography, LSB watermarking, and XOR operations, this system provides a robust approach to fingerprint authentication that enhances security and minimizes computational power requirements. The combination of encryption, decryption, and validation techniques ensures that even if the database is compromised, the original fingerprint cannot be decoded. Additionally, the use of lightweight fingerprint scanners becomes feasible due to the efficient decryption process and threshold-based validation.

System Design Description

The proposed system can be divided into two main stages: Enrollment and Authentication. Here is a breakdown of the system's design and functionality in each stage:

Enrollment Stage:

  1. Fingerprint Encryption:

    • Fingerprints are obtained from employees and converted into binary data.
    • The binary data is encrypted using Visual Cryptography Scheme (VCS).
    • VCS generates two shares from the encrypted binary data.
    • One share is stored in the company database, while the other share is embedded into an employee's photograph using LSB watermarking.
  2. LSB Watermarking:

    • Two types of LSB watermarking techniques are employed: normal LSB and flipped LSB.
    • In the combined method, a row of the secret image (share) may or may not be flipped with a probability of 0.5.
    • The employee ID serves as the seed for a random number generator, which determines whether the rows of the secret image are flipped.
    • The photograph used is an RGB image, and the selection of which layer to perform LSB watermarking depends on the employee ID reduced modulo 3 (0 for Red, 1 for Green, 2 for Blue).
  3. Employee Information Storage:

    • The employee's photograph, along with other information such as name, employee ID, department, etc., is stored on the employee's company-issued smartphone.
    • The smartphone functions as a key card, which can be scanned on an RFID/NFC scanner.
    • Upon scanning, the smartphone transmits the stored employee data to the scanner. Fingerprint Enrollment

Authentication Stage:

  1. Smartphone Authentication:

    • The employee's smartphone is scanned on an RFID/NFC scanner.
    • The scanner retrieves the employee data stored on the smartphone, including the employee ID.
  2. Fingerprint Retrieval:

    • The scanner pulls the fingerprint share corresponding to the employee ID stored in the company database.
    • The modulo 3 reduction of the employee ID determines the layer from which the image LSB watermarking was performed.
    • The specified layer is extracted from the image, and an extraction algorithm is used to extract the second share embedded within the picture.
  3. Decryption and Validation:

    • Both shares (retrieved and extracted) are decrypted using XOR operations.
    • The decrypted result is compared to the actual fingerprint inputted by the employee.
    • Authentication is validated by measuring the number of pixel/bit mismatches between the decrypted image matrix and the scanned fingerprint matrix.
    • If the mismatch is below a certain threshold (e.g., 10%), the fingerprints are considered a match, and the user is authenticated. Fingerprint Authentication The system design described above consists of two main stages: Enrollment and Authentication. During the Enrollment stage, fingerprint encryption and LSB watermarking techniques are applied to store the employee's encrypted fingerprint share in the company database and embed the other share into the employee's photograph. In the Authentication stage, the employee's smartphone is used for initial authentication, followed by the retrieval of the corresponding fingerprint share. Decryption and validation processes are then performed to authenticate the employee by comparing the decrypted fingerprint share with the actual fingerprint inputted during the authentication process.

This system design ensures secure and reliable employee authentication while incorporating biometric data encryption, image watermarking, and smartphone-based access control.

Results

Encryption Decryption

Cryptanalysis

LSB Watermarking

LSB watermarking provides steganographic security by concealing the encrypted information (VCS share 2) within an innocent cover image (face image). However, it does not offer cryptographic security. For an attacker, the challenge lies in determining which layer of the cover image has been used for LSB watermarking. They would need to attempt extracting the share from all three layers and then decrypt them. It is impossible to discern the actual share from the extracted matrices of zeros and ones, as the share itself appears as random noise. In our implementation, we have utilized the least significant bit (LSB) for watermarking, as it simplifies the extraction process and yields high fidelity with a low peak signal-to-noise ratio (PSNR).

VCS

Visual Cryptography Scheme (VCS) provides information-theoretic security by employing a visual form of secret sharing. Possessing less than two shares is equivalent to having no shares at all, as the information about one share cannot be derived from the other. Hence, an attacker is left with the daunting task of guessing all possible combinations to obtain the missing share. In our case, the attacker would need to correctly guess one share out of the $2^{300x600}$ possible shares.

Considering that each pixel in the share can be either black or white, there are two possible values for each pixel. Therefore, the attacker needs to guess correctly for all $300 x 600$ pixels, accounting for the expansion in dimensions caused by share generation (twice the original width). When the attacker intercepts the face image during transmission, they must first identify which of the three layers contains the share and then accurately guess the other share.

Furthermore, the attacker would need to determine if a row has been flipped or not. With two possible choices for each row and a total of 600 rows, we have a staggering $3 \times 2^{600} \times 2^{300 \times 600}$ potential options available to the attacker. They must successfully obtain the first share from the cover image, deduce which rows have been flipped, and subsequently determine the other share.

Probabilistic Nature

This extensive number of possibilities demonstrates the strength of VCS in protecting the confidentiality of the shares and making it computationally infeasible for an attacker to retrieve the original fingerprint from the intercepted image.

Conclusion

Visual cryptography and LSB watermarking techniques offer a promising solution for enhancing the security and encryption of fingerprints in biometric authentication systems. By combining these techniques, the proposed system provides robust protection for stored fingerprint data and minimizes the risks associated with database compromises.

The system addresses the challenges of secure fingerprint authentication in confidential locations by leveraging visual cryptography for encryption and LSB watermarking for hiding the encrypted information within innocent cover images. This ensures that unauthorized access to fingerprint data is significantly challenging, even if attackers manage to gain access to the database.

The proposed system also considers the computational limitations of lightweight fingerprint scanners by using efficient decryption algorithms and threshold-based validation techniques. This ensures that the fingerprint authentication process remains practical and feasible on such devices.

Overall, this study contributes to the development of biometric privacy mechanisms, safeguarding sensitive information and ensuring secure access to confidential areas. Future research can explore further improvements and optimizations in visual cryptography and watermarking techniques to enhance the overall security and efficiency of fingerprint authentication systems.

Limitation of the System

One limitation of the proposed system is that it takes more time compared to a simple VCS-LSB watermarking system. While the additional security measures implemented in the system provide enhanced protection, they also introduce additional computational steps and image processing operations, leading to increased processing time.

The combination of fingerprint encryption, LSB watermarking with flipping, and the involvement of multiple color layers in the image processing contribute to the time-consuming nature of the system. The flipping of rows in the secret image, based on a random number generator and the employee ID, adds complexity to the process, further extending the processing time.

Moreover, the decryption and validation steps involved in the authentication stage, including the comparison of pixel/bit mismatches, can also increase the overall authentication time. Time Taken

As a result, the system's performance in terms of speed and real-time processing may be affected, particularly in scenarios where a large number of employees need to be enrolled and authenticated simultaneously.

It's important to strike a balance between security and efficiency when designing such systems, considering the specific requirements and constraints of the intended application.

References

[1] M. Naor and A. Shamir, "Visual cryptography," in Workshop on the Theory and Application of Cryptographic Techniques, pp. 1–12, Springer, 1994.

[2] Y. Liang, H. V. Poor, S. Shamai, et al., "Information theoretic security," Foundations and Trends® in Communications and Information Theory, vol. 5, no. 4–5, pp. 355–580, 2009.

[3] A. Ross and A. Othman, "Visual cryptography for biometric privacy," IEEE transactions on information forensics and security, vol. 6, no. 1, pp. 70–81, 2010.

[4] M. Suganya and K. Krishnakumari, "A novel retina based biometric privacy using visual cryptography," International Journal of Computer Science and Network Security (IJCSNS), vol. 16, no. 9, p. 76, 2016.

[5] A. Mohanarathinam, S. Kamalraj, G. Prasanna Venkatesan, R. V. Ravi, and C. Manikandababu, "Digital watermarking techniques for image security: a review," Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 8, pp. 3221–3229, 2020.

[6] M. G. Almutiri and M. T. B. Othman, "Digital image watermarking based on LSB techniques: A comparative study," International Journal of Computer Applications, vol. 975, p. 8887.

[7] K. Anusree and G. Binu, "Biometric privacy using visual cryptography, halftoning and watermarking for multiple secrets," in 2014 IEEE National Conference on Communication, Signal Processing and Networking (NCCSN), pp. 1–5, IEEE, 2014.

novel-access-control-id-system-using-visual-cryptography-and-lsb-watermarking's People

Contributors

avaneesh2001 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.