Covert Transfer of Biometric Data using
Steganography
Journal:
GRENZE International Journal of Computer Theory and Engineering
Authors:
Srinidhi G A, K B ShivaKumar
Volume:
3
Issue:
4
Grenze ID:
01.GIJCTE.3.4.80
Pages:
538-543
Abstract
"The secret between three people will remain secret provided, any two are dead”
is a proverb which was coined by Benjamin Franklin. Today, the secured transfer of
information is a very basic need. The rapid use of interconnected computing systems gives
way for many different types of eavesdropping and has become a profession for many
hackers. So there is a need for the data being trans received to be having a secured mode of
communication. Earlier, these authentication was required just for delegates of higher order
in the society as they were supposed to carry their transactions in a secured mode. But
today, the security of data is of need even by a common lay man. For example, the issue of
sim cards was taking place after the through verification of person’s identity details as a
hard copy. Whereas today, every transactions are digital in nature and it has reduced the
time taken to authenticate the person so as to activate the service which he/she has
requested for. But on the other end, the issue of security is of major concern. This paper
proposes a new technique using both cryptography and steganography methods which
makes the covert data much secured. The results obtained in the simulation phase are so
promising and are better than the ones existing in the current literature.