Covert Transfer of Biometric Data using Steganography

Journal: GRENZE International Journal of Computer Theory and Engineering
Authors: Srinidhi G A, K B ShivaKumar
Volume: 3 Issue: 4
Grenze ID: 01.GIJCTE.3.4.80 Pages: 538-543

Abstract

"The secret between three people will remain secret provided, any two are dead” is a proverb which was coined by Benjamin Franklin. Today, the secured transfer of information is a very basic need. The rapid use of interconnected computing systems gives way for many different types of eavesdropping and has become a profession for many hackers. So there is a need for the data being trans received to be having a secured mode of communication. Earlier, these authentication was required just for delegates of higher order in the society as they were supposed to carry their transactions in a secured mode. But today, the security of data is of need even by a common lay man. For example, the issue of sim cards was taking place after the through verification of person’s identity details as a hard copy. Whereas today, every transactions are digital in nature and it has reduced the time taken to authenticate the person so as to activate the service which he/she has requested for. But on the other end, the issue of security is of major concern. This paper proposes a new technique using both cryptography and steganography methods which makes the covert data much secured. The results obtained in the simulation phase are so promising and are better than the ones existing in the current literature.

Download Now << BACK

GIJCTE