Javascript must be enabled to continue!
A Secure Fingerprint Hiding Technique Based on DNASequence
View through CrossRef
Abstract
DNA steganography is a technique that utilizes the DNA sequence as the basis for the secure transmission of critical data. This technique consists mainly of encrypting and hiding messages within the high capacity of DNA sequences in order to prevent adversaries from reading and decoding secret messages. However, the biometric system is a technological recognition system that processes information about an individual to distinguish them. Biometrics are used in many applications, including fingerprinting, iris scanning, and face recognition. This research will focus on the development of an effective and secure technique that combines steganography and cryptography. This method aims to protect the image of fingerprints in the communication channel while keeping the information confidential. The hiding process of the proposed system converts fingerprint images into a binary series, which is then added to the DNA sequence after applying the appropriate encryption method. The proposed technique utilizes the Feistel network in the encryption process and uses an insertion technique in the hiding process. It has a low cracking probability, high BPN numbers, and good execution times. During the hiding and decoding processes, the proposed system utilizes four different keys, which are chosen randomly, resulting in a high key space and ahigh key sensitivity. The proposed technique increases the noise by adding some random ambiguity bits at random positions in the fingerprint image. The experimental results show that the proposed system is resistant to several attacks, such as known-plaintext attacks and chosen-plaintext attacks. The proposed technique is limited to hiding only a small image inside the DNA and does not handle video, audio, or a large image size.
Title: A Secure Fingerprint Hiding Technique Based on DNASequence
Description:
Abstract
DNA steganography is a technique that utilizes the DNA sequence as the basis for the secure transmission of critical data.
This technique consists mainly of encrypting and hiding messages within the high capacity of DNA sequences in order to prevent adversaries from reading and decoding secret messages.
However, the biometric system is a technological recognition system that processes information about an individual to distinguish them.
Biometrics are used in many applications, including fingerprinting, iris scanning, and face recognition.
This research will focus on the development of an effective and secure technique that combines steganography and cryptography.
This method aims to protect the image of fingerprints in the communication channel while keeping the information confidential.
The hiding process of the proposed system converts fingerprint images into a binary series, which is then added to the DNA sequence after applying the appropriate encryption method.
The proposed technique utilizes the Feistel network in the encryption process and uses an insertion technique in the hiding process.
It has a low cracking probability, high BPN numbers, and good execution times.
During the hiding and decoding processes, the proposed system utilizes four different keys, which are chosen randomly, resulting in a high key space and ahigh key sensitivity.
The proposed technique increases the noise by adding some random ambiguity bits at random positions in the fingerprint image.
The experimental results show that the proposed system is resistant to several attacks, such as known-plaintext attacks and chosen-plaintext attacks.
The proposed technique is limited to hiding only a small image inside the DNA and does not handle video, audio, or a large image size.
Related Results
Student Attendance System Using Fingerprint and Raspberry Pi with Notification
Student Attendance System Using Fingerprint and Raspberry Pi with Notification
Fingerprint is an application designed to meet the needs of fast data using fingerprint verification. A fingerprint attendance machine is a type of biometric attendance machine tha...
Research and Application of Underground WLAN Adaptive Radio Fingerprint Database
Research and Application of Underground WLAN Adaptive Radio Fingerprint Database
Fingerprint positioning based on WiFi in coal mines has received much attention because of the widespread application of WiFi. Fingerprinting techniques have developed rapidly due ...
Decoding the Science of Fingerprints: The Influence of Sex and Blood Group on Dermatoglyphic Traits among Medical Students
Decoding the Science of Fingerprints: The Influence of Sex and Blood Group on Dermatoglyphic Traits among Medical Students
Background: Fingerprint or dermatoglyphics is the study of the patterns of dermal ridges and bridges on the volar surfaces of the fingers, palms, and soles. Fingerprint ridge patte...
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
The present study explains how different factors of knowledge hiding (e.g., evasive, playing dumb, and rationalized) influence on team creativity. Drawn on social exchange theory, ...
Why and When Do Employees Hide Their Knowledge?
Why and When Do Employees Hide Their Knowledge?
This study establishes a theoretical and integrative framework for analyzing the relationship between knowledge hiding and task performance. The existing literature indicates that ...
Competition and profit hiding: evidence from banks in China
Competition and profit hiding: evidence from banks in China
Purpose
– The purpose of this paper is to investigate the quality of financial reporting by banks in China, and the profit hiding behavior of banks in particular.
...
A novel pattern-based reversible data hiding technique for video steganography
A novel pattern-based reversible data hiding technique for video steganography
Abstract
This paper explains a novel pattern based color video data hiding technique based on moving regions detection. In the proposed system first the video gets separate...

