SlideShare a Scribd company logo
International Journal of Technical Innovation in Morden
Engineering & Science (IJTIMES)
Impact Factor: 3.45 (SJIF-2015), e-ISSN: 2455-2584
Volume 2, Issue 4, April-2016
IJTIMES-2015@All rights reserved 6
EFFICIENT AND SECURE AUTHENTICATION ON REMOTE SERVER USING STEGNO-VIDEO OBJECT
M.Raghavi 1
, Mr.M.Rajsekaran2
1
Final year, M.Tech/CSE , 2
Professor, SRM University.
Abstract:-Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust
Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be
particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper
proposed the concept of Embedding and Extracting the Encrypted Biometric signal into the user face image using
Watermarking Technique. To provide a secure encryption using a Blowfish Algorithm and for Embedding process using a
Least Significant Bit Technique.To shrink down a file size using a Huffman data compression for less memory
consumption. To Use this application three main steps has to done. User need to register their profile information
including biometric signal and their user image. Embedding encrypted biometric into user face image. Server need to
match the user face image with every face on the database. If server identified the matched face,then it allow the user to
use that application.
Keywords: Authentication, biometric, fingerprints, blowfish, watermarking.
1. INTRODUCTION
Biometric implies estimations related to human qualities. Biometrics affirmation (or sensible acceptance) is used as
a piece of programming designing as a kind of unmistakable evidence and get the opportunity to control. It is moreover used
to recognize individuals in social affairs that are under perception.
Biometric identifiers are the specific, quantifiable credits used to name and depict individuals. Biometric identifiers
are consistently sorted as physiological versus behavioral qualities. Physiological qualities are related to the condition of the
body. Cases fuse, however are not compelled to novel finger impression, palm veins, face affirmation, DNA, palm print,
hand geometry, iris affirmation, retina and smell/fragrance. Behavioral characteristics are related to the sample of behavior of
a man, including however not compelled to composing inclination, walk, and voice. A couple of researchers have generated
the term behaviometrics to depict the last class of biometrics.
More routine technique for access control join token-based unmistakable evidence systems, for instance, a driver's
license or global ID, and learning based ID structures, for instance, a watchword or individual recognizing verification
number. Since biometric identifiers are unprecedented to individuals, they are more strong in checking character than token
and learning based procedures; regardless, the collection of biometric identifiers raises assurance stresses over a conclusive
usage of this information.
A watermark is a distinguishing picture or example in paper that shows up as different shades of gentility/obscurity
when seen by transmitted light (or when seen by reflected light, on a dim foundation), brought on by thickness or thickness
varieties in the paper. Watermarks have been utilized on postage stamps, cash, and other government archives to dishearten
forging. There are two principle methods for delivering watermarks in paper; the dandy move process, and the more mind
boggling barrel mold process. Watermarks fluctuate enormously in their perceivability; while some are evident on easygoing
review, others require some study to select. Different guides have been produced, for example, watermark liquid that wets the
paper without harming it.
A watermark is extremely valuable in the examination of paper since it can be utilized for dating, recognizing sizes,
plant trademarks and areas, and deciding the nature of a sheet of paper. Encoding a distinguishing code into digitized music,
video, picture, or other record is known as an advanced watermark.
Verification is the demonstration of affirming reality of a trait of a datum or element. This may include affirming the
personality of a man or programming program, following the roots of an antiquity, or guaranteeing that an item is the thing
that it’s bundling also, naming cases to be. The two primary bearings in the verification field are sure and negative
confirmation. Positive verification is settled and it is connected by the greater part of existing validation frameworks.
Negative confirmation has been designed to diminish digital assaults. The contrast between the two is clarified by the
International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES)
Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015)
IJTIMES-2015@All rights reserved 7
accompanying illustration: Let us expect watchword based validation. In positive confirmation, the passwords of all clients
that are approved to get to a framework are put away, as a rule in a record. Accordingly the passwords space incorporates just
client’s passwords and it is typically constrained. On the off chance that wafers get the passwords record, then their work is
to recuperate the plaintext of an extremely predetermined number ofpasswords. In actuality, in negative validation the
counter secret key space is made, (hypothetically) containing all strings that are not in the passwords document. On the off
chance that saltines get the huge hostile to secret key document, their work will be much harder. Along these lines, negative
confirmation can be presented as another layer of assurance to upgrade existing efforts to establish safety inside systems.
This permits the present foundation to remain in place without getting to the put away passwords or making extra
vulnerabilities. By applying a genuine esteemed negative determination calculation, an alternate layer is included for
confirmation, keeping unapproved clients from picking up system access.
2. REVIEW OF LITERATURE
Anil K. Jain, Arun Ross and SalilPrabhakar proposed considered Biometric Recognition [1]. In this paper, they give
a brief blueprint of the field of biometrics and consolidate some of its purposes of interest, weights, qualities, constrainments,
and related security concerns. A wide variety of structures requires trustworthy individual affirmation arrangements to either
assert or choose the identity of an individual requesting their organizations. The inspiration driving such plans is to ensure
that the rendered organizations are gotten to simply by a true blue customer and no one else. Delineations of such
applications fuse secure access to structures, PC systems, convenient workstations, cellular telephones, and ATMs. Without
vivacious individual affirmation plots, these structures are powerless against the wiles of an impostor. A biometric structure
is a sample affirmation system that works by getting biometric data from an individual, expelling a rundown of abilities from
the picked up data, and differentiating this rundown of capacities against the design set in the database. Dependent upon the
application setting, a biometric structure may work either in affirmation mode or conspicuous confirmation mode. In the
affirmation mode, the system acknowledges a man's identity by differentiating the got biometric data and her own specific
biometric template(s) set away in the structure database. In the recognizing confirmation mode, the system sees a man by
means of looking for the configurations of the significant number of customers in the database for a match. Therefore, the
structure drives a one-to-various relationship with develop an individual's identity Robust biometrics-based affirmation
arrangement for multi-server environment.
Debiao He and Ding Wang given data about verification plan for multi-server environment [2]. In this paper, they
proposed a strong biometrics-based verification plan for multiserver environment utilizing circular bend cryptography. The
verification plan is a critical cryptographic instrument, through which two correspondence gatherings could verify each other
in the open system environment. Security investigation demonstrates that the proposed plan could fulfill security prerequisite
of multiserver environment. Execution examination demonstrates that the proposed plan could overcome shortcomings in
past plans at the expense of expanding computational expense and communicational cost somewhat. Along these lines, the
proposed plan is suitable for use in appropriated multi server system situations.
The effect of watermarking on the acknowledgment execution of biometric frameworks has been explored most
altogether with regards to iris acknowledgment. While Dong et al. [3] don't report on execution corruptions when researching
a solitary watermark inserting calculation and one iris acknowledgment system just, Hammerle et al. [4] find incompletely
significant diminishments in acknowledgment precision (particularly if there should be an occurrence of high limit) while
surveying two iris acknowledgment plans and a few strong watermarking calculations. Like the last results, acknowledgment
sway has been seen too for discourse acknowledgment [5] and fingerprint acknowledgment [6].
3. PROPOSED SYSTEM MODEL
User need to give the username, password including user face image and biometric signal as input. User capture their
face image using web camera. To securing the data biometric signal can be encrypted by using Blowfish algorithm. This
encrypted biometric signal can be embedded into the user face image by using LSB technique. To shrink down the data, it
need to be compressed using Huffman algorithm. If the server matches the username then it will extract the encrypted
biometric signal and do the decryption to get the original biometric signal. If both the images same then the server will allow
the user to use the application.
CAPTURING VIDEO OBJECT
In this phase server will storing all users face in their own database. Before capturing human face, every user has to
registering their profile information into the serverregistration process completed, server capturing the face. On capturing,
video mode automatically capture image object from that video. Captured user face automatically storing into the
server.Affirmation computations can be disconnected into two essential philosophies, geometric, which looks at perceiving
International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES)
Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015)
IJTIMES-2015@All rights reserved 8
highlights, or photometric, which is a quantifiable philosophy that distils a photo into qualities and differences the qualities
and designs to take out changes.
We introduce a novel calculation for semantic video object (SVO) extraction, in light of another multivalued
morphological spatial division that incorporates shading and edge data, and item following by in reverse locale grouping. Our
proposed spatial division fuses another marker extraction strategy in light of power edge data that enhances the meaning of
the genuine fringes of the scene objects, and another separation paradigm in view of shading and edge data to control the
watershed calculation.
Figure 3.1 Proposed System Model
UPLOADING BIOMETRICS AND HIDING INTO VIDEO OBJECT
Once human face capturing process is completed, server will capture the user appropriate biometrics. Here biometrics
are not directly storing into the server. Every biometrics has to be encrypted and watermarked into the user face. For
encryption here blowfish algorithm is used. After encryption process, server will embed encrypted biometrics into the human
face. For embedding (watermarking) going to apply Least Significant Bit(LSB) techniques.These techniques will read every
rows and columns of the biometrics and embedding into the appropriate rows and columns of the human face. So every
watermarked image is maintained in the server.Watermarks shift extraordinarily in their perceivability; while some are clear
on easygoing review, others require some study to choose. Different guides have been created, for example, watermark liquid
that wets the paper without harming it.
A programmed video-object situated steganographic framework is proposed for biometrics validation over mistake inclined
systems. At first, the host video article is naturally extricated through investigation of videoconference groupings. Next, the
biometric design relating to the sectioned video item is scrambled by a clamorous figure module. Subsequently, the
scrambled biometric sign is embedded to the most huge wavelet coefficients of the video object, utilizing its Least Significant
Bit (LSB). LSB give both intangibility and critical resistance against lossy transmission and pressure, conditions that are
regular in blunder inclined systems. At long last, the opposite discrete wavelet change (IDWT) is connected to give the stego-
object. Exploratory results under different misfortunes and JPEG pressure proportions demonstrate the security, power, and
productivity of the proposed biometrics concealing framework.
REMOTE SEVER AUTHENTICATION
International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES)
Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015)
IJTIMES-2015@All rights reserved 9
In the module, remote server authentication is going to be performed. If user wants to access the application means he/she has
to give his face and biometrics to the server. Server will match face with every face on the database. If server identified the
matched face means, server will extract the fingerprint from that image. After extracting, server checks the face and
biometrics into the matched face and biometrics. If both are matches only server will authenticate the user.
4. EXPERIMENTAL RESULTS
This section shows the experimental results of our proposed work.
The following screenshots shows the Image comparison during Login process:
The following screenshot shows the Thumb impression Extraction during login:
International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES)
Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015)
IJTIMES-2015@All rights reserved 10
The following screenshots explain the Ration products buying form:
The following screenshot shows the Payment process:
5. CONCLUSION
Biometric signals can scramble data with biometric test and transmission is done through video or some other media.
This data is covered up as steganography picture. Biometric signals enter increasingly into our ordinary lives, since
governments, and additionally different associations, resort to their utilization in fulfilling vital techniques (e.g. native
validation). Therefore there is a pressing need to promote create and incorporate biometric validation systems into down to
earth applications. Case in point, the lost biometric information can be covered from the verification module, with the goal
that it endeavors to perform confirmation despite the fact that parts are missing (parts that don't contain any urgent data, e.g.
terminations/bifurcations in the event of fingerprints).
REFERENCES
[1] Jain A.K, Ross A, Prabhakar S, (2004), “An introduction to biometric recognition,” IEEE Transactions on Circuits
Systems for Video Technology,vol. 14(1), pp. 4–20, 2004.
[2] He D, Wang D, (2014), “Robust biometrics-based authentication scheme for multi-server environment,” IEEE Systems
Journal, pp. 1–8, 2014.
[3] Jing Dong, Tieniu Tan.(2008),“Effects of watermarking on iris recognition performance”.Proceedings of the 10th
International Conference on Control, Automation, Robotics and Vision, pp. 1156–1161, 2008.
International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES)
Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015)
IJTIMES-2015@All rights reserved 11
[4] J. Hammerle-Uhl, K. Raab, A. Uhl.(2010),“Experimental study on the impact of robust watermarking on iris recognition
accuracy”, Proceedings of the 25th ACM Symposium on Applied Computing, pp 1479–1484, 2010.
[5] A. Lang, J. Dittmann. (2007),“Digital watermarking of biometric speech references: impact to the peer system
performance”. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia
Contents IX, number 6505 in Proceedings of SPIE, page 650513ff, 2007.
[6] M. I. Rajibul, M.S Shohel, S. Andrews. (2008), “Biometric template protection using watermarking with hidden
password encryption”.Proceedings of the International Symposium on Information Technology 2008, pp 296 – 303,
2008.
[7] W. Stallings, (2010), “Cryptography and Network Security: Principles and Practices”. Prentice-Hall, 5th edition, Upper
Saddle River, NJ, USA, 2010.
[8] I.-E. Liao, C.-C.Lee, M.-S.Hwang, (2006), “A password authentication scheme over insecure networks,” Journal of
Computer and System Sciences, vol. 72, pp. 727–740, 2006.
[9] M. Jakobsson, M. Dhiman, (2013), “The benefits of understanding passwords,” in Mobile Authentication, ser. Springer
Briefs in Computer Science. Springer New York, 2013, pp. 5–24.
[10] M. Weir, S. Aggarwal, M. Collins, D. H. Stern, (2010), “Testing metrics for password creation policies by attacking
large sets of revealed passwords,” in Proceedings of the 17th ACM Conference on Computer and Communications
Security. ACM, 2010, pp. 162–175.
[11] Y.Y. Wang, J.Y. Liu, F.-x. Xiao, J. Dan, (2009), “A more efficient and secure dynamic id-based remote user
authentication scheme,” Computer Communications, vol. 32, no. 4, pp. 583–585, Mar. 2009.
[12] M. K. Khan, S.-K. Kim, K. Alghathbar, (2011), “Cryptanalysis and security enhancement of a more efficient & secure
dynamic id-based remote user authentication scheme,” Computer Communications, vol. 34, no. 3, pp. 305–309, Mar.
2011.
[13] R. Madhusudhan and R. C. Mittal, “Dynamic id-based remote user password authentication schemes using smart
cards: A review,” Intelligent Algorithms for Data-Centric Sensor Networks, vol. 35, no. 4, pp. 1235– 1248, Jul. 2012.

More Related Content

PDF
IRJET- A Study on Image Authentication Methods
PDF
Enhancing Security of Multimodal Biometric Authentication System by Implement...
PDF
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
PDF
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
PDF
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
PDF
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
PDF
Volume 1 number-2pp-216-222
PDF
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
IRJET- A Study on Image Authentication Methods
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non-...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
Volume 1 number-2pp-216-222
A Hybrid Digital Watermarking Approach Using Wavelets and LSB

What's hot (19)

PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Profile Identification through Face Recognition
PDF
50120130406038
PDF
Behavioural biometrics and cognitive security authentication comparison study
PDF
Security for Identity Based Identification using Water Marking and Visual Cry...
PDF
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
PDF
Woral Seminar port
DOCX
Engineering Project of Venkata Krishna
PDF
A Survey: Data Leakage Detection Techniques
PDF
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
PDF
Ah04605234238
PDF
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
PDF
Contextual Authentication: A Multi-factor Approach
DOC
3 d password
PDF
Performance Comparison of Digital Image Watermarking Techniques: A Survey
PDF
IRJET- Autobiographical Fallback Authentication using Smartphones
PDF
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
PDF
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
PDF
Optimization of human finger knuckle print as a neoteric biometric identifier
Stamp enabling privacy preserving location proofs for mobile users
Profile Identification through Face Recognition
50120130406038
Behavioural biometrics and cognitive security authentication comparison study
Security for Identity Based Identification using Water Marking and Visual Cry...
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
Woral Seminar port
Engineering Project of Venkata Krishna
A Survey: Data Leakage Detection Techniques
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Ah04605234238
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Contextual Authentication: A Multi-factor Approach
3 d password
Performance Comparison of Digital Image Watermarking Techniques: A Survey
IRJET- Autobiographical Fallback Authentication using Smartphones
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
Optimization of human finger knuckle print as a neoteric biometric identifier
Ad

Similar to Efficient and secure authentication on remote server using stegno video object-71286-ragavi (20)

PDF
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
DOC
Biometrics for e-voting
PDF
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
PPTX
Biometric security using cryptography
PPT
PDF
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
PDF
Biometric Authentication Based on Hash Iris Features
PDF
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
PDF
Biometrics system penetration in mobile devices
PDF
BIOMETRIC REMOTE AUTHENTICATION
PDF
An Overview of Biometric Template Security Techniques
DOC
13 biometrics - fool proof security
ODP
India's UID Project: Biometrics Vulnerabilities & Exploits
PPT
Bio Metrics
PDF
A novel multi-biometric technique for verification of secure e-document
PDF
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
PDF
Problems with biometric authentication
DOCX
Biometrics
PDF
Biometrics & Finger print Technology
PDF
Final Report Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
Biometrics for e-voting
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Biometric security using cryptography
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
Biometric Authentication Based on Hash Iris Features
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
Biometrics system penetration in mobile devices
BIOMETRIC REMOTE AUTHENTICATION
An Overview of Biometric Template Security Techniques
13 biometrics - fool proof security
India's UID Project: Biometrics Vulnerabilities & Exploits
Bio Metrics
A novel multi-biometric technique for verification of secure e-document
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
Problems with biometric authentication
Biometrics
Biometrics & Finger print Technology
Final Report Biometrics
Ad

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Project quality management in manufacturing
PDF
Well-logging-methods_new................
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
additive manufacturing of ss316l using mig welding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Project quality management in manufacturing
Well-logging-methods_new................
Safety Seminar civil to be ensured for safe working.
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
OOP with Java - Java Introduction (Basics)
CYBER-CRIMES AND SECURITY A guide to understanding
573137875-Attendance-Management-System-original
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Automation-in-Manufacturing-Chapter-Introduction.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Geodesy 1.pptx...............................................
additive manufacturing of ss316l using mig welding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...

Efficient and secure authentication on remote server using stegno video object-71286-ragavi

  • 1. International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES) Impact Factor: 3.45 (SJIF-2015), e-ISSN: 2455-2584 Volume 2, Issue 4, April-2016 IJTIMES-2015@All rights reserved 6 EFFICIENT AND SECURE AUTHENTICATION ON REMOTE SERVER USING STEGNO-VIDEO OBJECT M.Raghavi 1 , Mr.M.Rajsekaran2 1 Final year, M.Tech/CSE , 2 Professor, SRM University. Abstract:-Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper proposed the concept of Embedding and Extracting the Encrypted Biometric signal into the user face image using Watermarking Technique. To provide a secure encryption using a Blowfish Algorithm and for Embedding process using a Least Significant Bit Technique.To shrink down a file size using a Huffman data compression for less memory consumption. To Use this application three main steps has to done. User need to register their profile information including biometric signal and their user image. Embedding encrypted biometric into user face image. Server need to match the user face image with every face on the database. If server identified the matched face,then it allow the user to use that application. Keywords: Authentication, biometric, fingerprints, blowfish, watermarking. 1. INTRODUCTION Biometric implies estimations related to human qualities. Biometrics affirmation (or sensible acceptance) is used as a piece of programming designing as a kind of unmistakable evidence and get the opportunity to control. It is moreover used to recognize individuals in social affairs that are under perception. Biometric identifiers are the specific, quantifiable credits used to name and depict individuals. Biometric identifiers are consistently sorted as physiological versus behavioral qualities. Physiological qualities are related to the condition of the body. Cases fuse, however are not compelled to novel finger impression, palm veins, face affirmation, DNA, palm print, hand geometry, iris affirmation, retina and smell/fragrance. Behavioral characteristics are related to the sample of behavior of a man, including however not compelled to composing inclination, walk, and voice. A couple of researchers have generated the term behaviometrics to depict the last class of biometrics. More routine technique for access control join token-based unmistakable evidence systems, for instance, a driver's license or global ID, and learning based ID structures, for instance, a watchword or individual recognizing verification number. Since biometric identifiers are unprecedented to individuals, they are more strong in checking character than token and learning based procedures; regardless, the collection of biometric identifiers raises assurance stresses over a conclusive usage of this information. A watermark is a distinguishing picture or example in paper that shows up as different shades of gentility/obscurity when seen by transmitted light (or when seen by reflected light, on a dim foundation), brought on by thickness or thickness varieties in the paper. Watermarks have been utilized on postage stamps, cash, and other government archives to dishearten forging. There are two principle methods for delivering watermarks in paper; the dandy move process, and the more mind boggling barrel mold process. Watermarks fluctuate enormously in their perceivability; while some are evident on easygoing review, others require some study to select. Different guides have been produced, for example, watermark liquid that wets the paper without harming it. A watermark is extremely valuable in the examination of paper since it can be utilized for dating, recognizing sizes, plant trademarks and areas, and deciding the nature of a sheet of paper. Encoding a distinguishing code into digitized music, video, picture, or other record is known as an advanced watermark. Verification is the demonstration of affirming reality of a trait of a datum or element. This may include affirming the personality of a man or programming program, following the roots of an antiquity, or guaranteeing that an item is the thing that it’s bundling also, naming cases to be. The two primary bearings in the verification field are sure and negative confirmation. Positive verification is settled and it is connected by the greater part of existing validation frameworks. Negative confirmation has been designed to diminish digital assaults. The contrast between the two is clarified by the
  • 2. International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES) Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015) IJTIMES-2015@All rights reserved 7 accompanying illustration: Let us expect watchword based validation. In positive confirmation, the passwords of all clients that are approved to get to a framework are put away, as a rule in a record. Accordingly the passwords space incorporates just client’s passwords and it is typically constrained. On the off chance that wafers get the passwords record, then their work is to recuperate the plaintext of an extremely predetermined number ofpasswords. In actuality, in negative validation the counter secret key space is made, (hypothetically) containing all strings that are not in the passwords document. On the off chance that saltines get the huge hostile to secret key document, their work will be much harder. Along these lines, negative confirmation can be presented as another layer of assurance to upgrade existing efforts to establish safety inside systems. This permits the present foundation to remain in place without getting to the put away passwords or making extra vulnerabilities. By applying a genuine esteemed negative determination calculation, an alternate layer is included for confirmation, keeping unapproved clients from picking up system access. 2. REVIEW OF LITERATURE Anil K. Jain, Arun Ross and SalilPrabhakar proposed considered Biometric Recognition [1]. In this paper, they give a brief blueprint of the field of biometrics and consolidate some of its purposes of interest, weights, qualities, constrainments, and related security concerns. A wide variety of structures requires trustworthy individual affirmation arrangements to either assert or choose the identity of an individual requesting their organizations. The inspiration driving such plans is to ensure that the rendered organizations are gotten to simply by a true blue customer and no one else. Delineations of such applications fuse secure access to structures, PC systems, convenient workstations, cellular telephones, and ATMs. Without vivacious individual affirmation plots, these structures are powerless against the wiles of an impostor. A biometric structure is a sample affirmation system that works by getting biometric data from an individual, expelling a rundown of abilities from the picked up data, and differentiating this rundown of capacities against the design set in the database. Dependent upon the application setting, a biometric structure may work either in affirmation mode or conspicuous confirmation mode. In the affirmation mode, the system acknowledges a man's identity by differentiating the got biometric data and her own specific biometric template(s) set away in the structure database. In the recognizing confirmation mode, the system sees a man by means of looking for the configurations of the significant number of customers in the database for a match. Therefore, the structure drives a one-to-various relationship with develop an individual's identity Robust biometrics-based affirmation arrangement for multi-server environment. Debiao He and Ding Wang given data about verification plan for multi-server environment [2]. In this paper, they proposed a strong biometrics-based verification plan for multiserver environment utilizing circular bend cryptography. The verification plan is a critical cryptographic instrument, through which two correspondence gatherings could verify each other in the open system environment. Security investigation demonstrates that the proposed plan could fulfill security prerequisite of multiserver environment. Execution examination demonstrates that the proposed plan could overcome shortcomings in past plans at the expense of expanding computational expense and communicational cost somewhat. Along these lines, the proposed plan is suitable for use in appropriated multi server system situations. The effect of watermarking on the acknowledgment execution of biometric frameworks has been explored most altogether with regards to iris acknowledgment. While Dong et al. [3] don't report on execution corruptions when researching a solitary watermark inserting calculation and one iris acknowledgment system just, Hammerle et al. [4] find incompletely significant diminishments in acknowledgment precision (particularly if there should be an occurrence of high limit) while surveying two iris acknowledgment plans and a few strong watermarking calculations. Like the last results, acknowledgment sway has been seen too for discourse acknowledgment [5] and fingerprint acknowledgment [6]. 3. PROPOSED SYSTEM MODEL User need to give the username, password including user face image and biometric signal as input. User capture their face image using web camera. To securing the data biometric signal can be encrypted by using Blowfish algorithm. This encrypted biometric signal can be embedded into the user face image by using LSB technique. To shrink down the data, it need to be compressed using Huffman algorithm. If the server matches the username then it will extract the encrypted biometric signal and do the decryption to get the original biometric signal. If both the images same then the server will allow the user to use the application. CAPTURING VIDEO OBJECT In this phase server will storing all users face in their own database. Before capturing human face, every user has to registering their profile information into the serverregistration process completed, server capturing the face. On capturing, video mode automatically capture image object from that video. Captured user face automatically storing into the server.Affirmation computations can be disconnected into two essential philosophies, geometric, which looks at perceiving
  • 3. International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES) Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015) IJTIMES-2015@All rights reserved 8 highlights, or photometric, which is a quantifiable philosophy that distils a photo into qualities and differences the qualities and designs to take out changes. We introduce a novel calculation for semantic video object (SVO) extraction, in light of another multivalued morphological spatial division that incorporates shading and edge data, and item following by in reverse locale grouping. Our proposed spatial division fuses another marker extraction strategy in light of power edge data that enhances the meaning of the genuine fringes of the scene objects, and another separation paradigm in view of shading and edge data to control the watershed calculation. Figure 3.1 Proposed System Model UPLOADING BIOMETRICS AND HIDING INTO VIDEO OBJECT Once human face capturing process is completed, server will capture the user appropriate biometrics. Here biometrics are not directly storing into the server. Every biometrics has to be encrypted and watermarked into the user face. For encryption here blowfish algorithm is used. After encryption process, server will embed encrypted biometrics into the human face. For embedding (watermarking) going to apply Least Significant Bit(LSB) techniques.These techniques will read every rows and columns of the biometrics and embedding into the appropriate rows and columns of the human face. So every watermarked image is maintained in the server.Watermarks shift extraordinarily in their perceivability; while some are clear on easygoing review, others require some study to choose. Different guides have been created, for example, watermark liquid that wets the paper without harming it. A programmed video-object situated steganographic framework is proposed for biometrics validation over mistake inclined systems. At first, the host video article is naturally extricated through investigation of videoconference groupings. Next, the biometric design relating to the sectioned video item is scrambled by a clamorous figure module. Subsequently, the scrambled biometric sign is embedded to the most huge wavelet coefficients of the video object, utilizing its Least Significant Bit (LSB). LSB give both intangibility and critical resistance against lossy transmission and pressure, conditions that are regular in blunder inclined systems. At long last, the opposite discrete wavelet change (IDWT) is connected to give the stego- object. Exploratory results under different misfortunes and JPEG pressure proportions demonstrate the security, power, and productivity of the proposed biometrics concealing framework. REMOTE SEVER AUTHENTICATION
  • 4. International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES) Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015) IJTIMES-2015@All rights reserved 9 In the module, remote server authentication is going to be performed. If user wants to access the application means he/she has to give his face and biometrics to the server. Server will match face with every face on the database. If server identified the matched face means, server will extract the fingerprint from that image. After extracting, server checks the face and biometrics into the matched face and biometrics. If both are matches only server will authenticate the user. 4. EXPERIMENTAL RESULTS This section shows the experimental results of our proposed work. The following screenshots shows the Image comparison during Login process: The following screenshot shows the Thumb impression Extraction during login:
  • 5. International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES) Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015) IJTIMES-2015@All rights reserved 10 The following screenshots explain the Ration products buying form: The following screenshot shows the Payment process: 5. CONCLUSION Biometric signals can scramble data with biometric test and transmission is done through video or some other media. This data is covered up as steganography picture. Biometric signals enter increasingly into our ordinary lives, since governments, and additionally different associations, resort to their utilization in fulfilling vital techniques (e.g. native validation). Therefore there is a pressing need to promote create and incorporate biometric validation systems into down to earth applications. Case in point, the lost biometric information can be covered from the verification module, with the goal that it endeavors to perform confirmation despite the fact that parts are missing (parts that don't contain any urgent data, e.g. terminations/bifurcations in the event of fingerprints). REFERENCES [1] Jain A.K, Ross A, Prabhakar S, (2004), “An introduction to biometric recognition,” IEEE Transactions on Circuits Systems for Video Technology,vol. 14(1), pp. 4–20, 2004. [2] He D, Wang D, (2014), “Robust biometrics-based authentication scheme for multi-server environment,” IEEE Systems Journal, pp. 1–8, 2014. [3] Jing Dong, Tieniu Tan.(2008),“Effects of watermarking on iris recognition performance”.Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision, pp. 1156–1161, 2008.
  • 6. International Journal of Technical Innovation in Morden Engineering & Science (IJTIMES) Volume 2, Issue 4, April-2016, e-ISSN: 2455-2584, Impact Factor: 3.45 (SJIF-2015) IJTIMES-2015@All rights reserved 11 [4] J. Hammerle-Uhl, K. Raab, A. Uhl.(2010),“Experimental study on the impact of robust watermarking on iris recognition accuracy”, Proceedings of the 25th ACM Symposium on Applied Computing, pp 1479–1484, 2010. [5] A. Lang, J. Dittmann. (2007),“Digital watermarking of biometric speech references: impact to the peer system performance”. In E. J. Delp and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents IX, number 6505 in Proceedings of SPIE, page 650513ff, 2007. [6] M. I. Rajibul, M.S Shohel, S. Andrews. (2008), “Biometric template protection using watermarking with hidden password encryption”.Proceedings of the International Symposium on Information Technology 2008, pp 296 – 303, 2008. [7] W. Stallings, (2010), “Cryptography and Network Security: Principles and Practices”. Prentice-Hall, 5th edition, Upper Saddle River, NJ, USA, 2010. [8] I.-E. Liao, C.-C.Lee, M.-S.Hwang, (2006), “A password authentication scheme over insecure networks,” Journal of Computer and System Sciences, vol. 72, pp. 727–740, 2006. [9] M. Jakobsson, M. Dhiman, (2013), “The benefits of understanding passwords,” in Mobile Authentication, ser. Springer Briefs in Computer Science. Springer New York, 2013, pp. 5–24. [10] M. Weir, S. Aggarwal, M. Collins, D. H. Stern, (2010), “Testing metrics for password creation policies by attacking large sets of revealed passwords,” in Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, 2010, pp. 162–175. [11] Y.Y. Wang, J.Y. Liu, F.-x. Xiao, J. Dan, (2009), “A more efficient and secure dynamic id-based remote user authentication scheme,” Computer Communications, vol. 32, no. 4, pp. 583–585, Mar. 2009. [12] M. K. Khan, S.-K. Kim, K. Alghathbar, (2011), “Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme,” Computer Communications, vol. 34, no. 3, pp. 305–309, Mar. 2011. [13] R. Madhusudhan and R. C. Mittal, “Dynamic id-based remote user password authentication schemes using smart cards: A review,” Intelligent Algorithms for Data-Centric Sensor Networks, vol. 35, no. 4, pp. 1235– 1248, Jul. 2012.