International Journal of Progressive Research in Engineering Management and Science
(Peer-Reviewed, Open Access, Fully Referred International Journal)
www.ijprems.com
editor@ijprems.com or Whatsapp at (+91-9098855509)


SECURED INFORMATION TRANSMISSION USING BIOMETRICS (KEY IJP************013)
Abstract
Nowadays, there is a lot of research interest in signal processing in the highly encrypted domain. Practical cancelable biometrics (CB) schemes must meet the criteria of non-invertibility, revocability, and non-linkability without impairing the matching precision of the underlying biometric recognition system. Verifying that new CB schemes can strike a compromise between the opposing aims of security and matching accuracy is crucial for closing the gap between theory and practice. The newly suggested local ranking-based cancelable biometrics (LRCB) strategy to safeguard iris codes is the subject of this project's investigation into the security and accuracy trade-off. As a result of their effectiveness, usefulness, and dependability, biometric technologies are being employed more frequently in a wide range of applications, including border control, authentication systems, and healthcare applications Traditional signal processing typically occurs before encryption or after decryption since encryption transforms regular signals into unintelligible data, making it an efficient and common method of protecting the privacy of picture data. This project uses biometric technology to produce safe information transmission. Here, the content owner uses an encryption key to encrypt the original, uncompressed image. Then, using the data-hiding key, the data-hider modifies the encrypted image's least significant bits to create a sparse space that can hold some more data. Iris images cannot be copied for another individual. If a receiver possesses a data-hiding key and an encrypted image containing additional data, he can still extract the additional data even though he doesn't know what the image contains. If the recipient possesses the encryption key, he can decrypt the data to get an image that matches the original, but he cannot get any other data out of it. When there are more than 50 words of additional data and the receiver possesses both the data-hiding key and the encryption key, he can use spatial correlation in the natural image to extract the additional data and retrieve the original content without making any mistakes.
DOI LINK : 10.58257/IJPREMS31211 https://www.doi.org/10.58257/IJPREMS31211