2017
DOI: 10.1007/s11042-017-5308-3
|View full text |Cite
|
Sign up to set email alerts
|

An overview of steganography techniques applied to the protection of biometric data

Abstract: Identification of persons by way of biometric features is an emerging phenomenon. Over the years, biometric recognition has received much attention due to its need for security. Amongst the many existing biometrics, fingerprints are considered to be one of the most practical ones. Techniques such as watermarking and steganography have been used in attempt to improve security of biometric data. Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(49 citation statements)
references
References 55 publications
0
46
0
3
Order By: Relevance
“…Used for limit services of online data transfer. [25,26,27] Steganography -Difficulty of detect the embedding files.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Used for limit services of online data transfer. [25,26,27] Steganography -Difficulty of detect the embedding files.…”
Section: Methodsmentioning
confidence: 99%
“…The steganography is proposed by many researches as effective security method to hide the plain data in embedding files such as images [25][26][27]. Hence, it is difficult to detect the embedding files and extract the plain data from these files.…”
Section: Related Workmentioning
confidence: 99%
“…Класичний стеганографічний захист даних [1,2] ґрунтується на приховуванні самого факту існування секретних даних. Поки цей факт не розголошено, дані залишаються захищеними.…”
Section: вступunclassified
“…Проте в переважній більшості випадків такого захисту недостатньо для гарантування безпеки даних. Тому звичайною практикою є комбінування шифрування даних і стеганографічного приховування [1][2][3][4][5][6][7]. Останнім часом такий підхід використовується у дедалі ширшому колі застосувань, у т.ч.…”
Section: вступunclassified
“…During the transmission of multimedia data, the security becomes a prime issue to maintain the privacy and reliable communication. To overcome this issue, data cryptography [1,2], watermarking [3,4] and steganography [5] techniques are widely adopted. The data hiding techniques such as steganography are considered as the promising technique.…”
Section: Introductionmentioning
confidence: 99%