Embedding Data in Non-Important Gabor Ridges

Ali Abdulazeez Mohammed Baqer Qazzaz, Elaf J. Al Taee, Ziena Hassan Razaq Al Hadad

Abstract


Hiding information either by steganography or watermarking operation is essential for computer science. It is used as a method for sending secure and important information. It has special features that even if this information is discovered, the third part cannot reconstruct the original information in any way, not famously and commonly nor difficultly and especially by using any technique or algorithm. There are many hiding techniques; each one of them used different paths to ensure standard properties such as optimizing security level, increasing the amount of embedding data, decreasing the ability to reconstruct hidden information by any unwanted part. Here in the following suggested technique, different quantities of bits are hidden in various pixels depending on some discovered constraints by using the famous Gabor filter then divided ridges part in a selected fingerprint image for the purpose of hiding relevant information into important and non-important pixels that laying out of ridges in final images after applying Gabor filter which consider not important regions in fingerprint image for discovering important features from the image. The pixels used in hiding information belong to finger ridges in pure fingerprint images but covert to white pixels (valley) in the matrix after applying the Gabor filter and in original white pixels in both matrices by using different techniques for each type of pixels. The imaging stage constructed after the suggested technique is good and identical to the pure image for the accepted degree as shown in used fidelity metrics (PSNR). It is similar to a pure fingerprint matrix as proved in these metrics for calculating the level of goodness of proposed algorithms. Our algorithm exploits existing pixels in fingerprint image with different levels of importance and avoids pixels with high importance for protected important features from non-deterministic varying.

Keywords


Fingerprint; biometric, Gabor filter; steganography; LSB; PSNR.

Full Text:

PDF

References


C. Chen et al., “Review helpfulness prediction with embedding-gated cnn,†arXiv Prepr. arXiv1808.09896, 2018.

F.-T. Hong, W.-H. Li, and W.-S. Zheng, “Learning to detect important people in unlabelled images for semi-supervised important people detection,†in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 4146–4154.

M. Wang, J. Zhang, S. Jiao, X. Zhang, N. Zhu, and G. Chen, “Important citation identification by exploiting the syntactic and contextual information of citations,†Scientometrics, vol. 125, no. 3, pp. 2109–2129, 2020.

Z. Yang, C. Zhu, and W. Chen, “Parameter-free sentence embedding via orthogonal basis,†arXiv Prepr. arXiv1810.00438, 2018.

C. M. Childs and N. R. Washburn, “Embedding domain knowledge for machine learning of complex material systems,†MRS Commun., vol. 9, no. 3, pp. 806–820, 2019.

N. Van Tu, J.-H. Yoo, and J. W.-K. Hong, “PPTMon: Real-Time and Fine-Grained Packet Processing Time Monitoring in Virtual Network Functions,†IEEE Trans. Netw. Serv. Manag., vol. 18, no. 4, pp. 4324–4336, 2021.

R. Hidayat, F. N. Jaafar, I. M. Yassin, A. Zabidi, F. H. K. Zaman, and Z. I. Rizman, “Face detection using Min-Max features enhanced with Locally Linear Embedding,†TEM J., vol. 7, no. 3, p. 678, 2018.

M. S. Shim, H. Hu, and P. Li, “Reversible Gating Architecture for Rare Failure Detection of Analog and Mixed-Signal Circuits,†in 2021 58th ACM/IEEE Design Automation Conference (DAC), 2021, pp. 901–906.

N. R. Aljohani, A. Fayoumi, and S.-U. Hassan, “A novel focal-loss and class-weight-aware convolutional neural network for the classification of in-text citations,†J. Inf. Sci., p. 0165551521991022, 2021.

S. Thakur, A. K. Singh, and S. P. Ghrera, “Encryption Based DWT-SVD Medical Image Watermarking Technique Using Hamming Code,†in Proceedings of ICETIT 2019, Springer, 2020, pp. 1091–1099.

J. Im and S. Cho, “Distance-based self-attention network for natural language inference,†arXiv Prepr. arXiv1712.02047, 2017.

H. K. Sharaf, M. R. Ishak, S. M. Sapuan, N. Yidris, and A. Fattahi, “Experimental and numerical investigation of the mechanical behavior of full-scale wooden cross arm in the transmission towers in terms of load-deflection test,†J. Mater. Res. Technol., vol. 9, no. 4, pp. 7937–7946, 2020.

H. K. Sharaf, S. Salman, M. H. Dindarloo, V. I. Kondrashchenko, A. A. Davidyants, and S. V Kuznetsov, “The effects of the viscosity and density on the natural frequency of the cylindrical nanoshells conveying viscous fluid,†Eur. Phys. J. Plus, vol. 136, no. 1, pp. 1–19, 2021.

S. H. Raheemah, K. I. Fadheel, Q. H. Hassan, A. M. Aned, A. A. T. Al-Taie, and H. Kadhim, “Numerical Analysis of the Crack Inspections Using Hybrid Approach for the Application the Circular Cantilever Rods,†Pertanika J. Sci. Technol., vol. 29, no. 2, 2021.

N. S. Tawfik and M. R. Spruit, “Evaluating sentence representations for biomedical text: Methods and experimental results,†J. Biomed. Inform., vol. 104, p. 103396, 2020.

D. S. Kumar and V. M. Rao, “Simultaneous feature selection and classification using fuzzy rules,†in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp. 125–130.

S. Abujar, A. K. M. Masum, M. Mohibullah, Ohidujjaman, and S. A. Hossain, “An Approach for Bengali Text Summarization using Word2Vector,†in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Jul. 2019, pp. 1–5, doi: 10.1109/ICCCNT45670.2019.8944536.

A. A. Ismail, M. Gunady, H. Corrada Bravo, and S. Feizi, “Benchmarking deep learning interpretability in time series predictions,†Adv. Neural Inf. Process. Syst., vol. 33, pp. 6441–6452, 2020.

M. T. GençoÄŸlu and S. B. Hasan, “Combining of Cryptography and Steganography for Improving of Security.â€

A. A. Ismail, M. Gunady, L. Pessoa, H. Corrada Bravo, and S. Feizi, “Input-cell attention reduces vanishing saliency of recurrent neural networks,†Adv. Neural Inf. Process. Syst., vol. 32, 2019.

R. Bakthula, S. Shivani, and S. Agarwal, “Self authenticating medical X-ray images for telemedicine applications,†Multimed. Tools Appl., vol. 77, no. 7, pp. 8375–8392, 2018.

H. Zhu and T. Huang, “A novel deep quality-aware CNN for image edge smoothening,†Futur. Gener. Comput. Syst., vol. 113, pp. 468–473, 2020.

B. B. Hazarika, D. Gupta, and P. Borah, “An intuitionistic fuzzy kernel ridge regression classifier for binary classification,†Appl. Soft Comput., vol. 112, p. 107816, 2021.

W.-H. Li, F.-T. Hong, and W.-S. Zheng, “Learning to learn relation for important people detection in still images,†in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 5003–5011.

D. V Zubarev and I. V Sochenkov, “Cross-language text alignment for plagiarism detection based on contextual and context-free models,†in Proc. of the Annual International Conference “Dialogue, 2019, vol. 1, pp. 799–810.

F. Yang, Y. Zhao, and R. Cui, “Recognition Method of Important Words in Korean Text Based on Reinforcement Learning,†in China National Conference on Chinese Computational Linguistics, 2020, pp. 261–272.




DOI: http://dx.doi.org/10.18517/ijaseit.12.1.15005

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development