Steganography Using Biometrics

Author(s):  
Manashee Kalita ◽  
Swanirbhar Majumder

In this smart age, smart gadgets with internet connectivity have become a necessity. While enjoying these facilities, one must count the security of their private or confidential information. With due time, a lot of cryptographic methods have been developed for enforcing security. On the other hand, with the advancement of technologies, the intruders and hackers have also developed their skills and tools. Therefore, many times we fail to protect our information. To get rid of this situation, the developers have to focus on some other method besides cryptography. Steganography can be considered as the solution to overcome this problem, as it is the technique which conceals the existence of any secret information in a usual media file. Moreover, inclusion of biometric with steganography enhances the security level, as biometric systems are dominating the field of authentication. Here, various techniques of steganography, biometrics, and steganography using biometrics will be discussed. Finally, the present scenario of steganography using biometrics will be demonstrated.

Author(s):  
Manashee Kalita ◽  
Swanirbhar Majumder

In this smart age, smart gadgets with internet connectivity have become necessity of modern life. While enjoying these facilities one must count the security of their private or confidential information. With due time, a lot of cryptographic methods have been developed for enforcing security. On the other hand, with the advancement of technologies the intruders and hackers have also developed their skills and tools. Therefore, many times we fail to protect our information. To get rid of this situation, the developers have to focus on some other method besides cryptography. Steganography can be considered as the solution to overcome this problem, as it is the technique which conceal the existence of any secret information in a usual media file. Moreover, inclusion of biometric with steganography enhances the security level, as biometric systems are dominating the field of authentication nowadays. Here, various techniques of steganography, biometric and steganography using biometrics will be discussed. Finally present scenario of steganography using Biometrics will be demonstrated.


Rev Rene ◽  
2022 ◽  
Vol 23 ◽  
pp. e72190
Author(s):  
Marcos Venícios de Oliveira Lopes

In late 2019, the first cases of a disease, which would come to be known as COVID-19, emerged in a Chinese city, known for being the home to a market where wild animals were relatively common and to a virology laboratory of the highest security level. Coincidence or not, the debate about the origin of the disease involves these two places, and a lot of political interest. On the other hand, the tragedy that became one of the deadliest pandemics ever recorded has several other elements that are more or less important, depending on the moment and context.


2012 ◽  
Vol 2 (3) ◽  
pp. 16-18
Author(s):  
Mohammad Waseem Khan

Advancement in medical technology has helped man kind in several ways and no one can deny the contribution of medical technology in the field of medicine. On the other hand technology has also given rise to some ethical issues. The issue of confidentiality is one of those issues. Patients keeping their trust on physician reveals all concerned confidential information to their physician with surety that physician will not reveal it to other person and will keep it confidential. It has been common in practice that, physicians unintentionally breach their patient’s confidentiality by discussing cases and history of their patients in public places, hospital elevators, and with their students. In a busy hospital setting it can be difficult to maintain confidentiality for patients. Increasing workloads lead to discussions of patients in public areas which is not an acceptable excuse. The very next person present there listening the discussion could be a patient's friend, relative, or media member that is not entitled to this privileged information. In all these cases permission must be received from the patient prior to any disclosure.DOI: http://dx.doi.org/10.3329/bioethics.v2i3.10259Bangladesh Journal of Bioethics 2011;2(3):16-18


2020 ◽  
pp. 485-504
Author(s):  
Astra Emir

This chapter considers the duties of ex-employees, ie the obligations which apply to an employee who is about to leave his employment (whether voluntarily or otherwise), or who has actually left that employment. The law must strike a delicate balance. On the one hand, an employee has a right to earn his living, and knowledge and skills obtained in his former employment will doubtless enable him to continue to do so; on the other hand, an employer is entitled to limited protection against an employee who may well be seeking to compete. It includes garden leave, trade secrets and confidential information, restraint of trade and working for competitors.


Author(s):  
Astra Emir

This chapter considers the duties of ex-employees, ie the obligations which apply to an employee who is about to leave his employment (whether voluntarily or otherwise), or who has actually left that employment. The law must strike a delicate balance. On the one hand, an employee has a right to earn his living, and knowledge and skills obtained in his former employment will doubtless enable him to continue to do so; on the other hand, an employer is entitled to limited protection against an employee who may well be seeking to compete. It includes garden leave, trade secrets and confidential information, restraint of trade and working for competitors.


2015 ◽  
Vol 10 (1) ◽  
Author(s):  
Devri Riza Setyawan ◽  
Willy Sudiarto Rahardjo ◽  
R. Gunawan Santosa

Security and confidentiality of information are considered a requirement in today's communication media. Many people have used Internet to share and distribute confidential information. On the other hand, many malicious activities attempts to steal those information by irresponsible parties. Therefore, information must be secured and converted into another form before it is sent to the destination by the use of cryptography and steganography. We developed a program to secure this information, by using Twofish and Least Significant Bit algorithm to encrypt secret messages and then insert it into an image file. By combining these two methods, we can achieve higher levet of information security.The information encoded with twofish algorithm will change the fite size stightly. This changes are caused by the use of padding. In addition, both of the output image are not resistant by some manipulation operations. The output of the system in BMP format does not change the file size after insertion process, while PNG format will have a stightty dffirence infile size due to processing in bitmap mode.


1999 ◽  
Vol 173 ◽  
pp. 249-254
Author(s):  
A.M. Silva ◽  
R.D. Miró

AbstractWe have developed a model for theH2OandOHevolution in a comet outburst, assuming that together with the gas, a distribution of icy grains is ejected. With an initial mass of icy grains of 108kg released, theH2OandOHproductions are increased up to a factor two, and the growth curves change drastically in the first two days. The model is applied to eruptions detected in theOHradio monitorings and fits well with the slow variations in the flux. On the other hand, several events of short duration appear, consisting of a sudden rise ofOHflux, followed by a sudden decay on the second day. These apparent short bursts are frequently found as precursors of a more durable eruption. We suggest that both of them are part of a unique eruption, and that the sudden decay is due to collisions that de-excite theOHmaser, when it reaches the Cometopause region located at 1.35 × 105kmfrom the nucleus.


Author(s):  
A. V. Crewe

We have become accustomed to differentiating between the scanning microscope and the conventional transmission microscope according to the resolving power which the two instruments offer. The conventional microscope is capable of a point resolution of a few angstroms and line resolutions of periodic objects of about 1Å. On the other hand, the scanning microscope, in its normal form, is not ordinarily capable of a point resolution better than 100Å. Upon examining reasons for the 100Å limitation, it becomes clear that this is based more on tradition than reason, and in particular, it is a condition imposed upon the microscope by adherence to thermal sources of electrons.


Author(s):  
K.H. Westmacott

Life beyond 1MeV – like life after 40 – is not too different unless one takes advantage of past experience and is receptive to new opportunities. At first glance, the returns on performing electron microscopy at voltages greater than 1MeV diminish rather rapidly as the curves which describe the well-known advantages of HVEM often tend towards saturation. However, in a country with a significant HVEM capability, a good case can be made for investing in instruments with a range of maximum accelerating voltages. In this regard, the 1.5MeV KRATOS HVEM being installed in Berkeley will complement the other 650KeV, 1MeV, and 1.2MeV instruments currently operating in the U.S. One other consideration suggests that 1.5MeV is an optimum voltage machine – Its additional advantages may be purchased for not much more than a 1MeV instrument. On the other hand, the 3MeV HVEM's which seem to be operated at 2MeV maximum, are much more expensive.


2005 ◽  
Vol 19 (3) ◽  
pp. 129-132 ◽  
Author(s):  
Reimer Kornmann

Summary: My comment is basically restricted to the situation in which less-able students find themselves and refers only to literature in German. From this point of view I am basically able to confirm Marsh's results. It must, however, be said that with less-able pupils the opposite effect can be found: Levels of self-esteem in these pupils are raised, at least temporarily, by separate instruction, academic performance however drops; combined instruction, on the other hand, leads to improved academic performance, while levels of self-esteem drop. Apparently, the positive self-image of less-able pupils who receive separate instruction does not bring about the potential enhancement of academic performance one might expect from high-ability pupils receiving separate instruction. To resolve the dilemma, it is proposed that individual progress in learning be accentuated, and that comparisons with others be dispensed with. This fosters a self-image that can in equal measure be realistic and optimistic.


Sign in / Sign up

Export Citation Format

Share Document