Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
1
4
,
No.
1
,
A
pr
il
201
9
, p
p.
462
~
470
IS
S
N:
25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v1
4
.i
1
.pp
462
-
470
462
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
Wireles
s
se
ns
or data min
ing
f
or e
-
co
mm
erce applic
atio
ns
T
.
Sride
vi
1
,
P.
Mall
ikarj
un
a R
ao
2
,
P.
V
Ra
mar
aj
u
3
1
,2
Depa
rtment
of
Elec
tron
ic
s
&
C
om
m
unic
at
ion
E
ngine
er
ing
,
Andhra
Univer
si
t
y
C
oll
eg
e
of
Engi
n
e
eri
ng
(A)
,
Visakha
pat
n
am, A
ndhra
Prade
sh,
India
3
Depa
rtment
of
El
e
ct
roni
cs
&
C
om
m
unic
at
ion
E
ngine
er
ing
,
SR
KR E
ngin
ee
ring
C
oll
eg
e, Bhi
m
avaram,
Andhra
Prade
sh
,
India
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
J
un
24
, 2
018
Re
vised
O
ct
15
, 2
018
Accepte
d
J
a
n 7
, 2018
I
nform
at
ion
hid
i
ng
is
th
e
m
ost
i
m
porta
nt
cr
it
er
ia
today
in
sev
eral
sec
tors,
due
to
sec
ur
ity
issues.
Mos
tly
for
th
e
sec
ur
ity
appli
ca
t
ions
used
in
Financ
e
&
banki
ng
sec
tors,
hidi
ng
th
e
infor
m
at
ion
about
us
ers
and
th
ei
r
tr
a
nsac
ti
ons
ar
e
nec
essar
y
a
t
pr
ese
nt
from
the
hac
ker
s
in
al
l
h
igh
sec
urity
zo
nes.
In
thi
s
conse
quence
bio
m
et
ric
s is
progre
ss
ive
l
y
conside
r
ed
as
founda
ti
on
componen
t
for
an
ext
ensiv
e
arr
a
y
of
p
ers
onal
aut
h
ent
i
cat
ion
soluti
ons,
b
oth
at
the
nat
ion
al
l
eve
l
(E
.
g.
Indi
a
UID
AI)
and
the
sm
al
le
r
-
sca
le
(
E.
g
.
bank
i
ng
ATMs
,
school
lun
ch
pa
y
m
ent
s
y
stems
).
Biom
et
ric
fra
ud
is
al
so
an
ar
ea
o
f
inc
r
ea
sin
g
conc
ern
,
as
the
num
ber
of
de
plo
y
ed
biometric
s
y
stems
inc
r
ea
ses
and
fra
udsters
be
co
m
e
awa
re
of
th
e
pote
ntial
to
comprom
ise
the
m
.
Organi
z
at
ions
are
inc
r
ea
singl
y
depl
o
y
ing
p
roc
e
ss
and
technolog
y
solu
ti
ons
to
st
a
y
one
step
ahe
ad
.
At
pre
sen
t
Banke
rs
are
usi
ng
diffe
re
nt
sing
le
Biom
et
ri
c
Modali
t
ie
s
for
diffe
re
n
t
servic
e
s.
All
Biom
et
ric
fe
at
ure
s
ar
e
not
suita
ble
,
for
a
ll
services
bec
ause
of
var
io
us
art
ifact
s
whil
e
ext
r
acting
f
ea
t
ure
s
from
the
se
nsors
due
to
bac
kground
noi
se,
li
ght
ing
co
ndit
ions,
e
ase
of
ac
ce
ss
etc.
Thi
s
pape
r
proposes
a
m
ult
i
m
odel
s
y
stem
tha
t
wil
l
show
a
onet
ime
singl
e
soluti
on
to
m
ee
t
al
l
th
ei
r
s
ec
uri
t
y
prob
le
m
s.
Thi
s
pape
r
p
art
i
cul
ar
l
y
h
and
le
s
how
to
inc
orpora
te c
r
y
p
togra
ph
y
and
st
e
ganogr
aph
y
in
b
i
om
et
ric
appl
i
cati
ons.
Ke
yw
or
d
s
:
Bi
om
e
tric
app
l
ic
at
ion
s
Crypto
gr
a
phy
E
-
com
m
erce
Secu
rity
Stegan
ogra
phy
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
T. Sride
vi
,
Dep
a
rtm
ent
o
f El
ect
ro
nics
a
nd C
omm
un
ic
ation
En
gin
ee
rin
g,
And
hr
a
Unive
r
sit
y C
ollege of
En
gin
eeri
ng
(
A)
,
Visak
ha
patna
m
, A
ndhr
a
Pr
a
des
h,
India.
Em
a
il
:
sridev
i.
ds
p@
gm
ail.co
m
1.
INTROD
U
CTION
To
date,
bio
m
et
ric
te
chn
ol
ogie
s
[1]
ha
ve
been
m
os
t
widely
adopted
by
the
Gove
r
nm
ent
/
pu
blic
sect
or
,
pr
im
aril
y
fo
r
poli
ci
ng
/
secur
it
y
an
d
bor
der
c
ontrol/t
r
avel
facil
it
at
ion
.
Fin
ge
rprint
recog
niti
on
[
2]
,
Face
recog
niti
on
,
ey
e
recogn
it
io
n
and
vo
ic
e
rec
og
niti
on
are
diff
e
ren
t
areas
of
bio
m
et
rics
te
chn
ologies
.
Fin
ger
pr
in
t
recog
niti
on
dom
inate
s
d
ue
t
o
low
c
os
t,
high
sp
ee
d,
high
a
ccur
acy
a
nd
de
ns
e
data
cha
ra
ct
erist
ic
s,
apar
t
from
it
s
us
e
in
bac
kgr
ound
che
ck
ing
.
Ma
r
ket
siz
e
for
Face
re
cogniti
on
wa
s
USD
912
m
i
ll
ion
in
2012
and
i
s
exp
ect
e
d
to
to
uch
USD
2.15
bill
ion
by
2018,
pri
m
ary
reas
on
s
bein
g
ad
opt
ion
in
e
-
Pass
port
gates,
a
nd
grow
t
h
in
m
ob
il
e
bas
ed
ap
plica
ti
ons
fo
r
face
rec
ogniti
on
.
Bi
om
et
ric
info
rm
at
ion
is
ver
y
i
m
po
rtant
an
d
Faci
ng
Pr
oble
m
of
secur
it
y
in
to
days.
T
his
is
done
by
a
pply
ing
diff
e
re
nt
crypto
grap
hy
al
gorithm
s
and
Stega
a
no
gr
a
ph
y
al
gorithm
s [
2]
, [
3]
for
a
void
ing
i
nfor
m
at
ion
hack
i
ng.
1.1.
Be
nefi
ts of Usin
g
Bi
om
etrics i
n B
an
k
ing
The be
nef
it
s a
r
e
,
a.
Bi
om
e
tric
te
c
hnology
pr
ov
i
des
the
st
ron
gest
m
et
ho
d
of
a
uth
e
ntica
ti
on
t
hat
prote
ct
s
bankin
g
inf
or
m
at
ion
from
b
ei
ng
co
m
prom
ise
d
by una
uthorize
d pe
rs
onnel.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Wi
rel
ess sen
s
or d
ata mi
ning f
or
e
-
co
m
merce
app
li
catio
ns
(
T. Sridevi
)
463
b.
Bi
om
e
tric
te
chn
ol
og
y
pro
vide
s
fast
an
d
acc
ur
at
e
ide
ntific
a
ti
on
f
or
the
ba
nk
i
ng
in
du
st
ry.
Custom
ers
can
be qu
ic
kly
authe
ntica
te
d
i
n
sec
onds t
hro
ugh
a
f
ast
biom
et
ric scan.
c.
A
bi
om
et
ric
vo
ic
e
rec
ogniti
on
syst
em
[4]
fo
r
e
xam
ple
prov
i
des
a
sec
ure
and
flexi
ble
so
luti
on
to
ver
ify
a
ny c
us
t
om
er
execu
ti
ng c
omm
un
ic
at
i
on outsi
de
of a
brick a
nd m
or
ta
r
e
nv
ir
onm
ent.
These
days,
it
is
necessa
ry
to
ap
ply
crypt
og
raphy
al
go
rith
m
s
and
Stega
nogra
ph
y
al
gori
thm
s
[5
]
f
or
bette
r
sec
ur
it
y.
In
c
rypt
ogra
phy,
the
m
essage
is
s
cram
bled
and
unrea
dab
le
.
Howe
ver,
wh
e
n
th
e
com
m
un
ic
at
ion
ha
pp
e
ns
,
it
can
be
noti
ced
that
the
in
for
m
at
ion
is
e
ncry
pted
.
Alth
ou
gh
the
in
form
at
ion
is
hidden
in
the
ci
ph
er,
a
n
in
te
rcep
ti
on
o
f
t
he
m
essage
c
an
be
dam
aging,
as
it
st
il
l
sh
ows
that
there
is
com
m
un
ic
at
ion
betwee
n
the
send
e
r
an
d
re
cei
ver
.
I
n
co
nt
rast,
ste
ga
nograph
y
ta
kes
a
di
ff
ere
nt
ap
proa
ch
in
hid
in
g
the
e
vide
nce
.
I
n
Stega
nograp
hy
,
one
inf
or
m
at
ion
is
hid
den
in
oth
e
r
inform
at
ion
,
th
at
’s
way
it
is
highly
i
m
po
ssible
t
o
noti
ce
that
t
he
in
f
or
m
at
ion
visible
on
the
c
omm
un
ic
at
ion
li
ne
co
nt
ai
ns
in
visible
hidden
inf
or
m
at
ion
.
Com
par
ed
to
c
rypto
gr
a
phy,
ste
gano
gr
a
phy
ha
s
it
s
adv
a
ntage
becau
se
t
he
m
essage
it
sel
f
w
il
l
no
t
at
tract
the
au
di
e
nce
,
as
the
ve
ry
natu
re
of
a
ste
gano
gr
a
ph
y
syst
e
m
is
to
hi
de
the
m
essag
e
in
an
un
no
ti
c
eable
m
ann
er
.
By
co
m
bin
ing
these
Crypto
gr
a
phy
(F
or
E
nc
ryptio
n
&
Dec
ryptio
n)
[
6]
,
[
7]
an
d
Stegan
ogra
phy
(
F
or
Data hi
ding i
n a m
ult
i
m
edia o
bj
ect
)
sec
ur
it
y
te
chn
iq
ues
in
form
ation
ca
n be
secu
red m
or
e
eff
ect
ively
.
As
a
P
OC
a
nd
ref
e
re
nce,
a
pa
per
by
Faiz
an
A
hm
ad
,
Aaim
a
Na
j
am
,
and
Zeesha
n
A
hm
e
d
e
xp
la
i
ns
that
hu
m
an
face
is
a
dyna
m
ic
obj
ect
hav
i
ng
high
de
gr
ee
of
var
ia
bili
ty
in
i
ts
app
eara
nce,
and
they
intr
oduce
d
Im
age
-
base
d
F
ace
Detect
ion
and
Re
c
ogniti
on
[
8].
Re
nu
Bhati
a
discuss
ed
di
ff
e
ren
t
bio
m
et
rics
te
chn
iqu
e
s
su
c
h
as
Ir
is
sc
an,
reti
na
sca
n
and
face
rec
ogniti
on
te
ch
niq
ue
s
[9
]
.
G.
N
agar
a
ju
an
d
T.
V.
Hym
a
La
ks
hm
i
exp
la
ine
d
t
he
proce
dure
to
a
pp
ly
sca
nn
i
ng
te
chn
iq
ues
f
or
the
im
age
and
add
i
ng
key
-
ba
sed
car
rie
r
im
a
ge
t
o
get
bette
r
e
ncry
ptio
.
Dr.
P
.V.
Ram
a
Ra
j
u,
T.
A
nv
e
sh
Ga
nd
hi,
G.
Na
ga
R
aju
discuss
e
d
how
t
o
get
e
nc
ryptio
n
thr
ough
zi
gzag
pix
el
ind
ic
at
or
an
d
scan
te
c
hn
i
qu
e
s
an
d
app
ly
in
g
ste
ga
nogra
ph
y
.
A
pa
per
by
Sr
ide
vi
Tho
ta
,
Ph
a
nindra
Sai
Sr
i
niv
as
G
udip
ud
i,
Bha
nu
Pr
a
kas
h
Pa
nc
hak
a
rla
e
xp
la
ins
a
n
e
nh
a
nc
ed
m
at
rix
ap
proac
h
al
gorithm
thro
ugh
wh
ic
h
la
rge
a
m
ou
nt
of
da
ta
can
be
hidde
n
inside
a
n
im
age
file
.
T
his
al
gorithm
ensu
r
es
the
secur
it
y
an
d
sa
fety
of
hidde
n
data.
T
hu
s
the
al
gorithm
can
be
exte
nded
t
o
the
fiel
ds
of
Def
e
ns
e,
I
nter
net
an
d
oth
e
r
ap
plica
ti
on
s
w
her
e
dat
a
secu
rity
is
of
pr
im
ary
con
c
ern.
A
pa
per
by
Ab
ik
oye
Oluwakem
i
C,
Adewo
le
Kayo
de
S
,
Oladip
upo
Ayot
unde
J
disc
us
s
e
s
a
syst
em
th
at
was
e
valuat
ed
f
or
ef
fecti
ve
ness
a
nd
the
resu
lt
sh
ows
that,
th
e
encr
ypti
on
an
d
decr
y
ptio
n
m
et
ho
ds
use
d
for
de
velo
ping
the
syst
e
m
m
ake
the
secu
rity
of
the
pro
po
se
d
syst
e
m
m
or
e
eff
ic
ie
nt
in
sec
ur
in
g
data
from
un
a
uthorize
d
acce
ss.
Th
e
syst
em
is
,
reco
m
m
end
ed
t
o
be
us
e
d
by
t
he
In
te
rn
et
us
e
rs
for
est
a
blishin
g
a
m
or
e
sec
ur
e
com
m
un
ic
at
i
on.
In
[
10
]
e
xpla
ined
inte
gr
at
i
on
of
Ad
a
ptive
Wei
gh
t
Ra
nk
i
ng
P
olicy
(AWRP)
with
intel
li
ge
nt
cl
assifi
ers
(
NB
-
A
W
RP
-
D
A
an
d
J
48
-
A
WRP
-
D
A)
via
dynam
ic
agin
g
fact
or
to
i
m
pr
ov
e
cl
assif
ie
rs
powe
r
of
predict
io
n.
T
he
m
et
ho
ds
a
re
us
ed
to
c
hoos
e
t
he
best
su
bse
t
of
fe
at
ures.
T
he
c
onfi
den
ti
al
awa
re
ne
ss
base
d
on
c
ryptoa
naly
sis
f
or
t
wo
fact
or
a
uth
e
ntica
ti
on
proces
s
is
pr
e
sente
d
in
[
11
]
.
The
co
m
par
ison
of
va
rio
us
c
rypto
a
naly
ses
pr
ocedur
es
are
disc
usse
d.
I
n
[12],
th
ere
a
r
e
three
cat
e
gori
es
of
c
rypto
gr
aph
ic
al
gori
th
m
s.
They
are
as
fo
ll
ows:
Hash
al
gorit
hm
s,
in
wh
ic
h
has
hing
functi
ons
are
use
d
to
m
ap
data
of
ra
ndom
or
pr
e
def
in
ed
siz
es.
To
f
ur
t
her
i
m
pr
ov
e
the
sec
ur
it
y
this
al
go
r
it
h
m
is im
ple
m
ented.
1.2.
Ob
jecti
ve
s
The
m
ai
n
obj
e
ct
ives of this
paper
are:
a.
To
s
how
that
hid
in
g
data
a
nd
m
aking
it
in
visible
is
bette
r
tha
n
j
ust
enc
ryptin
g
it
an
d
m
aking
it
visible.
b.
To
hi
de
data
in
a
popula
r
obj
ect
that
will
no
t
at
tract
any
at
te
ntion
.
I
n
c
ase
the
data
is
extracte
d,
i
t
will
b
e e
ncr
y
pted.
To
achie
ve
the
se
obj
ect
ives,
‘
i
m
age’
is
the
ri
gh
t
ob
j
ect
to
app
ly
the
pro
posed
al
gorithm
s.
The
reas
on
wh
y
only
im
ag
e
is
co
ns
id
ere
d
is
beca
us
e;
i
t
can
c
on
ta
i
n
e
noug
h
in
f
or
m
at
i
on
to
hide
,
w
hi
le
no
t
a
ppeari
ng
to
be
m
od
ifie
d.
It is
ef
fici
ent
en
ough to
not
dr
a
w
a
ny att
entio
n
.
2.
PROP
OSE
D
METHO
DOL
OGY
A
ge
ner
al
pro
cedure
to
secu
re
bio
m
et
ric
i
nfor
m
at
ion
is
sh
ow
n
in
Fig
ure
1.
Ta
king
the
bio
m
et
ric
inf
or
m
at
ion
[13]
fr
om
the
us
er
an
d
stori
ng
it
on
the
m
e
m
or
y
de
vice
an
d
retrievin
g
the
inf
or
m
at
ion
from
the
m
e
m
or
y
wh
e
ne
ver
re
qu
i
red
are
c
omm
on
ste
ps
i
n
bio
m
et
ric
te
chnolo
gy.
To
protect
this
inf
or
m
at
ion
,
a
dd
i
ng
crypto
m
echani
s
m
is
necessary.
I
n
un
prote
ct
ed
proces
s,
i
t
is
ver
y
easy
to
hac
k
the
bi
om
et
ric
info
r
m
at
ion
,
because
the
re
i
s
no
s
pecial
se
cret
key
us
e
d
[
14
]
.
I
n
protect
ed
proce
dure,
with
a
sec
ret
ke
y
there
is
a
pe
rf
ect
prot
ect
ion. T
hi
s is sho
wn in F
igure
2.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
4
, N
o.
1
,
A
pr
il
201
9
:
462
–
470
464
Figure
1
.
Flo
w
d
ia
gram
f
or se
cur
e
b
i
om
et
ric
inf
or
m
at
ion
Figure
2
.
Prote
ct
ing
alg
ori
thm
f
lo
w diag
ram
for
the
d
at
a
sec
ur
it
y
Si
m
il
arly
there
is
a
po
ssi
bili
t
y
of
hi
ding
dat
a
in
i
m
ages
ju
st
by
LSB
re
place
m
ent
m
et
ho
d.
This
m
et
ho
d
with e
xam
ple is sho
wn in Fi
gure
3.
Figure
3
.
Exa
m
ple o
f
LSB
r
ep
la
cem
ent
m
e
thod
2.1.
Bi
ome
tric
Securi
t
y
Sy
s
tems
This
syst
em
i
nvolv
e
s
pe
rson'
s
un
iq
ue
ide
ntific
at
ion
(
ID),
su
c
h
as
Fac
e,
Hand
geo
m
et
ry,
Re
ti
nal,
IRIS
,
Fin
ge
rpr
int
or
D
N
A
,
i
t
is
bec
om
ing
popula
r
for
prov
i
ding
the
se
cur
it
y
in
ne
w
IT
world
.
O
ne
of
the
m
ul
ti
m
od
el
b
i
om
et
ric secur
it
y sy
stem
s is shown as
in
Fig
ure
4.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Wi
rel
ess sen
s
or d
ata mi
ning f
or
e
-
co
m
merce
app
li
catio
ns
(
T. Sridevi
)
465
Fig
ure
4
.
Mult
im
od
al
b
iom
et
ri
c syst
e
m
Thi
s
te
ch
nolo
gy
cat
ches
the
at
te
ntion
of
ha
cker
s
w
hose
pri
m
ary
ta
rg
et
is
to
bypass
th
e
bio
m
et
ric
secur
it
y.
T
he
hack
e
rs
break
the
bi
om
et
rics
secu
rity
thr
ough
bi
om
et
ric
scann
i
ng
te
ch
nolo
gy.
T
he
biom
et
ric
scan
ning
te
ch
nolo
gy
sti
ll
has
m
any
con
ce
rn
s
su
ch
a
s
inf
orm
at
ion
and
ph
ysi
cal
pr
ivacy
.
The
ha
cke
rs
m
anag
e
d
to
ha
ck
va
rio
us
bi
om
et
ric
secur
it
y
la
ye
rs
[
15
]
se
ve
ral
ti
m
es
by
m
anipu
la
ti
n
g
te
m
pla
te
s
in
t
he
Data
base
,
wh
ic
h
is
colle
c
te
d
from
a
person
of
his
fin
ge
r
pri
nt
a
nd
Ir
i
s
i
m
ages
by
usi
ng
a
sca
nner
e
tc
.
This
em
erges
the
need
t
o
ad
d
t
he
ext
ra
sec
uri
ty
to
bio
m
et
r
ic
syst
e
m
s
es
pecial
ly
fo
r
fin
ancial
ser
vic
es
involve
d
li
ke
e
-
com
m
erce,
b
a
nk
i
ng
sect
ors
and
de
fe
ns
e
se
ct
or
s.
I
n
pu
rsu
it
of
fi
nd
i
ng
out
a
rem
edy,
we
fou
nd
out
a
s
olu
ti
on
for
‘m
anipu
la
ti
ng
te
m
plate
s
i
n
a
data
base’
and
par
ti
al
ly
su
ccee
de
d
to
a
ddress
t
he
seco
nd
pro
blem
w
hich
i
s
us
in
g
bio
m
et
ri
c
i
m
ages
inst
ead
of
physi
cal
bio
m
et
rics.
This
proce
dure
is
e
xp
la
ine
d
with
e
xam
ple
of
enroll
m
ent at ban
k i
n Fi
gure
5
.
Figure
5
.
Ba
nk
enrollm
ent ex
a
m
ple f
or
pro
pose
d
m
et
ho
dolog
y
2.2
.
Pr
oposed
A
lg
orit
hm
(Desi
gn
Pr
oced
u
re)
The
pr
opos
e
d
s
yst
e
m
sh
own
in Fig
ur
e
6,
a
dd
s two
lay
ers of sec
ur
it
y o
n
to
p of
the
bio
m
et
ric secur
it
y.
Crypto
gr
a
phy
and
ste
ga
nogra
ph
y
te
c
hnologi
es
are
pro
vid
i
ng
the
tw
o
la
ye
r
s
of
sec
ur
it
y
.
The
a
ppli
cat
ion
will
op
e
rate
basical
ly
in
two p
r
oce
sses.
Reg
is
tratio
n P
rocess
:
T
he re
gistrati
on is a
one
-
t
im
e
pr
oces
s which
h
as
to be
done
at
t
he e
nrollm
ent.
Fin
g
er
p
rint
Miniatu
re
Extractio
n
Vo
ice
Sig
n
atu
re
Face
Fu
sio
n
and
g
en
erate
the
te
m
p
late
Cry
p
to
and
Steg
an
o
-
g
raph
y
Data
Bas
e
Miniatu
re
Extractio
n
Miniatu
re
Extractio
n
Miniatu
re
Extractio
n
Miniatu
re
Extractio
n
Han
d
geo
m
etr
y
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
4
, N
o.
1
,
A
pr
il
201
9
:
462
–
470
466
Au
t
hen
tica
tio
n
Proce
ss
:
th
e
authe
ntica
ti
on
process
is
r
equ
i
red
e
ve
ry
tim
e
the
us
er
needs
to
acce
s
s
the
app
li
cat
io
n.
Figure
6
.
Bl
oc
k diag
ram
o
f
th
e pro
posed
sys
tem
The
Bl
oc
k
dia
gr
am
sh
ow
n
in
Fi
gure
6
in
cl
ud
es
t
he
c
om
bin
at
ion
of
Re
gistrati
on
a
nd
A
uth
e
ntica
ti
on
process
. Th
e pro
posed
syst
e
m
co
ns
ist
s o
f
the foll
ow
i
ng
unit
s.
The
Ac
qu
isi
ti
on
syst
e
m
,
the
Encr
y
ptio
n and
the
D
ecry
ption
(a
re
known
as
Crypto
grap
hy
)
,
em
bed
di
ng
a
nd
the
ex
tract
ing
t
he
i
m
age
(a
re
known
a
s
ste
gano
gr
a
ph
y
)
[
16
]
,
[17]
and
te
m
plate
m
at
ching
f
or
face
ide
ntific
at
ion
.
T
he
syst
e
m
is
integrated
wit
h
fron
t e
nd
GUI.
In this
pro
po
se
d
al
go
rithm
, f
ol
lowing ste
ps
a
re im
ple
m
ente
d.
a.
Face Re
co
gnit
ion usi
ng c
ogni
ti
ve
ser
vices
b.
Crypto
gr
a
phy:
AES
Enc
rypt
io
n
a
nd D
ec
rypti
on u
si
ng .NET
c.
Stegan
ogra
phy an
d De
-
ste
ganogra
ph
y
us
in
g R
Cod
i
ng.
d.
Applic
at
ion I
ntegr
at
io
n
e.
C
orrespo
nd
i
ng U
se
r
I
nter
face
Tech
no
l
og
ie
s
used
for
t
he
im
ple
m
ented
so fa
r
are
m
entione
d belo
w
a.
Mi
cro
s
of
t C
# .
Net
b.
SQ
L
Data
base
c.
R.Net
d.
Crypto
gr
a
phy
AES
-
Ri
j
i
nd
al
e.
Stegan
ogra
phy
-
Ma
trix a
ppr
oa
ch wit
h 3D cha
nn
el
s
3.
RESU
LT
S
&
DISCU
SSI
ONS
3.1
.
Cr
ypt
og
r
ap
h
y
In
t
he
prese
nt
scenari
o
m
os
t
of
t
he
pe
ople
are
ada
ptin
g
onli
ne
s
hoppin
g
and
st
oc
k
tra
ding.
T
hat’s
wh
y
m
os
t
of
the
ap
plica
ti
ons
based
on
int
ern
et
are
em
erg
ed
as
e
-
c
omm
erce
app
li
cat
ion
s
.
Be
cause
of
this
e
m
erg
in
g
onli
ne
m
ark
et
trad
ing
,
t
he
m
on
ey
transacti
ons
a
re
al
so
ta
cki
ng
place
thr
ough
internet
banki
ng
a
nd
el
ect
ro
nic
bill
paym
ent
et
c.
Su
c
h
tra
ns
act
ion
s
,
ov
e
r
wire
or
wireless
public
netw
orks
dem
and
en
d
-
to
-
e
nd
s
ecur
e
c
onnec
ti
on
s,
s
hould
be
co
nf
ide
ntia
l,
to
ensu
re
da
ta
au
thentic
at
ion
,
acc
ountab
il
ity
con
fide
nt
ia
li
t
y,
integrity
an
d
a
vaila
bili
ty
.
All
above
m
entione
d
are
go
i
ng
to
be
pro
vid
e
d
by
a
pr
oce
ss
cal
le
d
as
Crypto
grap
hy
.
Crypto
gr
a
phy
is
a
m
et
ho
d
of
storing
an
d
tra
ns
m
itti
ng
data
in
an
enc
od
e
d
form
at
(u
n
rea
dab
le
f
or
m
)
that
on
ly
read
a
nd
pr
oce
ss
by
the
inten
ded
us
ers
.
The
popu
la
r
data
encr
y
ption
al
go
rithm
s
are
DES
,
Triple
DE
S,
RSA,
AES
,
ECC
,
B
LO
WFISH
,
T
WOFIS
H,
TH
REEFIS
H,
RC
5
an
d
ID
E
A
et
c
.
These
al
gori
thm
s
are
diff
er
base
d
on
t
he
key
,
ci
pher
te
xt
siz
e
a
nd
m
at
he
m
at
ical
transfor
m
at
i
on
s
.
Am
ong
th
ese
we
us
e
AE
S
Algorithm
fo
r
our
syst
e
m
becau
s
e of it
s no
velty
as e
xp
la
ine
d
a
s b
el
ow
.
AES
(
A
dv
a
nce
d
E
nc
ryptio
n
S
ta
nd
a
rd)
:
The
Adva
nced
E
nc
ryptio
n
Stan
da
rd
is
a
re
placem
ent
to
DES
and
3DES
.
AE
S
is
a
sym
m
et
r
i
c
blo
c
k
ci
pher
us
e
d
to
protec
t
sensiti
ve
data
inf
or
m
at
ion
th
rou
ghout
the
world
in
va
rio
us
sec
uri
ty
app
li
cat
io
ns
w
her
e
the
in
f
or
m
at
io
n
is
tra
ns
fe
rr
e
d
thr
ou
gh
wi
re,
as
we
ll
a
s
wireless
.
I
t
al
so
stores
the i
nform
at
ion
f
or
f
ur
t
her p
ro
ce
ssin
g.
AES
is
act
uall
y,
three
bl
ock
ci
ph
e
rs,
AE
S
-
128,
A
ES
-
192
an
d
AES
-
25
6.
Each
ci
pher
e
ncr
y
pts
an
d
decr
y
pts
data
i
n
blo
c
ks
of
12
8
bits
us
i
ng
cr
yptogra
ph
ic
ke
ys
of
12
8
bits,
192
bits
a
nd
256
bits
,
res
pect
ively
.
Accor
ding to
the
key len
gth s
uch as
128bit
s,
192 bits a
nd
256 bit
s
t
he
re
spe
ct
ive roun
ds
a
re
of
10,
12,
14.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Wi
rel
ess sen
s
or d
ata mi
ning f
or
e
-
co
m
merce
app
li
catio
ns
(
T. Sridevi
)
467
The
ba
sic
com
pone
nts
of
Ri
jnd
el
E
ncr
y
ptio
n
an
d
dec
rypti
on
process
wh
i
ch
is
us
e
d
he
re
is
a
si
m
pl
e
m
at
he
m
at
ic
a
l,
log
ic
al
,
an
d
ta
ble
lo
okup
op
e
rati
ons.
It
is
base
d
on
AES
Key
E
xpan
sio
n
in
w
hich
t
he
encr
y
ption
pro
cess
is
a
bit
w
ise
exclusive
OR
op
e
rati
on
of
a
set
of
im
age
pix
el
s
al
ong
with
a
key
wh
ic
h
changes
for ev
ery set
of
pix
el
s in
e
ver
y
r
ound as
sho
wn in Fi
gure
7
.
Fig
ure
7
.
A
b
it
wise e
xclusiv
e
OR ope
rati
on
In
each
case,
a
ll
oth
er
r
ounds
are
i
de
ntica
l,
excep
t
f
or
the
la
st
rou
nd.
Eac
h
rou
nd
in
enc
ryptio
n
proces
s
furthe
r
fo
ll
ows
so
m
e
ste
ps
to
com
plete
eac
h
rou
nd
ti
ll
n.
Each
rou
nd
i
n
encr
y
ptio
n
possess
f
our
ste
ps
i.e.
Substi
tute b
yt
e
, Shift r
ows,
Mi
x
Col
um
n
and Add r
ound
ke
y
as f
ollo
ws
i
n Fi
gure
8.
Figure
8
.
AE
S
a
lgorit
hm
r
ound ste
ps
Substi
tuti
on
B
yt
es
is
a
t
ran
sf
or
m
at
ion
in
th
e
Ci
ph
e
r
that
proces
ses
the
Stat
e
us
in
g
a
nonlinear
byt
e
su
bst
it
ution
ta
ble
(S
-
box)
that
ope
rates
on
each
of
t
he
Stat
e
byte
s
ind
e
pe
ndent
ly
.
Sh
ift
rows
are
a
trans
form
ation
in
the
Ci
ph
er
that
processes
the
Stat
e
by
cycli
cal
ly
sh
ifti
ng
the
la
st
three
ro
w
s
of
the
St
at
e
by
diff
e
re
nt
off
set
s.
Mi
x
c
ol
um
ns
is
a
tra
nsfo
r
m
at
ion
in
t
he
Ci
ph
er
that
ta
ke
s
al
l
of
t
he
co
lum
ns
of
the
S
ta
te
and
m
ixes their
dat
a (inde
pende
ntly
o
f o
ne
a
no
t
he
r)
t
o
pro
du
ce
new col
um
ns
.
Adding
R
ound
Key
is
a
T
ransform
at
ion
in
the
Ci
pher
an
d
Inverse
Ci
pher
in
w
hich
a
Ro
und
Key
i
s
add
e
d
to
the
S
ta
te
us
ing
a
n
XO
R
op
e
rati
on.
T
he
le
ngth
of
a
Ro
und
Ke
y
equ
al
s
the
si
ze
of
the
Stat
e
.
In
t
he
decr
y
ption
exa
ct
ly
inv
erse
th
e
proce
ss
ste
ps
I.
e
Add
r
ou
nd
keys,
I
nv
e
rs
e
m
ix
colum
ns
,
I
nverse
s
hift
rows,
i
nv
e
rse
s
ubsti
tute byt
es a
re
use
d for
getti
ng
the in
ver
se
cip
her.
T
hen the
r
esult wil
l be
as
shown i
n
Fi
g
ure
9.
Fig
ure
9
.
Re
su
l
t of Cry
pt
ogra
ph
y
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
4
, N
o.
1
,
A
pr
il
201
9
:
462
–
470
468
3.2
.
Ste
gan
og
raphy
Im
ages
are
one
of
the
pr
e
ferred
m
edia
to
hi
de
the
in
form
at
ion
due
to
th
ei
r
hi
gh
ca
pacit
y
and
l
ow
i
m
pact
on
t
he
visibil
it
y.
W
e
can
us
e
t
he
c
omm
on
i
m
age
form
at
li
ke
GI
F
(Graphic
s
I
nterc
hange
Form
at
),
BM
P
(
W
i
ndows
Bi
tm
ap)
,
J
PEG
(J
oin
t
Photo
gr
a
phic
E
xpert
Gro
u
p)
et
c.
T
her
e
are
m
any
ap
proac
he
s
to
hid
e
the
im
ages
li
ke
Least
Si
gn
i
ficant
Bi
t
substi
tuti
on
(L
SB),
Transf
or
m
te
chn
i
qu
e
s,
Ma
s
ki
ng
an
d
filt
ering.
We
us
e
bm
p
colo
r
im
ages
with
LSB
te
ch
nique.
L
SB
(L
ea
st
Sign
i
ficant
Bi
t)
Substi
tuti
on
is
the
proc
ess
of
m
od
ify
in
g
the
le
ast
sign
ific
a
nt
bit
of
t
he
pixe
ls
of
the
co
ve
r
m
edia.
LSB
Substi
tuti
on
le
nd
s
it
sel
f
t
o
be
com
e
a
ver
y
powe
rful
Stega
nogr
a
ph
y
m
et
ho
d
with
fe
w
li
m
i
ta
tio
ns.
P
opula
r
s
te
ganogra
ph
ic
too
ls
base
d
on
LS
B
e
m
bed
di
ng
va
r
y
in
their
ap
proach
f
or
hid
in
g
inf
orm
ati
on
.
So
m
e
al
go
rith
m
s
change
LS
B
of
pix
el
s
vis
it
ed
in
a
rand
om
walk,
oth
e
rs
m
od
ify
pix
el
s
in
certai
n
areas
of
im
a
ges,
or
instea
d
of
just
cha
nging
the
la
st
bit
they
increm
ent o
r
dec
rem
ent the pi
xel v
al
ue
.
To
f
or
m
the
ste
go
-
im
age
we
require
tw
o
fil
es,
first
o
ne
is
the
i
m
age
(call
ed
co
ver
im
age)
into
wh
ic
h
the
data
is
to
be
hid
de
n
an
d
s
econd
one
is
th
e
data
file
wh
ic
h
is
to
be
hidden
(ex
:
face
i
m
age)
.
Fig
ure
8
show
s
an
e
xam
ple w
he
re th
e
cove
r
i
m
age is co
m
bin
ed
w
it
h face
im
age to
pro
duce the ste
go
-
im
age.
This su
bs
ti
tuti
on
tec
hn
i
qu
e
w
il
l
m
od
ify
the l
ast
sign
ific
ant
bit of
the c
ov
e
r
i
m
age.
Be
fo
re
e
m
bed
di
ng
process
,
the
syst
e
m
m
us
t
kn
ow
the
siz
e
of
the
co
ver
im
age
file
.
The
sta
nd
a
r
d
siz
e
of
t
his
i
m
age
is
80
0*
600
pix
el
s,
which
c
an
em
bed
up to
60kb s
iz
e
of
m
essage.
In
t
he
L
SB
te
chn
i
qu
e
,
the
LS
B
of
t
he
pix
el
s
is
re
placed
by
the
face
im
ag
e
pix
el
s
.
T
he
f
ace
i
m
age
pix
el
bits
a
re
per
m
uted
be
f
ore
em
bed
ding,
this
has
t
he
eff
ect
of
distribu
ti
ng
th
e
bits
even
ly
,
t
hu
s
on
a
n
aver
a
ge
25
pi
xe
ls
of
co
ver
im
age
co
ntains
two
pix
el
s
of
fa
ce
i
m
age.
Ou
r
op
ti
m
iz
ed
al
go
rithm
wil
l
m
od
ify
the
le
ast
fo
ur
sig
ni
ficant
bits
of
t
he
co
ve
r
im
ag
e.
For
em
bed
di
ng
t
he
face
im
age
into
t
he
co
ver
im
age,
the
cov
e
r
i
m
age
sh
ould
be
great
er
tha
n
or
e
qu
al
to
12.5
ti
m
es
of
the
face
i
m
age
.
So
w
e
us
e
the
fac
e
i
m
ag
e
siz
e
of
60
x
80
x
3
(
14
KB)
an
d
c
ov
e
r
im
age
siz
e
of
75
0
x
1000
x
3(
2197KB
).
Re
s
ults
of
Ste
ganogra
ph
y
a
re
s
how
n
i
n
Figure
10.
Fig
ure
1
0
.
Re
s
ults o
f
Ste
gano
gr
a
phy
:
3.3
.
F
ace
Detec
tion a
nd Re
cog
nitio
n
–
C
ognitive
Web
Services
Mi
cro
s
of
t
C
ogniti
ve
Se
rv
ic
es
le
t
you
buil
d
apps
with
pow
erful
al
gorithm
s
us
i
ng
just
a
f
ew
li
nes
of
cod
e
.
They
w
ork
acr
os
s
de
vic
es
and
platf
orm
s
su
ch
as
iOS,
And
ro
i
d,
an
d
W
in
dows
,
ke
ep
i
m
pr
ovin
g,
and
are
easy
to
set
up.
T
he
Mi
crosof
t
Face
API
,
a
cl
oud
-
base
d
se
rv
ic
e
that
pro
vid
es
the
m
os
t
adv
a
nc
ed
face
al
gorithm
s.
Face
API
has
tw
o
m
ai
n
functi
ons:
face
detect
ion
with
at
trib
utes
an
d
face
r
ecognit
ion.
Fa
ce
API
detect
s
up
to
64
hu
m
an
faces
with
hi
gh
pr
e
ci
sion
face
l
oc
at
ion
i
n
a
n
im
a
ge.
A
nd
the
im
age
ca
n
be
sp
e
ci
fied
by
file
in
bytes
or
valid
UR
L.
Face
rectan
gle
(left,
top,
width
a
nd
he
ig
ht)
ind
ic
at
in
g
the
face
locat
io
n
in
the
i
m
age
is
retur
ned
al
on
g
with
each
detect
ed
face.
Op
ti
onal
ly
,
face
detect
i
on
e
xtracts
a
series
of
face
r
el
at
ed
at
tribu
te
s
su
c
h
as
po
se,
ge
nder,
age
,
hea
d
po
s
e,
f
aci
al
ha
ir
and
glasses.
It
prov
i
des
f
our
face
recog
ni
ti
on
functi
ons
s
uc
h
as
face
ve
rific
at
ion
,
fin
ding
si
m
il
ar
faces,
f
ace
gro
upin
g,
and
pe
rs
on
ide
ntific
at
ion
.
Fac
e
API
ver
ific
at
io
n
pe
rfor
m
s
an
authen
ti
cat
ion
agai
ns
t
two
detect
e
d
faces
or
auth
entic
at
ion
fr
om
on
e
detect
ed
face
to
one
per
s
on
obje
ct
.
W
e
inte
grat
ed
this
cogni
ti
ve
w
eb
ser
vi
ce
with
our
integrate
d
C#.
net
platfor
m
al
on
g
wit
h
the cry
ptogra
phy an
d st
ega
nogr
a
phy m
od
ule
s.
3.4
.
Perf
orm
ance
M
e
trics
False
Acce
pta
nce
Ra
te
(
FAR
)
an
d
False
Re
j
ect
ion
Ra
te
(
FRR
)
are
t
he
2
sta
ndar
d
m
et
rics
us
e
d
t
o
rate
the
pe
rfo
r
m
ance
of
a
bi
om
et
ric
syst
e
m
.
FA
R
is
c
on
si
der
e
d
se
rio
us
i
ssu
e
tha
n
FRR
beca
us
e,
a
uthorizi
ng
an un
-
a
uthoriz
ed pers
onnel is
criti
cal
than
un
-
a
uthorizi
ng
a
n
a
uthorize
d p
erson
nel.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Wi
rel
ess sen
s
or d
ata mi
ning f
or
e
-
co
m
merce
app
li
catio
ns
(
T. Sridevi
)
469
FA
R
of
t
he
sy
stem
with
the
pro
po
se
d
c
ombinati
on
of
t
w
o
bi
om
et
ric
te
c
hn
i
qu
e
s
(C
rypt
ogra
ph
y
a
nd
Stegan
ogra
phy)
can
undo
ub
te
dly
be
le
sser
(
m
uch
cl
os
er
to
zero)
tha
n
tha
t
of
F
AR
of
a
syst
e
m
fu
nctio
ni
ng
with
only
Crypto
gr
a
phy
or
only
Stegan
ogra
ph
y.
A
sim
ple
te
st
ver
ifie
d
t
hat
FA
R
of
t
he
pro
po
se
d
sys
tem
is
cl
os
e to
zer
o.
The
te
st i
s as
foll
ows.
So
m
e
ran
do
m
ste
go
-
enc
rypte
d
i
m
ages
are
con
si
der
e
d.
F
or
exam
ple,
say
i
m
g1
belo
ngs
to
Mr.
A.
I
f
‘A’
us
es
t
he
pro
po
se
d
syst
e
m
,
he
is
authorized
.
N
ow,
the
act
ual
im
age
file
of
‘A’
that
was
us
e
d
f
or
dev
el
op
i
ng
ste
go
-
e
ncr
ypte
d
i
m
age
of
‘
A
’
i
s
ta
ke
n
a
nd
2
bits
in
2
pix
el
s
of
that
im
age
are
c
ha
ng
e
d.
This
change
is
eq
ui
valent
to
the
im
age
of
a
dif
f
eren
t
perso
n
but
with
m
os
t
of
the
sim
il
ar
fe
at
ur
es
e
xpect
t
ho
s
e
2
pix
el
s.
Now
th
e
new
ly
f
or
m
ed
im
age
is
us
ed
wit
h
the
syst
e
m
to
see
if
the
syst
e
m
can
a
uthorize
the
pe
rson.
The
syst
em
end
ed
in
no
t
a
ut
horizi
ng
the
ne
wly
form
ed
im
age
of
‘
A’.
The
sam
e
te
st
has
been
co
nd
ucted
on
the r
em
ai
nin
g
i
m
ages as wel
l and the
res
ults
ho
l
d goo
d for a
ll
tho
se im
ages as
w
el
l.
3.5
.
A
ppli
ca
tion
The
ap
plica
ti
on
is
helpful
to
al
l
secur
it
y
w
ing
s
f
ro
m
the
fina
ncial
sect
or
to
Mi
li
ta
ry
s
ecur
it
y.
Th
e
pro
po
se
d
secu
rity
la
ye
rs
ca
n
be
us
e
d
f
or
any
bio
m
et
ri
c
m
od
al
it
y.
We
can
en
ha
nc
e
the
featur
e
s
of
the
pro
po
se
d
te
ch
niques
f
or
the
Bim
od
al
bio
m
et
ric
authe
ntica
ti
on
syst
em
s.
The
al
gorithm
s
can
be
i
nc
orporate
d
into the
futu
re
up
c
om
ing
tech
no
l
og
ie
s
li
ke
R
obotics as
well
.
4.
CONCL
US
I
O
N
The
propose
d
secur
it
y
la
ye
rs
can
be
us
e
d
f
or
a
ny
bi
om
et
r
ic
m
od
al
it
y
for
any
ty
pe
of
i
nfor
m
at
ion
su
c
h
as
te
xt,
i
m
age,
an
d
au
di
o
/
vid
e
o
file
s.
The
a
ppli
cat
ion
is
help
fu
l
to
al
l
secur
it
y
wi
ng
s
f
r
om
the
finan
ci
al
sect
or
to
Mi
li
ta
ry
secur
it
y.
T
he
syst
e
m
can
e
nh
a
nce
the
fea
tures
of
the
propose
d
te
ch
niques
f
or
t
he
Bi
m
od
al
bio
m
et
ric
auth
entic
at
ion
syst
e
m
s.
The
al
go
r
it
h
m
s
can
be
i
ncor
porated
i
nto
the
fu
t
ur
e
up
com
ing
te
chno
log
ie
s
li
ke
Ro
bo
ti
cs a
s w
el
l
.
REFERE
NCE
S
[1]
Faiz
an
,
A.,
Aa
i
m
a,
N.,
and
Z
e
esha
n,
A.
,
“
Im
age
-
base
d
Fac
e
Dete
c
ti
on
and
Rec
ognition:
St
at
e
of
th
e
Art”
,
Inte
rnational
Jo
urnal
of
Comput
er
Scienc
e
Iss
ue
s,
vol. 9, Issue
6
,
no
1
,
Novem
ber
2012,
[2]
Donn
y
,
J.
O.,
Li
z
a,
P.,
and
L
ei
,
C.
,
”Pre
v
ent
i
ng
Cel
l
Phone
Intrusion
and
T
hef
t
using
Biom
et
ric
s
Fin
ger
p
rint
Biom
et
ric
Se
cur
ity
ut
il
i
zi
ng
Do
ngle
and
Solid
Stat
e
R
el
a
y
T
echnolog
y
”,
IEEE
Sec
urit
y
and
P
rivac
y
Workshops
,
2013.
[3]
Sm
it
a
S.
M.,
Pradn
y
a,
M.
,
and
Shende,
M.
V.
S.,
“
Biom
et
ric
s
Authent
i
ca
t
ion
Te
chn
ique
For
Intrusion
Dete
c
tion
S
y
stems
Us
ing
F
inge
rprin
t
Rec
og
nit
ion”,
Inte
rnat
i
onal
Journal
of
Computer
Sci
en
ce
,
Eng
ineering
and
Information
Technol
ogy
(
IJ
CSEIT)
,
vol.
2,
no.
1,
Februa
r
y
201
2.
[4]
Naga
ra
ju
,
G.,
a
nd
Hy
m
a
L
akshm
i,
T.
V.,
“
I
m
age
enc
r
y
pt
io
n
using
sec
re
t
-
ke
y
images
and
SC
AN
pat
te
rn
s”,
Inte
rnational
Jo
urnal
in Adv
an
c
es
in
Comput
er,
El
e
ct
rica
l,
&
El
ec
tronic
s
Engg.,
vol.
02
,
pp
.
13
-
1
8,
2012
.
[5]
Renu
B.
,
“
Bio
m
et
ric
s
and
Fa
ce
Rec
ogn
it
ion
Te
chni
qu
es”
,
Inte
rnational
Jo
urnal
of
Adv
an
ce
d
Re
s
earc
h
i
n
Computer
Scien
ce
and
So
f
tware Engi
ne
ering,
vol
.
3
,
Iss
ue
5
,
Ma
y
2013.
[6]
Rez
a
,
M.
R.
,
Ab
dolra
hm
an,
A.,
a
nd
Rez
a,
E.
A.,
“
A
New
Fast
and
Sim
ple
Im
age
Enc
r
y
p
ti
on
Algori
thm
Us
ing
Scan
Patt
ern
s
and
XO
R”,
Inte
rnat
iona
l
Journal
of
Signal
Proce
ss
ing,
Image
Proce
ss
ing
and
Pat
te
rn
Re
cogniti
on
vol.
6
,
no.
5
,
PP
:275
-
29
0.
2013
.
[7]
Ramara
ju,
P.
V
.
,
Nag
araju,
G
.
,
and
Cha
itan
y
a
,
R.
K.,
“
Im
age
En
cr
y
pti
on
a
nd
Dec
r
y
pt
ion
using
Advanc
ed
Enc
r
y
pt
ion
Algo
rit
hm
”,
Dis
cove
r
y
,
2015
,
The
Inter
nati
onal
Dail
y j
ournal,
vol
.
29
,
no.
107
,
Pp:2
-
28
,
2015
.
[8]
Sakthi
dasa
n
,
K
.
S.,
and
Santhosh
,
Krishna,
B
.
V.,
“
A New
Chaot
ic
Algorit
hm
for
Im
age
Enc
r
y
pt
io
n
and
Dec
r
y
pt
io
n
of
Digital
Co
lor Im
age
s”,
In
te
rna
ti
onal Journal
o
f
Information
and
Educ
a
ti
on
Te
ch
nology
,
vol
.
1
,
n
o.
2
,
June
2011.
[9]
Rinki
,
P.
,
Vijay
,
K.
T.
,
and
Vin
ee
t
,
R.
,
“
A
Surv
e
y
On
Diffe
r
ent
Im
age
Enc
r
y
pt
i
on
and
Dec
r
y
ption
Te
chni
qu
es”
,
(
IJ
CSIT
)
Inte
rna
ti
onal
Journal
of
Computer
Sci
e
nce
and
Information
Technol
ogi
es,
vol.
4,
no.
1,
pp.
113
–
116,
2013.
[10]
Dr.
Rama
Raj
u
,
P.V.,
Anvesh
Gandhi,
T.,
and
Naga
Ra
ju,
G.
,
“
RGB
Im
age
S
te
g
anogr
aph
y
using
Zi
g
za
g
Pix
e
l
Indic
a
tor
and
Scan
Te
chn
ique
s“
Inte
rnational
Jo
urnal
Of
Re
search
In
El
ectronic
s A
nd
Computer
Engi
ne
ering.,
vol.
3,
Iss
ue
3
,
pp
.
10
3
-
107,
2015.
[11]
Mrs
.
Sridevi
,
T.,
P
hani
ndra
,
S.
S.,
Gudipudi,
B.
,
and
Pancha
kar
la
,
P.,
“
An
Enha
nce
d
Dat
a
Hidi
ng
Te
chni
qu
e
of
Stega
nogra
ph
y
Us
ing
Matri
x
A
pproa
ch
Me
thod
”,
In
te
rnat
ional
j
ournal
of
S
yste
m
s and
Technol
og
ie
s
.
[12]
Sale
h,
S.
,
“
Secu
re
Data
Com
m
unic
a
ti
on
S
y
st
em
Us
ing
Cr
y
ptogr
aph
y
And
Steg
a
nogra
ph
y
”,
In
te
r
nati
onal
Journal
of
Comput
er
N
etwor
ks
&
Com
mu
nic
ati
ons
(
IJ
CNC)
,
vol.
5,
no.
3
,
Ma
y
2013.
[13]
A
biko
y
e
,
O.
C.
,
Adewole
,
K.
S.,
and
Oladi
pupo
,
A.
J.,
”E
fficie
nt
Data
Hiding
S
y
stem
using
C
r
y
ptogr
aph
y
and
Stega
nogra
ph
y
”
,
Inte
rnat
ional
Jo
urnal
of Appl
i
ed Information
Syst
ems (
IJ
AIS)
,
vol. 4, no
.
11
,
2012
.
[14]
Olanr
ewa
ju
,
R.
F.,
and
Azm
an,
A.
W
.
,
“
Inte
ll
i
gent
Cooperativ
e
Adapti
ve
W
eight
Ranki
ng
Policy
vi
a
d
y
n
amic
agi
ng
b
ase
d
on
NB
and
J48
c
la
s
sifie
rs”,
Indone
s
ian
Journal
of
E
le
c
tric
al
Engi
n
e
ering
and
In
formatic
s
(
IJ
EE
I)
,
v
ol.
5,
no
.
4,
357
-
36
5,
2017
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
4
, N
o.
1
,
A
pr
il
201
9
:
462
–
470
470
[15]
Choi,
Y.,
"Cr
y
p
ta
na
l
y
sis
on
Pri
vacy
-
awa
r
e
two
-
fa
ct
or
Auth
ent
i
ca
t
ion
Protocol
for
W
ire
le
ss
Sensor
Networks",
Indone
sian J
our
nal
of
Elec
tric
al
Engi
ne
ering
and
Computer
Sc
ie
n
ce
,
vol
.
8
,
no
.
2
,
pp.
296
-
301
,
20
17.
[16]
Singh,
P.,
and
Chauha
n,
R.
K.
,
"A
Survey
on
Com
par
isons
of
Cry
ptogr
aphic
Algorit
hm
s
Us
ing
C
ert
a
in
Para
m
et
er
s
in
W
SN
.
"
Inte
rn
ati
onal Journal of
E
le
c
tric
al
and
Computer
Eng
i
nee
ring,
vol
.
7
,
no.
4
,
pp
.
2232
,
2017.
[17]
Saxena
,
S.,
“
E
xte
nsion
to
HiRLoc
Algorit
h
m
for
Loc
al
i
z
at
ion
Err
or
Co
m
puta
ti
on
in
W
ire
le
ss
Se
nso
r
Networks”,
Indo
nesian
Journal
o
f
E
le
c
tric
al
Eng
i
nee
ring a
nd
Info
rm
ati
cs
,
vol
.
1
,
n
o.
4
,
pp
.
119
-
12
6,
2013
.
Evaluation Warning : The document was created with Spire.PDF for Python.