High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Multimodal Biometric Image Security using Steganography and Watermarking


Sonali Kesharwani , SATI Vidisha(M.P.); Neelesh Mehra, SATI Vidisha(M.P.)


Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT), Least Significant Bit (LSB)


Data hiding is the key factor in secure communication today, Because of duplication and data manipulation. With the help of data hiding, that we can make our personal and important data will ensure against activities without authentication. Due to the availability of low-cost editing tools, any user can easily copy, modify, and retransmit digital data over the network. It could also cause a social disorder if digital media content, such as confidential government documents, court evidence or other important information, is maliciously manipulated. To effectively support the growth of multimedia communications, it is essential to develop tools that protect and authenticate digital information. Steganography, watermarking and cryptography of such types of methods are used to hide data in secret communications. In this proposed work use a lossless data hiding technique using watermarking and steganography together, so that achieve high security that provides a higher level of security and authentication of data without loss. Combination of watermarking and steganography techniques used to get multiple layers for hiding personal information. With the help of watermarking algorithm we are embedding the user personal information within the image. The embedding and detection method of the watermark technique used the DWT transformation. Watermarked image and secret image hide within the original cover image through steganography. The most Common use of steganography is to hide a file in another file. Discrete Wavelet Transform (DWT) method is used to obtain frequency domain analysis of the image.

Other Details

Paper ID: IJSRDV5I100463
Published in: Volume : 5, Issue : 10
Publication Date: 01/01/2018
Page(s): 835-840

Article Preview

Download Article