Next Article in Journal
Flexible Sensors—From Materials to Applications
Previous Article in Journal
A Pipeline for Rapid Post-Crisis Twitter Data Acquisition, Filtering and Visualization
Open AccessReview

Integration of Biometrics and Steganography: A Comprehensive Review

Security Research Institute, School of Science, Edith Cowan University, Joondalup, WA 6027, Australia
Author to whom correspondence should be addressed.
Technologies 2019, 7(2), 34;
Received: 13 February 2019 / Revised: 26 March 2019 / Accepted: 28 March 2019 / Published: 8 April 2019
(This article belongs to the Section Information and Communication Technologies)
The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards. View Full-Text
Keywords: computer security; biometrics; steganography; data security; privacy; access control computer security; biometrics; steganography; data security; privacy; access control
Show Figures

Figure 1

MDPI and ACS Style

McAteer, I.; Ibrahim, A.; Zheng, G.; Yang, W.; Valli, C. Integration of Biometrics and Steganography: A Comprehensive Review. Technologies 2019, 7, 34.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop