Next Article in Journal
Flexible Sensors—From Materials to Applications
Previous Article in Journal
A Pipeline for Rapid Post-Crisis Twitter Data Acquisition, Filtering and Visualization
Article Menu
Issue 2 (June) cover image

Export Article

Open AccessReview

Integration of Biometrics and Steganography: A Comprehensive Review

Security Research Institute, School of Science, Edith Cowan University, Joondalup, WA 6027, Australia
*
Author to whom correspondence should be addressed.
Technologies 2019, 7(2), 34; https://doi.org/10.3390/technologies7020034
Received: 13 February 2019 / Revised: 26 March 2019 / Accepted: 28 March 2019 / Published: 8 April 2019
(This article belongs to the Section Information and Communication Technologies)
  |  
PDF [1246 KB, uploaded 8 April 2019]
  |  

Abstract

The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards. View Full-Text
Keywords: computer security; biometrics; steganography; data security; privacy; access control computer security; biometrics; steganography; data security; privacy; access control
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

McAteer, I.; Ibrahim, A.; Zheng, G.; Yang, W.; Valli, C. Integration of Biometrics and Steganography: A Comprehensive Review. Technologies 2019, 7, 34.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Technologies EISSN 2227-7080 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top