Loading

Securing Images with Fingerprint Data using Steganography and Blockchain
S. Pramothini1, Y.V.V.S. Sai Pavan2, N. Harini3

1S. Pramothini, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
2Y.V.V.S. Sai Pavan, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
3N. Harini, Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore (Tamil Nadu), India.
Manuscript received on 13 December 2018 | Revised Manuscript received on 25 December 2018 | Manuscript Published on 24 January 2019 | PP: 82-85 | Volume-7 Issue-4S2 December 2018 | Retrieval Number: Es2042017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Innovation of technology and the availability of fast Internet makes information distribution over the world easy and economical. This has attracted many adversaries who work for stealing and tampering the privacy and the works of legitimate users. Steganography and digital watermarking techniques have been continuously adopted in research for enhancing the security of data, specifically images. Recent research has shown the ability of blockchain to play an integral role in storage and distribution of medical images in a more secure fashion. With the aim of verifying the suitability of blockchains to offer an efficient and autonomous mechanism for securing images. A scheme that uses steganography to ensure confidentiality and blockchains to ensure non-repudiation is presented in this paper. Detailed experimentation brought out the ability of the proposed scheme in terms of enhancing the security compared to existing schemes in the literature.
Keywords: Blockchain, Non-repudiation, Hash, Steganography, Fingerprint.
Scope of the Article: Image Security