Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 16 , Issue 1 , PP: 99-106, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Biometric Data Securement Using Visual Information Encryption

Sawsan D. Mahmood 1 , Hadeel M Saleh 2 , Asraa Y. Youssef 3 , Lara Ahmad Ghasab Almashagba 4 * , Fathiya Al Abri 5

  • 1 College of Engineering, University of Diyala, Baqubah, Iraq - (pcomp.sawsan.dheyaa@uodiyala.edu.iq)
  • 2 Continuous education center, University of Anbar, Ramadi, Iraq - (haddeel.mohammed@uoanbar.edu.iq)
  • 3 Department of Soil Sciences and Water Resources, College of Agriculture, University of Diyala, Baqubah, Iraq - (asraaalsady@uodiyala.edu.iq)
  • 4 School of Computer Sciences Universiti Sains Malaysia (USM) Penang, Malaysia - (laramashagba@student.usm.my)
  • 5 Department of General Foundation programme, Al Zahra College for women, Muscat , Sultanate of Oman - (abrifathiya@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.160108

    Received: October 30, 2024 Revised: January 23, 2025 Accepted: February 13, 2025
    Abstract

    Biometric data is becoming increasingly valuable because of its uniqueness, and digital watermarking techniques are used to protect it. This paper presents a new method of hiding Palmprint images using wavelet decomposition and Encrypting Visual Information (EVI). EVI is a technique for securing Palmprint print images that has been extensively studied in this report. By embedding the Palmprint image in the cover image, and then using wavelet transformation, this output image can be decomposed into four segments (Segment Low Low, Segment Low High, Segment High Low, and Segment High High). A compressor is placed at the sender site to compress these four segments. DWT is obtained at the receiver side and then the bit-matching procedure is applied to obtain the original palmprint image. Using data concealing and EVI implementations on biometrics, palmprints, and related textual information can be protected from identity fraud. The watermarked cover images and palmprints, which could be used for authentication, have been improved from the existing approach. By reducing the segment size, quality is achieved along with higher security and bandwidth reduction. In addition, the three least significant bits are successfully applied to increase the length of a secret message while retaining palmprint quality.

    Keywords :

    Encrypting Visual Information , Digital watermarking , Palmprint Image (MedImg)

    References

    [1]      S. M. Mohammed and O. Ali, "Human biometric identification: Application and evaluation," IJECS, vol. 6, no. 2, pp. 131-152, 2024.

    [2]      N. Obeid, "On the product and ratio of Pareto and Erlang random variables," Int. J. Math. Stat. Comput. Sci., vol. 1, pp. 33-47, 2023, doi: 10.59543/ijmscs.v1i.7737.

    [3]      S. D. Mahmood, F. Drira, H. F. Mahdi, Y. Aribi, and A. M. Alimi, "Chaotic model-based blind watermarking with LSB technique for digital fundus image authentication," in Proc. 2023 Int. Conf. Cyberworlds (CW), 2023, pp. 395-402, IEEE.

    [4]      A. Anand and A. K. Singh, "An improved DWT–SVD domain watermarking for medical information security," Comput. Commun., vol. 152, pp. 72-80, 2020.

    [5]      S. D. Mahmood, Y. Aribi, F. Drira, and A. M. Alimi, "Secure blind medical image watermarking using hybrid feature extraction techniques," Iraqi J. Comput. Sci. Math., vol. 5, no. 4, pp. 15, 2024.

    [6]      H. J. Hadi, Y. Cao, K. U. Nisa, A. M. Jamil, and Q. Ni, "A comprehensive survey on security, privacy issues and emerging defense technologies for UAVs," J. Netw. Comput. Appl., vol. 213, p. 103607, 2023.

    [7]      F. Kahlessenane, A. Khaldi, R. Kafi, and S. Euschi, "A DWT-based watermarking approach for medical image protection," J. Ambient Intell. Humaniz. Comput, vol. 12, no. 2, pp. 2931–2938, 2021.

    [8]      K. Fares, A. Khaldi, R. Redouane, and E. Salah, "DCT&DWT based watermarking scheme for medical information security," Biomed. Signal Process. Control, vol. 66, p. 102403, 2021.

    [9]      Z. Yuan, Q. S. Liu, D. Zhang, and T. Yao, "Fast and robust image watermarking method in the spatial domain," IET Image Process., vol. 14, no. 15, pp. 3829–3838, 2020.

    [10]   S. Singh, V. S. Rathore, R. Singh, and M. K. Singh, "Hybrid semi-blind image watermarking in redundant wavelet domain," Multimed. Tools Appl., vol. 76, no. 18, pp. 19113–19137, 2017.

    [11]   A. K. Singh, B. Kumar, M. Dave, and A. Mohan, "Multiple watermarking on medical images using selective discrete wavelet transform coefficients," J. Med. Imaging Health Inform., vol. 5, no. 3, pp. 607–614, 2015.

    [12]   A. K. Singh, M. Dave, and A. Mohan, "Hybrid technique for robust and imperceptible multiple watermarking using medical images," Multimed. Tools Appl., vol. 75, no. 14, pp. 8381–8401, 2016.

    [13]   A. K. Singh, "Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images," Multimed. Tools Appl., vol. 76, no. 6, pp. 8881–8900, 2017.

    [14]   C. Kumar, A. K. Singh, and P. Kumar, "Improved wavelet-based image watermarking through SPIHT," Multimed. Tools Appl., vol. 79, no. 15, pp. 11069–11082, 2020.

    [15]   P. Khare and V. K. Srivastava, "A secured and robust medical image watermarking approach for protecting integrity of medical images," Trans. Emerg. Telecommun. Technol., vol. 32, no. 2, p. e3918, 2021.

    [16]   M. Cedillo-Hernandez, A. Cedillo-Hernandez, M. Nakano-Miyatake, and H. Perez-Meana, "Improving the management of medical imaging by using robust and secure dual watermarking," Biomed. Signal Process. Control, vol. 56, p. 101695, 2020.

    [17]   A. Kannammal and S. Subha Rani, "Two-level security for medical images using watermarking/encryption algorithms," Int. J. Imaging Syst. Technol., vol. 24, no. 1, pp. 111–120, 2014.

    [18]   R. Mehta, N. Rajpal, and V. P. Vishwakarma, "A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform," Int. J. Mach. Learn. Cybern., vol. 82, pp. 379–395, 2017.

    [19]   S. Sharma, J. J. Zou, and G. Fang, "Significant difference-based watermarking in multitoned images," Electron. Lett, vol. 56, no. 18, pp. 923–926, 2020.

    [20]   B. Yang, Z. Zhang, and J. Ma, "Wavelet-based normalized flow for anomaly detection in photovoltaic electroluminescent with non-stationary textures," IEEE Sensors J., 2024, doi: 10.1109/JSEN.2024.3134567.

    [21]   K. M. Hosny and M. M. Darwish, "Invariant image watermarking using accurate polar harmonic transforms," Comput. Electr. Eng., vol. 62, pp. 429–447, 2017.

    [22]   K. M. Hosny and M. M. Darwish, "Robust color image watermarking using invariant quaternion Legendre–Fourier moments," Multimed. Tools Appl., vol. 77, no. 19, pp. 24727–24750, 2018.

    [23]   K. M. Hosny, M. M. Darwish, "New geometrically invariant multiple zero-watermarking algorithm for color medical images," Biomed. Signal Process. Control, vol. 70, p. 103007, 2021.

    [24]   K. M. Hosny, M. M. Darwish, K. Li, and A. Salah, "Parallel multi-core CPU and GPU for fast and robust medical image watermarking," IEEE Access, vol. 6, pp. 77212–77225, 2018.

    [25]   F. H. Al-Rubbiay, A. Y. Youssef, and S. D. Mahmood, "Medical image authentication and restoration based on mCloud computing: Towards reliant medical digitization era," in Doctoral Symp. Comput. Intell., Singapore: Springer Nature, 2023, pp. 487-500.

    Cite This Article As :
    D., Sawsan. , M, Hadeel. , Y., Asraa. , Ahmad, Lara. , Al, Fathiya. Biometric Data Securement Using Visual Information Encryption. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 99-106. DOI: https://doi.org/10.54216/JCIM.160108
    D., S. M, H. Y., A. Ahmad, L. Al, F. (2025). Biometric Data Securement Using Visual Information Encryption. Journal of Cybersecurity and Information Management, (), 99-106. DOI: https://doi.org/10.54216/JCIM.160108
    D., Sawsan. M, Hadeel. Y., Asraa. Ahmad, Lara. Al, Fathiya. Biometric Data Securement Using Visual Information Encryption. Journal of Cybersecurity and Information Management , no. (2025): 99-106. DOI: https://doi.org/10.54216/JCIM.160108
    D., S. , M, H. , Y., A. , Ahmad, L. , Al, F. (2025) . Biometric Data Securement Using Visual Information Encryption. Journal of Cybersecurity and Information Management , () , 99-106 . DOI: https://doi.org/10.54216/JCIM.160108
    D. S. , M H. , Y. A. , Ahmad L. , Al F. [2025]. Biometric Data Securement Using Visual Information Encryption. Journal of Cybersecurity and Information Management. (): 99-106. DOI: https://doi.org/10.54216/JCIM.160108
    D., S. M, H. Y., A. Ahmad, L. Al, F. "Biometric Data Securement Using Visual Information Encryption," Journal of Cybersecurity and Information Management, vol. , no. , pp. 99-106, 2025. DOI: https://doi.org/10.54216/JCIM.160108