Abstract
Providing biometric data through multimedia has made it difficult to ensure secure communication and authentication in the digital age. This research showcases an advanced dual-biometric steganographic system that incorporates signature and fingerprint characteristics in a single cover image using Discrete Wavelet Transform (DWT) and Disputed Cosine Transform (DCT). An Adaptive Bit Placement (ABP) approach is proposed, which intelligently selects embedding positions by considering coefficient significance and biometric importance to balance imperceptibility, robustness, and embedding.To verify its efficacy, the system was compared to standard benchmark images and provided with live biometric data samples. The experimental outcomes demonstrate that the proposed ABP-based Dual Biometric Steganography (ABPDBS) is significantly superior to current methods. While the current methods show Peak Signal to Noise Ratio (PSNR) values between 34 and 39 dB and Structural Similarity Index Measurement (SSIM) scores between 0.90 and 0.96, and embedding capacities below 0.30 bpp, the proposed approach yields average PSNR improvements of 22–36% (47.31-50.76dB), mean value of SSIM improvements of 2–11% (0.9748 with maximum reach to 0.9995) and an embedding capacity increases of 16% (0.33 bpp). Proposed method also provides overall better integration performance in these new techniques than those previously described. These results imply that the system is highly imperceptible; resilient to typical signal processing attacks, and has greater payload strength. In general, this research presents a secure and efficient framework for dual-biometric embedding which can enhance multimodal authentication systems suitable for high-security scenarios.
Data availability
The dataset supporting the findings of our research has been deposited in a publicly accessible GitHub repository. The direct link is provided below: GitHub Repository Link: [https://github.com/AbhrenduBhattacharya/Adaptive-bit-placement-for-Dual-Biometry](https:/github.com/AbhrenduBhattacharya/Adaptive-bit-placement-for-Dual-Biometry).
References
Shuyi, L., Lunke, F., Zhang, B., Ning, X. & Wu Lifang., Hand-based multimodal biometric fusion: A review. Information Fusion. 109. 102418. https://doi.org/10.1016/j.inffus.2024.102418 (2024).
Xing, J., Jia, Y., Cui, Z. & Su, F. Unsupervised fingerprint registration: A reinforcement learning approach. In: (eds Yu, S. et al.) Biometric Recognition. CCBR 2024. Lecture Notes in Computer Science, vol 15352. Springer, https://doi.org/10.1007/978-981-96-1068-6_12. (2024).
Jaiswal, P. & Namboodiri, A. Enhancing face quality assessment through age and expression analysis. ICVGIP ‘24: Proc. Fifteenth Indian Conf. Comput. Vis. Graphics Image Process., 1–9. https://doi.org/10.1145/3702250.3702251 (2023).
Ahamed, F., Farid, F., Suleiman, B., Jan, Z. & Wahsheh, L. Shahrestani, Seyed., an intelligent multimodal biometric authentication model for personalised healthcare services. Future Internet. 14 (222). https://doi.org/10.3390/fi14080222 (2022).
Mokashi, B. et al. Stalin, efficient hybrid blind watermarking in DWT-DCT-SVD with dual biometric features for images. Contrast Media Mol. Imaging. 2918126 (14). https://doi.org/10.1155/2022/2918126 (2022).
Jiang, D. et al. Enhanced authentication system based on Iris and ECG Descriptors, in IEEE sensors journal, 22, 19, pp. 19000–19009, https://doi.org/10.1109/JSEN.2022.3198645 (2022).
Cherifi, F., Amroun, A. & Oma, M. Robust multimodal biometric authentication on IoT device through ear shape and arm gesture. Multimedia Tools Appl. 80, 14807–14827 (2022).
Arora, S., Bhatia, S. & Kukreja, M. A. A multimodal biometric system for secure user identification based on deep learning, Proceedings of Fifth International Congress on Information and Communication Technology: ICICT 2020, Vol. 1, Springer, London, pp. 95–103, (2021).
El_Rahman, S. A. Multimodal biometric systems based on different fusion levels of ECG and fingerprint using different classifiers. Soft. Comput. 24, 12599–12632 (2020).
Daas, S. et al. Multimodal biometric recognition systems using deep learning based on the finger vein and finger knuckle print fusion. IET Picture Process. 14 (15), 3859–3868 (2020).
Shaheed, K. et al. A systematic review on physiological-based biometric recognition systems: current and future trends,Arch. Computational Methods Eng., pp. 1–44, (2021).
Dargan, S. & Kumar, M. A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst. Appl. 143, 113114 (2020).
Minaee, S., Abdolrashidi, A., Su, H., Bennamoun, M. & Zhang, D. Biometrics recognition using deep learning: A survey, Artificial Intelligence Review, pp.1–49, (2023).
Abdulrahman, S. A. & Alhayani, B. A comprehensive survey on the biometric systems based on physiological and behavioural characteristics, Mater. Today: Proc. 80, pp.2642–2646, (2023).
Chiroma, H. Deep learning algorithms based fingerprint authentication: systematic literature review. J. Artif. Intell. Syst. 3 (1), 157–197 (2021).
Bala, N., Gupta, R. & Kumar, A. Multimodal biometric system based on fusion techniques: A review. Inform. Secur. Journal: Global Perspective. 31 (3), 289–337 (2022).
Uwaechia, A. N. & Ramli, D. A. A comprehensive survey on ECG signals as new biometric modality for human authentication, recent advances and future challenges. IEEE Access. 9, 97760–99780 (2021).
Mane, V. M. & Jadhav, D. V. Review of multimodal biometrics: Applications, challenges and research areas. Int. J. Biometrics Bioinf. (IJBB). 3 (5), 90–95 (2009).
Bhattacharyya, D., Ranjan, R., Alisherov, F. & Choi, M. Biometric authentication: A review. Int. J. u-and e-Service Sci. Technol. 2 (3), 13–28 (2009).
Unar, J., Seng, W. C. & Abbasi, A. A review of biometric technology along with trends and prospects. Pattern Recogn. 47 (8), 2673–2688 (2014).
Bhattacharya, A. & Patil, M. E. Hybrid Transform Technique for Robust Steganography on Red Component, International Journal on Recent and Innovation Trends in Computing and Communication, 11, Issue: 9s, pp.993–1001, (2023).
Alsaadi, I. M. Physiological biometric authentication systems, advantages, disadvantages and future development A review. Int. J. Sci. Technol. Res. 4 (12), 285–289 (2015).
Syazana-Itqan, K., Syafeeza, V., Saad, N., Hamid, N. A. & Saad, W. A review of finger-vein biometric identification approaches. Indian J. Sci. Technol. 9 (32), 1–9 (2017).
Galdámez, P. L., Raveane, W. & Arrieta, V. A brief review of the ear recognition process using deep neural networks. J. Appl. Log. 24, 62–70 (2017).
Singh, J. P., Jain, S., Arora, S. & Singh, U. P. A survey of behavioral biometric gait recognition: current success and future perspectives. Arch. Comput. Methods Eng. 28, 107–148 (2021).
Wang, Z. & Zhu., Y. J. Review of ear biometrics. Arch. Comput. Methods Eng. 28, 149–180 (2021).
Kortli, Y., Jridi, M., Al Falou, A. & Atri, M. Face recognition systems: A survey. Sensors 20 (2), 342 (2020).
Diab, M. O., Seif, A., Sabbah, M., El-Abed, M. & Aloulou, N. A review on ecg-based biometric authentication systems, hidden biometrics. When Biometric Secur. Meets Biomedical Eng., pp.17–44, (2020).
Jakobsson, M., Jakobsson, M. & Dhiman, M. The benefits of understanding passwords, Mobile Authentication, Problems and Solutions, pp. 5–24, (2013).
Gupta, B. et al. Machine learning and smart card based two-factor authentication scheme for preserving anonymity in Telecare medical information system (TMIS). Neural Comput. Appl. 35 (7), 5055–5080 (2023).
Khan, M. A., Alhakami, H., Alhakami, W., Shvetsov, A. V. & Ullah, I. A smart card-based two-factor mutual authentication scheme for efficient deployment of an IoT-based Telecare medical information system. Sensors 23 (12), pp5419 (2023).
Das, A. K. & Goswami, A. A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ. – Comput. Inform. Sci. 27 (2), 193–210 (2015).
Mustafa, M. A., Abidin, A. & Rúa, E. A. Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions (arXiv preprint arXiv, 2018).
Zhang, F., Kondoro, A., Muftic, S. & Communications Location-based authentication and authorization using smart phones, 2012 IEEE 11th International Conference on Trust, Security Privacy Computing IEEE, pp. 1285–1292, (2012).
Singh, A., Chatterjee, K. & Lobac A secure location-based access control model for e-healthcare system, Advances in Machine Learning and Computational Intelligence: Proceedings of ICMLCI 2019, Springer, pp. 621–628. (2021).
Hernández-Álvarez, L., Fuentes, J. M., De., González-Manzano, L. & Encinas, L. H. SmartCAMPP-smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognit. Lett. 147, 189–196 (2021).
Luo, Y. Y., Cheung, S. C. S., Lazzeretti, R., Pignata, T. & Barni, M. Anonymous subject identification and privacy information management in video surveillance. Int. J. Inf. Secur. 17, 261–278 (2018).
Bera, B., Das, A. K., Balzano, W. & Medaglia, C. M. On the design of biometric-based user authentication protocol in smart City environment. Pattern Recognit. Lett. 138 (20), 439–446 (2020).
Negri, N. A. R., Borille, G. M. R. & Falcão, G. A. Acceptance of biometric technology in airport check-in. J. Air Transp. Manage. 81,101720, (2019).
Bawa, V. Framework to understand and deploy AI-based smart CRM in the airline industry, In: Adoption and Implementation of AI in Customer Relationship Management, IGI Global, pp. 154–165, (2022).
Solano, J. et al. Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications. Int. J. Inf. Secur. 20 (2), 181–197 (2021).
Sahu, A. K. & Sahu, M. Digital image steganography and steganalysis: A journey of the past three decades Open Computer Science, vol. 10, no. 1, pp. 296–342. https://doi.org/10.1515/comp-2020-0136 (2020).
Acknowledgements
The data sets used from sipi data sets available under miscellaneous section of https://sipi.usc.edu/database/database.php?volume=misc%26image=10#top. USC –SIPI Image Database Volume 3. This article does not contain any studies involving human participants, animals, or sensitive personal data performed by any of the authors. Therefore, ethical approval and informed consent were not required for this research.
Author information
Authors and Affiliations
Contributions
Author 1 Contribution: Dr. Abhrendu Bhattacharya was the leader of the conceptualization and design of the proposed adaptive bit placement algorithm and its applications to dual biometric steganography. The embedding and extraction under the hybrid DWT-DCT transform domain was thus a key focus area of Dr. Bhattacharya. He supervised the experimental setup, guided the performance evaluation through PSNR, SSIM, and capacity metrics, and co-supervised the integration of biometric modalities (signature and fingerprint) within the steganographic flow. Dr. Bhattacharya was also responsible for drafting the manuscript, interpreting the results, and ensuring the research met the standards of scientific integrity and originality.Author 2 Contribution: Dr. Amit R. Welekar gave expert guidance on the theoretical framework and mathematical modeling aspects of the hybrid DWT-DCT transform implemented in the steganographic procedure. He backed the validation of the algorithm against various test cases and helped in fine-tuning the strategy for adaptive embedding to ensure higher fidelity and robustness. Dr. Welekar also delved into the related study literature to provide an exhaustive background for the study and assisted with proofreading of the final manuscript so as to elevate clarity, structure, and academic tone.Author 3 Contribution: Dr. Paramita Sarkar made significant contributions during the biometric data acquisition and preprocessing stages. She focused on fine-tuning the extraction of fingerprint and signature features for steganographic embedding. Additionally, she was instrumental in implementing the algorithm using Python and contributed to the visual analysis, which included comparing histograms and evaluating stego-cover images. Dr. Sarkar also took a leading role in compiling the experimental results, creating graphs and radar plots, and aiding in the interpretation of performance metrics to draw meaningful insights.Author 4 Contribution: Dr. Rajesh Bose was involved in algorithm optimization, including proper fine-tuning of the adaptive bit placement for the sake of robustness and imperceptibility. He contributed valuable insights into the processing of biometric data and the selection of preprocessing techniques to improve the embedding fidelity. Dr. Bose contributed to data analysis, performance comparison vis-à-vis old methodologies, and enhancement of the visual assessment process through, for example, histograms and radar charts. He also reviewed and edited the manuscript to test for technical accuracy, consistency, and alignment with publication standards.Author 5 Contribution: Dr. Sandip Roy contributed to the technical design, refinement, and validation of the Adaptive Bit Placement framework for dual-biometric steganography. He assisted in methodological optimization and supported result interpretation to strengthen system performance evaluation. His inputs significantly enhanced the robustness and scientific accuracy of the proposed model.Author 6 Contribution: Achyut Mitra played a key role in bringing the adaptive bit placement algorithm to life through the hybrid DWT-DCT technique. He took the lead in developing and testing Python-based steganography modules that allowed for the embedding and extraction of dual biometric data. Beyond that, Achyut was instrumental in data collection, overseeing experimental runs, and creating insightful visualizations like radar charts and histograms. He also lent a hand in compiling references and formatting the manuscript for submission, ensuring everything was polished and ready to go.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Bhattacharya, A., Welekar, A.R., Sarkar, P. et al. Adaptive bit placement for dual biometric using signature and finger print for DWT-DCT picture steganography. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37827-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-37827-x