Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Adaptive bit placement for dual biometric using signature and finger print for DWT-DCT picture steganography
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 13 February 2026

Adaptive bit placement for dual biometric using signature and finger print for DWT-DCT picture steganography

  • Abhrendu Bhattacharya  ORCID: orcid.org/0009-0009-8549-10241,
  • Amit R. Welekar  ORCID: orcid.org/0000-0003-2939-98552,
  • Paramita Sarkar  ORCID: orcid.org/0000-0002-2330-84841,
  • Rajesh Bose  ORCID: orcid.org/0000-0002-0967-455X2,
  • Sandip Roy  ORCID: orcid.org/0000-0002-5447-803X1 &
  • …
  • Achyut Mitra  ORCID: orcid.org/0009-0004-2163-30901 

Scientific Reports , Article number:  (2026) Cite this article

  • 616 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Providing biometric data through multimedia has made it difficult to ensure secure communication and authentication in the digital age. This research showcases an advanced dual-biometric steganographic system that incorporates signature and fingerprint characteristics in a single cover image using Discrete Wavelet Transform (DWT) and Disputed Cosine Transform (DCT). An Adaptive Bit Placement (ABP) approach is proposed, which intelligently selects embedding positions by considering coefficient significance and biometric importance to balance imperceptibility, robustness, and embedding.To verify its efficacy, the system was compared to standard benchmark images and provided with live biometric data samples. The experimental outcomes demonstrate that the proposed ABP-based Dual Biometric Steganography (ABPDBS) is significantly superior to current methods. While the current methods show Peak Signal to Noise Ratio (PSNR) values between 34 and 39 dB and Structural Similarity Index Measurement (SSIM) scores between 0.90 and 0.96, and embedding capacities below 0.30 bpp, the proposed approach yields average PSNR improvements of 22–36% (47.31-50.76dB), mean value of SSIM improvements of 2–11% (0.9748 with maximum reach to 0.9995) and an embedding capacity increases of 16% (0.33 bpp). Proposed method also provides overall better integration performance in these new techniques than those previously described. These results imply that the system is highly imperceptible; resilient to typical signal processing attacks, and has greater payload strength. In general, this research presents a secure and efficient framework for dual-biometric embedding which can enhance multimodal authentication systems suitable for high-security scenarios.

Data availability

The dataset supporting the findings of our research has been deposited in a publicly accessible GitHub repository. The direct link is provided below: GitHub Repository Link: [https://github.com/AbhrenduBhattacharya/Adaptive-bit-placement-for-Dual-Biometry](https:/github.com/AbhrenduBhattacharya/Adaptive-bit-placement-for-Dual-Biometry).

References

  1. Shuyi, L., Lunke, F., Zhang, B., Ning, X. & Wu Lifang., Hand-based multimodal biometric fusion: A review. Information Fusion. 109. 102418. https://doi.org/10.1016/j.inffus.2024.102418 (2024).

  2. Xing, J., Jia, Y., Cui, Z. & Su, F. Unsupervised fingerprint registration: A reinforcement learning approach. In: (eds Yu, S. et al.) Biometric Recognition. CCBR 2024. Lecture Notes in Computer Science, vol 15352. Springer, https://doi.org/10.1007/978-981-96-1068-6_12. (2024).

  3. Jaiswal, P. & Namboodiri, A. Enhancing face quality assessment through age and expression analysis. ICVGIP ‘24: Proc. Fifteenth Indian Conf. Comput. Vis. Graphics Image Process., 1–9. https://doi.org/10.1145/3702250.3702251 (2023).

    Google Scholar 

  4. Ahamed, F., Farid, F., Suleiman, B., Jan, Z. & Wahsheh, L. Shahrestani, Seyed., an intelligent multimodal biometric authentication model for personalised healthcare services. Future Internet. 14 (222). https://doi.org/10.3390/fi14080222 (2022).

  5. Mokashi, B. et al. Stalin, efficient hybrid blind watermarking in DWT-DCT-SVD with dual biometric features for images. Contrast Media Mol. Imaging. 2918126 (14). https://doi.org/10.1155/2022/2918126 (2022).

  6. Jiang, D. et al. Enhanced authentication system based on Iris and ECG Descriptors, in IEEE sensors journal, 22, 19, pp. 19000–19009, https://doi.org/10.1109/JSEN.2022.3198645 (2022).

  7. Cherifi, F., Amroun, A. & Oma, M. Robust multimodal biometric authentication on IoT device through ear shape and arm gesture. Multimedia Tools Appl. 80, 14807–14827 (2022).

    Google Scholar 

  8. Arora, S., Bhatia, S. & Kukreja, M. A. A multimodal biometric system for secure user identification based on deep learning, Proceedings of Fifth International Congress on Information and Communication Technology: ICICT 2020, Vol. 1, Springer, London, pp. 95–103, (2021).

  9. El_Rahman, S. A. Multimodal biometric systems based on different fusion levels of ECG and fingerprint using different classifiers. Soft. Comput. 24, 12599–12632 (2020).

    Google Scholar 

  10. Daas, S. et al. Multimodal biometric recognition systems using deep learning based on the finger vein and finger knuckle print fusion. IET Picture Process. 14 (15), 3859–3868 (2020).

    Google Scholar 

  11. Shaheed, K. et al. A systematic review on physiological-based biometric recognition systems: current and future trends,Arch. Computational Methods Eng., pp. 1–44, (2021).

  12. Dargan, S. & Kumar, M. A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst. Appl. 143, 113114 (2020).

    Google Scholar 

  13. Minaee, S., Abdolrashidi, A., Su, H., Bennamoun, M. & Zhang, D. Biometrics recognition using deep learning: A survey, Artificial Intelligence Review, pp.1–49, (2023).

  14. Abdulrahman, S. A. & Alhayani, B. A comprehensive survey on the biometric systems based on physiological and behavioural characteristics, Mater. Today: Proc. 80, pp.2642–2646, (2023).

  15. Chiroma, H. Deep learning algorithms based fingerprint authentication: systematic literature review. J. Artif. Intell. Syst. 3 (1), 157–197 (2021).

    Google Scholar 

  16. Bala, N., Gupta, R. & Kumar, A. Multimodal biometric system based on fusion techniques: A review. Inform. Secur. Journal: Global Perspective. 31 (3), 289–337 (2022).

    Google Scholar 

  17. Uwaechia, A. N. & Ramli, D. A. A comprehensive survey on ECG signals as new biometric modality for human authentication, recent advances and future challenges. IEEE Access. 9, 97760–99780 (2021).

    Google Scholar 

  18. Mane, V. M. & Jadhav, D. V. Review of multimodal biometrics: Applications, challenges and research areas. Int. J. Biometrics Bioinf. (IJBB). 3 (5), 90–95 (2009).

    Google Scholar 

  19. Bhattacharyya, D., Ranjan, R., Alisherov, F. & Choi, M. Biometric authentication: A review. Int. J. u-and e-Service Sci. Technol. 2 (3), 13–28 (2009).

    Google Scholar 

  20. Unar, J., Seng, W. C. & Abbasi, A. A review of biometric technology along with trends and prospects. Pattern Recogn. 47 (8), 2673–2688 (2014).

    Google Scholar 

  21. Bhattacharya, A. & Patil, M. E. Hybrid Transform Technique for Robust Steganography on Red Component, International Journal on Recent and Innovation Trends in Computing and Communication, 11, Issue: 9s, pp.993–1001, (2023).

  22. Alsaadi, I. M. Physiological biometric authentication systems, advantages, disadvantages and future development A review. Int. J. Sci. Technol. Res. 4 (12), 285–289 (2015).

    Google Scholar 

  23. Syazana-Itqan, K., Syafeeza, V., Saad, N., Hamid, N. A. & Saad, W. A review of finger-vein biometric identification approaches. Indian J. Sci. Technol. 9 (32), 1–9 (2017).

    Google Scholar 

  24. Galdámez, P. L., Raveane, W. & Arrieta, V. A brief review of the ear recognition process using deep neural networks. J. Appl. Log. 24, 62–70 (2017).

    Google Scholar 

  25. Singh, J. P., Jain, S., Arora, S. & Singh, U. P. A survey of behavioral biometric gait recognition: current success and future perspectives. Arch. Comput. Methods Eng. 28, 107–148 (2021).

    Google Scholar 

  26. Wang, Z. & Zhu., Y. J. Review of ear biometrics. Arch. Comput. Methods Eng. 28, 149–180 (2021).

    Google Scholar 

  27. Kortli, Y., Jridi, M., Al Falou, A. & Atri, M. Face recognition systems: A survey. Sensors 20 (2), 342 (2020).

    Google Scholar 

  28. Diab, M. O., Seif, A., Sabbah, M., El-Abed, M. & Aloulou, N. A review on ecg-based biometric authentication systems, hidden biometrics. When Biometric Secur. Meets Biomedical Eng., pp.17–44, (2020).

  29. Jakobsson, M., Jakobsson, M. & Dhiman, M. The benefits of understanding passwords, Mobile Authentication, Problems and Solutions, pp. 5–24, (2013).

  30. Gupta, B. et al. Machine learning and smart card based two-factor authentication scheme for preserving anonymity in Telecare medical information system (TMIS). Neural Comput. Appl. 35 (7), 5055–5080 (2023).

    Google Scholar 

  31. Khan, M. A., Alhakami, H., Alhakami, W., Shvetsov, A. V. & Ullah, I. A smart card-based two-factor mutual authentication scheme for efficient deployment of an IoT-based Telecare medical information system. Sensors 23 (12), pp5419 (2023).

    Google Scholar 

  32. Das, A. K. & Goswami, A. A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ. – Comput. Inform. Sci. 27 (2), 193–210 (2015).

    Google Scholar 

  33. Mustafa, M. A., Abidin, A. & Rúa, E. A. Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions (arXiv preprint arXiv, 2018).

  34. Zhang, F., Kondoro, A., Muftic, S. & Communications Location-based authentication and authorization using smart phones, 2012 IEEE 11th International Conference on Trust, Security Privacy Computing IEEE, pp. 1285–1292, (2012).

  35. Singh, A., Chatterjee, K. & Lobac A secure location-based access control model for e-healthcare system, Advances in Machine Learning and Computational Intelligence: Proceedings of ICMLCI 2019, Springer, pp. 621–628. (2021).

  36. Hernández-Álvarez, L., Fuentes, J. M., De., González-Manzano, L. & Encinas, L. H. SmartCAMPP-smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognit. Lett. 147, 189–196 (2021).

    Google Scholar 

  37. Luo, Y. Y., Cheung, S. C. S., Lazzeretti, R., Pignata, T. & Barni, M. Anonymous subject identification and privacy information management in video surveillance. Int. J. Inf. Secur. 17, 261–278 (2018).

    Google Scholar 

  38. Bera, B., Das, A. K., Balzano, W. & Medaglia, C. M. On the design of biometric-based user authentication protocol in smart City environment. Pattern Recognit. Lett. 138 (20), 439–446 (2020).

    Google Scholar 

  39. Negri, N. A. R., Borille, G. M. R. & Falcão, G. A. Acceptance of biometric technology in airport check-in. J. Air Transp. Manage. 81,101720, (2019).

  40. Bawa, V. Framework to understand and deploy AI-based smart CRM in the airline industry, In: Adoption and Implementation of AI in Customer Relationship Management, IGI Global, pp. 154–165, (2022).

  41. Solano, J. et al. Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications. Int. J. Inf. Secur. 20 (2), 181–197 (2021).

    Google Scholar 

  42. Sahu, A. K. & Sahu, M. Digital image steganography and steganalysis: A journey of the past three decades Open Computer Science, vol. 10, no. 1, pp. 296–342. https://doi.org/10.1515/comp-2020-0136 (2020).

Download references

Acknowledgements

The data sets used from sipi data sets available under miscellaneous section of https://sipi.usc.edu/database/database.php?volume=misc%26image=10#top. USC –SIPI Image Database Volume 3. This article does not contain any studies involving human participants, animals, or sensitive personal data performed by any of the authors. Therefore, ethical approval and informed consent were not required for this research.

Author information

Authors and Affiliations

  1. Department of Computer Science and Engineering, JIS University, Kolkata, West Bengal, India

    Abhrendu Bhattacharya, Paramita Sarkar, Sandip Roy & Achyut Mitra

  2. Department of Computer Science &Engineering, J.D.College of Engineering and Management, Nagpur, India

    Amit R. Welekar & Rajesh Bose

Authors
  1. Abhrendu Bhattacharya
    View author publications

    Search author on:PubMed Google Scholar

  2. Amit R. Welekar
    View author publications

    Search author on:PubMed Google Scholar

  3. Paramita Sarkar
    View author publications

    Search author on:PubMed Google Scholar

  4. Rajesh Bose
    View author publications

    Search author on:PubMed Google Scholar

  5. Sandip Roy
    View author publications

    Search author on:PubMed Google Scholar

  6. Achyut Mitra
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Author 1 Contribution: Dr. Abhrendu Bhattacharya was the leader of the conceptualization and design of the proposed adaptive bit placement algorithm and its applications to dual biometric steganography. The embedding and extraction under the hybrid DWT-DCT transform domain was thus a key focus area of Dr. Bhattacharya. He supervised the experimental setup, guided the performance evaluation through PSNR, SSIM, and capacity metrics, and co-supervised the integration of biometric modalities (signature and fingerprint) within the steganographic flow. Dr. Bhattacharya was also responsible for drafting the manuscript, interpreting the results, and ensuring the research met the standards of scientific integrity and originality.Author 2 Contribution: Dr. Amit R. Welekar gave expert guidance on the theoretical framework and mathematical modeling aspects of the hybrid DWT-DCT transform implemented in the steganographic procedure. He backed the validation of the algorithm against various test cases and helped in fine-tuning the strategy for adaptive embedding to ensure higher fidelity and robustness. Dr. Welekar also delved into the related study literature to provide an exhaustive background for the study and assisted with proofreading of the final manuscript so as to elevate clarity, structure, and academic tone.Author 3 Contribution: Dr. Paramita Sarkar made significant contributions during the biometric data acquisition and preprocessing stages. She focused on fine-tuning the extraction of fingerprint and signature features for steganographic embedding. Additionally, she was instrumental in implementing the algorithm using Python and contributed to the visual analysis, which included comparing histograms and evaluating stego-cover images. Dr. Sarkar also took a leading role in compiling the experimental results, creating graphs and radar plots, and aiding in the interpretation of performance metrics to draw meaningful insights.Author 4 Contribution: Dr. Rajesh Bose was involved in algorithm optimization, including proper fine-tuning of the adaptive bit placement for the sake of robustness and imperceptibility. He contributed valuable insights into the processing of biometric data and the selection of preprocessing techniques to improve the embedding fidelity. Dr. Bose contributed to data analysis, performance comparison vis-à-vis old methodologies, and enhancement of the visual assessment process through, for example, histograms and radar charts. He also reviewed and edited the manuscript to test for technical accuracy, consistency, and alignment with publication standards.Author 5 Contribution: Dr. Sandip Roy contributed to the technical design, refinement, and validation of the Adaptive Bit Placement framework for dual-biometric steganography. He assisted in methodological optimization and supported result interpretation to strengthen system performance evaluation. His inputs significantly enhanced the robustness and scientific accuracy of the proposed model.Author 6 Contribution: Achyut Mitra played a key role in bringing the adaptive bit placement algorithm to life through the hybrid DWT-DCT technique. He took the lead in developing and testing Python-based steganography modules that allowed for the embedding and extraction of dual biometric data. Beyond that, Achyut was instrumental in data collection, overseeing experimental runs, and creating insightful visualizations like radar charts and histograms. He also lent a hand in compiling references and formatting the manuscript for submission, ensuring everything was polished and ready to go.

Corresponding author

Correspondence to Abhrendu Bhattacharya.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhattacharya, A., Welekar, A.R., Sarkar, P. et al. Adaptive bit placement for dual biometric using signature and finger print for DWT-DCT picture steganography. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37827-x

Download citation

  • Received: 28 July 2025

  • Accepted: 27 January 2026

  • Published: 13 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-37827-x

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Double biometric
  • Adaptive bit arrangement
  • Robustness
  • DWT
  • DCT
  • Security
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics