Securing Fingerprint Data using Huffman Coding Technique and Cuckoo Search based Steganography
Gnanaprakasam Thangavel1, Santhosh J2, Tigist Adam3

1Gnanaprakasam Thangavel, Associate Professor, Department of Computer Science, Debre Berhan University, Ethiopia.
2J.Santhosh, Assistant Professor, Department of CSE, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology,Avadi, Chennai, India.
3Tigist Adam, Lecturer, Department of Information Technology, Debre Berhan University, Debre Berhan, Ethiopia.

Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 2991-2995 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7021068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Fingerprint plays an intelligent role in the authentication process. Even identical twins have same DNA, but their fingerprints are unique. For authentication purpose, the financial sectors mostly decided fingerprint as their important authentication measure. Nowadays mobile phones also started to use fingerprint as one of the security tools rather than pattern or password. So, securing the fingerprint in public environment takes lead role for the data owners. This research focused fingerprint security using Huffman coding technique and cuckoo search-based Steganography. Huffman coding is used for lossless compression technique with respect to image data. Here fingerprint is available in the form of image data, so the loss of data could not be tolerated for authentication. Further, Cuckoo search is an optimization algorithm which is used to identify the best optimal solution from the group of results. Steganography is the best way of information hiding in internet. The key generated from the cuckoo search is embedding with the original fingerprint data. The best optimal security key is identified through cuckoo search. The key is shared with the user for the authentication process in the internet. This research implied the image compression technique, image encoding technique and finally verified the results with original fingerprint which proves no data loss and fingerprint data will be secure in the public environment.
Keyword: Authentication, Cuckoo Search, Huffman Coding, Security, Steganography.
Scope of the Article: Database Theory and Application.