Proactive biometric-enabled forensic imprinting

Document Type

Book Chapter


Institute of Electrical and Electronics Engineers Inc

Place of Publication

United States


Faculty of Business and Law


School of Engineering




Originally published as; Alruban, A., Clarke, N., Li, F., & Furnell, S. (2016). Proactive biometric-enabled forensic imprinting. 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). Available here

© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.


Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, documents and emails) to the individual users who use and access them through the use of steganography and transparent biometrics. The initial experimental results of the proposed approach have shown that it is possible to correlate an individual's biometric feature vector with a digital object (images) and still successfully recover the sample even with significant file modification. In addition, a reconstruction of the feature vector from these unmodified images was possible by using those generated imprints with an accuracy of 100% in some scenarios.



Access Rights