Danh mục

Báo cáo hóa học: Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Số trang: 12      Loại file: pdf      Dung lượng: 5.71 MB      Lượt xem: 9      Lượt tải: 0    
Xem trước 2 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Nội dung trích xuất từ tài liệu:
Báo cáo hóa học: " Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions"Hindawi Publishing CorporationEURASIP Journal on Information SecurityVolume 2011, Article ID 174945, 12 pagesdoi:10.1155/2011/174945Research ArticleVideo-Object Oriented Biometrics Hiding forUser Authentication under Error-Prone Transmissions Klimis Ntalianis,1 Nicolas Tsapatsoulis,1 and Athanasios Drigas2 1 Department of Communication and Internet Studies, Cyprus University of Technology, 3603 Limassol, Cyprus 2 Net Media Laboratory, NCSR Demokritos, 15310 Athens, Greece Correspondence should be addressed to Klimis Ntalianis, klimis.ntalianis@cut.ac.cy Received 12 April 2010; Revised 9 November 2010; Accepted 3 January 2011 Academic Editor: Claus Vielhauer Copyright © 2011 Klimis Ntalianis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afterwards, the encrypted biometric signal is inserted to the most significant wavelet coefficients of the video object, using its qualified significant wavelet trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in error prone networks. Finally, the inverse discrete wavelet transform (IDWT) is applied to provide the stego-object. Experimental results under various losses and JPEG compression ratios indicate the security, robustness, and efficiency of the proposed biometrics hiding system.1. Introduction memorize. As a result, these keys are stored somewhere (e.g., on a server or smart card) and they are released based onPerson authentication is one of the most important issues in some alternative authentication mechanism (e.g., password).contemporary societies. It ensures that a system’s resources However, several passwords are simple and they can be easilyare not obtained fraudulently by illegal users. Real-life guessed (especially based on social engineering methods) orphysical transactions are generally accomplished using paper broken by simple dictionary attacks [9]. In this case, userID while electronic transactions are based on password protection is only as secure as the password (weakest link)authentication, the most simple and convenient authenti- used to release the correct decrypting key for establishingcation mechanism over insecure networks. In [1], a remote user authenticity. Simple passwords are easy to guess; complex passwords are difficult to remember, and somepassword authentication scheme was proposed by employinga one-way hash function, which was later used for designing users tend to “store” complex passwords at easily accessiblethe famous S/KEY one-time password system [2]. However, locations. Furthermore, most people use the same password across different applications; if a malicious user determines ain such schemes, a verification table should be maintainedon the remote server in order to validate the legitimacy single password, they can access multiple applications.of the requesting users; if intruders break into the server, Many of these password-based authentication problemsthey can modify the verification table. Therefore, many can be confronted by the incorporation of biometrics [10,password authentication schemes [3–7] have recognized this 11]. Biometrics authentication refers to establishing identityproblem, and different solutions have been proposed to avoid based on the physical and/or behavioral characteristics ofverification tables. a person such as face, fingerprint, hand geometry, iris, voice, way of walking, and so forth. Biometric systems offer One ver ...

Tài liệu được xem nhiều:

Tài liệu liên quan: