![Phân tích tư tưởng của nhân dân qua đoạn thơ: Những người vợ nhớ chồng… Những cuộc đời đã hóa sông núi ta trong Đất nước của Nguyễn Khoa Điềm](https://timtailieu.net/upload/document/136415/phan-tich-tu-tuong-cua-nhan-dan-qua-doan-tho-039-039-nhung-nguoi-vo-nho-chong-nhung-cuoc-doi-da-hoa-song-nui-ta-039-039-trong-dat-nuoc-cua-nguyen-khoa-136415.jpg)
Báo cáo hóa học: Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Số trang: 12
Loại file: pdf
Dung lượng: 5.71 MB
Lượt xem: 9
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions
Nội dung trích xuất từ tài liệu:
Báo cáo hóa học: " Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions"Hindawi Publishing CorporationEURASIP Journal on Information SecurityVolume 2011, Article ID 174945, 12 pagesdoi:10.1155/2011/174945Research ArticleVideo-Object Oriented Biometrics Hiding forUser Authentication under Error-Prone Transmissions Klimis Ntalianis,1 Nicolas Tsapatsoulis,1 and Athanasios Drigas2 1 Department of Communication and Internet Studies, Cyprus University of Technology, 3603 Limassol, Cyprus 2 Net Media Laboratory, NCSR Demokritos, 15310 Athens, Greece Correspondence should be addressed to Klimis Ntalianis, klimis.ntalianis@cut.ac.cy Received 12 April 2010; Revised 9 November 2010; Accepted 3 January 2011 Academic Editor: Claus Vielhauer Copyright © 2011 Klimis Ntalianis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afterwards, the encrypted biometric signal is inserted to the most significant wavelet coefficients of the video object, using its qualified significant wavelet trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in error prone networks. Finally, the inverse discrete wavelet transform (IDWT) is applied to provide the stego-object. Experimental results under various losses and JPEG compression ratios indicate the security, robustness, and efficiency of the proposed biometrics hiding system.1. Introduction memorize. As a result, these keys are stored somewhere (e.g., on a server or smart card) and they are released based onPerson authentication is one of the most important issues in some alternative authentication mechanism (e.g., password).contemporary societies. It ensures that a system’s resources However, several passwords are simple and they can be easilyare not obtained fraudulently by illegal users. Real-life guessed (especially based on social engineering methods) orphysical transactions are generally accomplished using paper broken by simple dictionary attacks [9]. In this case, userID while electronic transactions are based on password protection is only as secure as the password (weakest link)authentication, the most simple and convenient authenti- used to release the correct decrypting key for establishingcation mechanism over insecure networks. In [1], a remote user authenticity. Simple passwords are easy to guess; complex passwords are difficult to remember, and somepassword authentication scheme was proposed by employinga one-way hash function, which was later used for designing users tend to “store” complex passwords at easily accessiblethe famous S/KEY one-time password system [2]. However, locations. Furthermore, most people use the same password across different applications; if a malicious user determines ain such schemes, a verification table should be maintainedon the remote server in order to validate the legitimacy single password, they can access multiple applications.of the requesting users; if intruders break into the server, Many of these password-based authentication problemsthey can modify the verification table. Therefore, many can be confronted by the incorporation of biometrics [10,password authentication schemes [3–7] have recognized this 11]. Biometrics authentication refers to establishing identityproblem, and different solutions have been proposed to avoid based on the physical and/or behavioral characteristics ofverification tables. a person such as face, fingerprint, hand geometry, iris, voice, way of walking, and so forth. Biometric systems offer One ver ...
Nội dung trích xuất từ tài liệu:
Báo cáo hóa học: " Research Article Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions"Hindawi Publishing CorporationEURASIP Journal on Information SecurityVolume 2011, Article ID 174945, 12 pagesdoi:10.1155/2011/174945Research ArticleVideo-Object Oriented Biometrics Hiding forUser Authentication under Error-Prone Transmissions Klimis Ntalianis,1 Nicolas Tsapatsoulis,1 and Athanasios Drigas2 1 Department of Communication and Internet Studies, Cyprus University of Technology, 3603 Limassol, Cyprus 2 Net Media Laboratory, NCSR Demokritos, 15310 Athens, Greece Correspondence should be addressed to Klimis Ntalianis, klimis.ntalianis@cut.ac.cy Received 12 April 2010; Revised 9 November 2010; Accepted 3 January 2011 Academic Editor: Claus Vielhauer Copyright © 2011 Klimis Ntalianis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afterwards, the encrypted biometric signal is inserted to the most significant wavelet coefficients of the video object, using its qualified significant wavelet trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in error prone networks. Finally, the inverse discrete wavelet transform (IDWT) is applied to provide the stego-object. Experimental results under various losses and JPEG compression ratios indicate the security, robustness, and efficiency of the proposed biometrics hiding system.1. Introduction memorize. As a result, these keys are stored somewhere (e.g., on a server or smart card) and they are released based onPerson authentication is one of the most important issues in some alternative authentication mechanism (e.g., password).contemporary societies. It ensures that a system’s resources However, several passwords are simple and they can be easilyare not obtained fraudulently by illegal users. Real-life guessed (especially based on social engineering methods) orphysical transactions are generally accomplished using paper broken by simple dictionary attacks [9]. In this case, userID while electronic transactions are based on password protection is only as secure as the password (weakest link)authentication, the most simple and convenient authenti- used to release the correct decrypting key for establishingcation mechanism over insecure networks. In [1], a remote user authenticity. Simple passwords are easy to guess; complex passwords are difficult to remember, and somepassword authentication scheme was proposed by employinga one-way hash function, which was later used for designing users tend to “store” complex passwords at easily accessiblethe famous S/KEY one-time password system [2]. However, locations. Furthermore, most people use the same password across different applications; if a malicious user determines ain such schemes, a verification table should be maintainedon the remote server in order to validate the legitimacy single password, they can access multiple applications.of the requesting users; if intruders break into the server, Many of these password-based authentication problemsthey can modify the verification table. Therefore, many can be confronted by the incorporation of biometrics [10,password authentication schemes [3–7] have recognized this 11]. Biometrics authentication refers to establishing identityproblem, and different solutions have been proposed to avoid based on the physical and/or behavioral characteristics ofverification tables. a person such as face, fingerprint, hand geometry, iris, voice, way of walking, and so forth. Biometric systems offer One ver ...
Tìm kiếm theo từ khóa liên quan:
báo cáo khoa học báo cáo hóa học công trình nghiên cứu về hóa học tài liệu về hóa học cách trình bày báo cáoTài liệu liên quan:
-
HƯỚNG DẪN THỰC TẬP VÀ VIẾT BÁO CÁO THỰC TẬP TỐT NGHIỆP
18 trang 362 0 0 -
63 trang 340 0 0
-
13 trang 268 0 0
-
Báo cáo khoa học Bước đầu tìm hiểu văn hóa ẩm thực Trà Vinh
61 trang 255 0 0 -
Hướng dẫn thực tập tốt nghiệp dành cho sinh viên đại học Ngành quản trị kinh doanh
20 trang 252 0 0 -
Tóm tắt luận án tiến sỹ Một số vấn đề tối ưu hóa và nâng cao hiệu quả trong xử lý thông tin hình ảnh
28 trang 227 0 0 -
Đồ án: Nhà máy thủy điện Vĩnh Sơn - Bình Định
54 trang 223 0 0 -
23 trang 219 0 0
-
NGHIÊN CỨU CHỌN TẠO CÁC GIỐNG LÚA CHẤT LƯỢNG CAO CHO VÙNG ĐỒNG BẰNG SÔNG CỬU LONG
9 trang 218 0 0 -
Đề tài nghiên cứu khoa học và công nghệ cấp trường: Hệ thống giám sát báo trộm cho xe máy
63 trang 214 0 0