Image Feature Based Authentication and Digital Signature for Wireless Data Transmission

被引:0
作者
Ziaullah, Mohammad [1 ]
Shetty, Prakash [2 ]
Kamal, Shoaib [2 ]
机构
[1] SECAB IET, Dept ECE, Vijayapur, Karnataka, India
[2] PA Coll Engn, Dept ECE, Mangalore, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2016年
关键词
authentication; encryption; security; resilient; AWGN;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless security data is one of the challenges in wireless network. Because of the less and weak authentication and frequently changes, strong security mechanism are difficult to implement in such network. This paper presents a novel architecture for Image based authentication for wireless channel which is noise resilient and tampers proof. The server database stores set of images and a symmetric key is generated through Advanced Encryption Standard(AES) key generation for each user. Each user chooses an image as password from database, features are extracted from image and are encrypted with above key, and transmitted via AWGN channel with tampering and noise addition. At receiver, encryption domain feature matching is introduced. As the decryption process partially exposes the data to the imposter hence, not decrypted. Therefore, it selects all the images from the database, extracts their features and encrypts them with each user keys. With the incoming encrypted and tampered features it finds closest match and authenticates the user with closest match. The proposed system can effectively authenticate users even under high noise and attack. In this paper, the technique is compared with a text encryption. The features are encrypted with same key. The scheme follows the same encryption domain authentication technique suggested for images. Hence, image feature based authentication fares better than text based authentication scheme.
引用
收藏
页数:4
相关论文
共 12 条
[1]  
Ginseu G., 2006, EURASIP J WIREL COMM, P1
[2]   Image content authentication using pinned sine transform [J].
Ho, ATS ;
Zhu, XZ ;
Guan, YL .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004, 2004 (14) :2174-2184
[3]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[4]  
LIN CY, 2001, P SPIE ITCOM C AUG
[5]  
Lu, 2003, MULTIMEDIA SECURITY
[6]  
Lu CS, 2004, 2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, P169
[7]  
Schneider M, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P227, DOI 10.1109/ICIP.1996.560425
[8]  
Seitz J., 2005, DIGITAL WATERMARKING
[9]   Feature selection for semi-fragile signature-based authentication systems [J].
Sun, QB ;
He, DJ ;
Zhou, ZC ;
Ye, SM .
ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, :99-103
[10]   A CRYPTO SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNEL [J].
Sun, Qibin ;
Yet, Shuiming ;
Lin, Ching-Yung ;
Chang, Shih-Fu .
INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2005, 5 (01) :135-148