Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment

被引:0
作者
G. Ginesu
D. D. Giusto
T. Onali
机构
[1] University of Cagliari,MCLab, Department of Electronic Engineering
来源
EURASIP Journal on Wireless Communications and Networking | / 2006卷
关键词
Data Transmission; Strong Solution; Mutual Authentication; Wireless Environment; Application Scalability;
D O I
暂无
中图分类号
学科分类号
摘要
Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking, require a strong level of protection, allowing for verification of legitimate users' identity and enabling the user to distinguis trusted servers from shadow ones. A novel framework for image-based authentication (IBA) is then proposed and evaluated. In order to provide mutual authentication, the proposed method integrates an IBA password technique with a challenge-response scheme based on a shared secret key for image scrambling. The wireless environment is mainly addressed by the proposed system, which tries to overcome the severe constraints on security, data transmission capability, and user friendliness imposed by such environment. In order to achieve such results, the system offers a strong solution for authentication, taking into account usability and avoiding the need for hardware upgrades. Data and application scalability is provided through the JPEG2000 standard and JPIP framework.
引用
收藏
相关论文
共 32 条
[1]  
Paivio A(1968)Why are pictures easier to recall than words? Psychonomic Science 11 137-138
[2]  
Rogers TB(1967)Recognition memory for words, sentences, and pictures Journal of Verbal Learning and Verbal Behavior 6 156-163
[3]  
Smythe PC(1996)Memories out of order: thought suppression and the disturbance of sequence memory Journal of Personality and Social Psychology 71 680-691
[4]  
Shepard RN(2003)Special section on JPEG2000 digital imaging IEEE Transactions on Consumer Electronics 49 771-888
[5]  
Wegner DM(2005)A framework for image based authentication Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05) 2 521-524
[6]  
Quillian F(1996)Two-dimensional periodically shift variant digital filters IEEE Transactions on Circuits and Systems for Video Technology 6 97-107
[7]  
Houston CE(2001)Image scrambling through a fractional Electronics Letters 37 685-696
[8]  
Ebrahimi T(2004) composite domain Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '04) 3 385-388
[9]  
Giusto, Eds DD(2004)The generalized fibonacci transformations and application to image scrambling IEEE Transactions on Circuits and Systems for Video Technology 14 892-897
[10]  
Perra C(2004)Image scrambling without bandwidth expansion Proceedings of the 8th International Conference on Information Visualization 8 217-220