首页    期刊浏览 2024年11月29日 星期五
登录注册

文章基本信息

  • 标题:Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks
  • 作者:Klimis Ntalianis ; Nicolas Tsapatsoulis
  • 期刊名称:IEEE Transactions on Emerging Topics in Computing
  • 印刷版ISSN:2168-6750
  • 出版年度:2016
  • 卷号:4
  • 期号:1
  • 页码:156-174
  • DOI:10.1109/TETC.2015.2400135
  • 语种:English
  • 出版社:IEEE Publishing
  • 摘要:

    In wireless communications, sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice, and so on). Nevertheless, Trojan horse and other attacks can cause serious problems, especially in the cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes a robust authentication mechanism based on semantic segmentation, chaotic encryption, and data hiding. Assuming that user X wants to be remotely authenticated, initially X's video object (VO) is automatically segmented, using a head-and-body detector. Next, one of X's biometric signals is encrypted by a chaotic cipher. Afterwards, the encrypted signal is inserted to the most significant wavelet coefficients of the VO, using its qualified significant wavelet trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical of wireless networks. Finally, the inverse discrete wavelet transform is applied to provide the stego-object. Experimental results regarding: 1) security merits of the proposed encryption scheme; 2) robustness to steganalytic attacks, to various transmission losses and JPEG compression ratios; and 3) bandwidth efficiency measures indicate the promising performance of the proposed biometrics-based authentication scheme.

  • 关键词:authorisation; biometrics (access control); discrete wavelet transforms; image coding; invasive software; steganography; wireless channels; JPEG compression ratios; QSWT; Trojan horse; biometric signals; biometrics; chaotic cipher; chaotic encryption; data hiding; head-and-body detector; interviewing; inverse discrete wavelet transform; personnel hiring; qualified significant wavelet trees; remote authentication; remote examinations; remote studying; robust video-object steganographic mechanism; semantic segmentation; steganalytic attacks; transmission loss; video object; wavelet coefficients; wireless communications; wireless networks; Authentication; Biometrics (access control); Chaotic communication; Ciphers; Encryption; Biometrics; Biometrics Hiding; Biometrics hiding; QSWTs; Remote Authentication; Steganographic System; Video Object; biometrics; remote authentication; steganographic system; video object
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有