期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
印刷版ISSN:2278-1323
出版年度:2015
卷号:4
期号:11
页码:4157-4163
出版社:Shri Pannalal Research Institute of Technolgy
摘要:In a wireless communications in order to share secret information between 2 or entities remote authentication could be used. It internally contains three works. The first one is the encryption of finger print image in the form of chaotic image then internally converts that chaotic image into set of vectors. The second one is the extracting human object from the video or teleconferencing or in a direct interview. Then third one is the hiding those vector value into the extracted object. Trojan horse and other attacks could be mostly occurring in cases of remote examinations or in interviewing or in personnel hiring which may create serious threats. This paper proposes a robust remote authentication mechanism based on semantic segmentation, chaotic encryption and data hiding. Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely Deployed to verify the legitimacy of remote users.
关键词:Biometrics Hiding; Steganographic System; Remote Authentication; Biometrics; Video Object