期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
印刷版ISSN:2278-1323
出版年度:2017
卷号:6
期号:5
页码:730-735
出版社:Shri Pannalal Research Institute of Technolgy
摘要:Sensitive information is frequently exchanged via wireless network, which requires remote authentication for accessing the information. Remote authentication might be in the form of encrypted information. Intruder attacks such as Trojan Horse may cause serious issues especially in the case of remote operations. Here a robust authentication technique is proposed, which is based on Chaotic encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. Next, user’s biometric signal is encrypted using a chaotic encryption method. Then the encrypted image is vectorized and the data hiding process is carried out using Qualified Significant Wavelet Trees (QSWTs). QSWT is used to achieve the invisibility, resistance to attacks and robustness in data hiding. Subsequently, the Inverse Discrete Wavelet Transform (IDWT) is applied to retrieve the hiddeninformation from the stego-object followed by an appropriate decryption process to get back the biometric image. Experimental results prove that the proposed technique would yield security merits and robustness to steganalytic attacks.