Image based content authentication is more robust and secure than text based password. Modified scheme of authentication for image content is proposed. No computational complexity and suitable for wireless communication and other real time applications.
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION
1. IMAGE FEATURE BASED
AUTHENTICATION AND DIGITAL
SIGNATURE FOR WIRELESS DATA
TRANSMISION
ARATHI JAYAPRAKASH
MTECH 1ST YEAR
REG NO : 16304002
2016-2017
PONDICHERRY UNIVERSITY
DEPARTMENT OF ELECTRONICS
ENGINEERING
2. INTRODUCTION
Digital images prone to error when transmitted over wireless channel
Tamper to image data could change the decision
Content based authentication is efficient which used where content does not
change
Server database stores a set of images and a symmetric key through
advanced encryption standard (AES)
Each image chooses an image as password from database
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 2
3. INTRODUCTION (contd..)
► Encrypted data transmitted via AWGN
► At receiver, extracts the features and encrypts with each user keys
► Authenticates the user with closest match
► Effectively authenticate user even under high noise and attack
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 3
4. OBJECTIVE
Developing the secured wireless transmission of image content by providing
high authenticity
Comparing the level of authentication graph between conventional text
password and image feature
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 4
5. PROPOSED METHOD
Authentication mainly uses convolution method to recover from noisy
channels
Uses semi-fragile signature method and image signing procedure in encryption
domain
It concerns with verifying authenticity of received image with some allowable
and acceptable manipulations
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 5
6. PROPOSED METHOD (contd..)
Two problems are involved
Generated signature size is proportional to size of content
Correlation between features and bit by bit comparison causes security
problem
To avoid this a content dependent key used,ie. hashing is done
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 6
9. PROGRAM ALGORITHM METHODS
1. 16 byte key for each user is generated and stored in database
2. Once registered ,user’s select transmission process by selecting user and
image from the stored in database
3. Extraction of wavelet feature from image I done like mean and standard
deviation using haar wavelet transform and encryption uses data key
4. 14 valued extracted features are encrypted using symmetric encryption
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 9
10. PROGRAM ALGORITHM METHODS
(contd.)
5. Encrypted values converted to binary and transmitted over channel
6. Baseband modulation is used and technique of bipolar coding to convert data
7. Noise is added with specific signal to noise ratio to make signal amplitude
fluctuating
8. Some bits are changed as per user choice which is called tampering where
actual data is made to change
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 10
11. PROGRAM ALGORITHM METHODS
(contd.)
9. At receiver ,selects images from database and extract the wavelet features
of it
10. No public key available, only data key is used
11. Encrypts the features with keys available and compare with stored database
feature
12. Distance between received image feature and other features extracted from
database is calculated as Euclidean distance
13. Smallest distance is assumed to be authenticated
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 11
12. GRAPHS AND DISCUSSIONS
Rate of authentication
achieved is better than
conventional method i.e.
text based authentication
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 12
13. GRAPHS AND DISCUSSIONS (contd..)
Rate of authentication
achieved is better even
under tampering effects.
The accuracy decreases as
number of tampering
bytes are increased
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 13
14. CONCLUSION
Modified scheme of authentication for image content is proposed
No computational complexity and suitable for wireless communication
and other real time applications
Image based content authentication is more robust and secure than
text based password
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 14
15. REFERENCES
Mohammad Ziaullah, Prakash Shetty, Shoaib Kamal :’ Image Feature Based
Authentication and Digital Signature for Wireless Data Transmission’ ; 2016
International Conference on Computer Communication and Informatics (Ieeel
-20 16), Jan. 07 - 09, 2016, Coimbatore, INDIA
Lou D.C., Liu J.L., Li C.T.: 'Digital Signature-Based Image Authentication', in
LU C.S. (EDS.): 'Multimedia security: steganography and digital water marking
techniques for protection of intellectual property' (Idea Group Inc., 2003.
Schneider M., Chang S.-F.: ‘Content based digital signature for image
authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp.
227-230.
Lu C.S.: 'On the security of structural information extraction/embedding
for image authentication'. Proc. IEEE ISCAS'04, 2004,pp.169-172.
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 15