SlideShare a Scribd company logo
REMOTE AUTHENTICATION VIA
BIOMETRICS: A ROBUST VIDEO-
OBJECT STEGANOGRAPHIC
MECHANISM OVER WIRELESS
NETWORKS
ABSTRACT
In wireless communications sensitive information is frequently
exchanged, requiring remote authentication. Remote authentication involves
the submission of encrypted information, along with visual and audio cues
(facial images/videos, human voice etc.). Nevertheless, Trojan Horse and
other attacks can cause serious problems, especially in cases of remote
examinations (in remote studying) or interviewing (for personnel hiring).
This paper proposes a robust authentication mechanism based on semantic
segmentation, chaotic encryption and data hiding.
EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT:
 Password-based remote user
authentication schemes are widely
investigated, with recent research
increasingly combining a user’s
biometrics with a password to design a
remote user authentication scheme that
enhances the level of the security.
 This paper we propose want to access
different application servers. To solve
an anonymous multi-server
authenticating key agreement scheme
based on trust computing using smart
cards, password, and biometrics.
PROPOSED CONCEPT:
 In wireless communications sensitive
information is frequently exchanged,
requiring remote authentication.
Remote authentication involves the
submission of encrypted information,
along with visual and audio cues (facial
images/videos, human voice etc.).
Nevertheless, Trojan Horse and other
attacks can cause serious problems,
especially in cases of remote
examinations (in remote studying) or
interviewing (for personnel hiring).
EXISTING TECHNIQUE :
 SINGLE REGISTRATION AND
ANONYMITY
PROPOSED ALGORITHM:
 QUALIFIED SIGNIFICANT
WAVELET TREES (QSWTS)
TECHNIQUE DEFINITION:
 The user only needs to register with the
registration center once and then can
access different application servers. The
privacy of the user has attracted
increasing attention from both industry
and academia. Therefore, anonymous
authentication involves verifying that a
user does not use the real identity to
execute the authentication procedure.
TECHNIQUE DEFINITION:
 The approach is implemented as a
DCT-DWT dual domain, but the
authenticator watermark is not
encrypted. A similar approach
combining DWT and Integer Wavelet
Transform (IWT) QSWTs approach is
incorporated in order to select the
coefficients where the encrypted
biometric signal should be casted.
DRAWBACKS:
 Traceable problem: In cryptography,
the user’s privacy includes anonymity
and untraceability, where anonymity
means that an adversary cannot obtain
the user’s real identity, and
untraceability means that an adversary
cannot acquire the user’s behavior
trajectory.
 The distribution of PSK: The
distribution of the PSK is a trade-off
issue. If the PSK is only kept in the RC,
the server’s compromise problem will
not happen.
ADVANTAGES:
 It addresses both spatial and temporal
domains, which leads to detecting
various malicious changes in spatial and
time domains.
 It is faster and lower complexity
compared to existing algorithms,
making it practical and suitable for real-
time applications
 Hiding Capacity of the secret data bits
is high.
 Hiding capacity was based on the pixel
number corresponding to the two
highest peaks of the image histogram
BLOCK DIAGRAM
Embedding Attacks Decoding
Receiving Video Extracting Bits
Video Encoding
Input Video
Frames
Input biometrics
Encrypted
APPLICATIONS
• This technique reportedly has been used to detect the source of illegally
copied movies.
• Content identification and management
• Content protection for audio and video content
• Forensics and piracy deterrence
• Content filtering (includes blocking and triggering of actions)
• Communication of ownership and copyrights.
REQUIREMENTS
HARDWARE:
• Processor : Pentium Dual Core 2.00GHZ
• Hard Disk : 40 GB
• RAM : 2GB (minimum)
• Keyboard : 110 keys enhanced
SOFTWARE:
• MATLAB 7.14 Version R2012a
FUTURE ENHANCEMENT
• In future research, the effects of compression and mobile transmission of
other hidden biometric signals (e.g. voice or iris) should also be examined.
The problem of lost biometric data is also of high interest. Techniques from
the areas of image error concealment, region restoration or region matching
can be used for this purpose. For instance, the lost biometric data can be
concealed from the authentication module, so that it attempts to perform
authentication even though parts are missing (parts that do not contain any
crucial information, e.g. terminations/bifurcations in case of fingerprints).

More Related Content

Similar to ITIMP35.pptx

A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
IRJET Journal
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
Journal For Research
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET Journal
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEEBEBTECHSTUDENTPROJECTS
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
Certificateless remote anonymous authentication
Certificateless remote anonymous authenticationCertificateless remote anonymous authentication
Certificateless remote anonymous authentication
Shakas Technologies
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
aissmsblogs
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Michelle Morgan-Nelsen
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
 

Similar to ITIMP35.pptx (20)

A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Certificateless remote anonymous authentication
Certificateless remote anonymous authenticationCertificateless remote anonymous authentication
Certificateless remote anonymous authentication
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Irjet v7 i3570
Irjet v7 i3570Irjet v7 i3570
Irjet v7 i3570
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 

More from Maruthi Jâcs

ITDNS03.ppt
ITDNS03.pptITDNS03.ppt
ITDNS03.ppt
Maruthi Jâcs
 
ITDCC01.ppt
ITDCC01.pptITDCC01.ppt
ITDCC01.ppt
Maruthi Jâcs
 
ITIMP40.pptx
ITIMP40.pptxITIMP40.pptx
ITIMP40.pptx
Maruthi Jâcs
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
Maruthi Jâcs
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
Maruthi Jâcs
 
ITIMP07.pptx
ITIMP07.pptxITIMP07.pptx
ITIMP07.pptx
Maruthi Jâcs
 
Doc.pptx
Doc.pptxDoc.pptx
Doc.pptx
Maruthi Jâcs
 
HUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptxHUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptx
Maruthi Jâcs
 
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptxBRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
Maruthi Jâcs
 
Grid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptxGrid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptx
Maruthi Jâcs
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
Maruthi Jâcs
 

More from Maruthi Jâcs (14)

ITDNS03.ppt
ITDNS03.pptITDNS03.ppt
ITDNS03.ppt
 
ITDNS02.ppt
ITDNS02.pptITDNS02.ppt
ITDNS02.ppt
 
ITDCC01.ppt
ITDCC01.pptITDCC01.ppt
ITDCC01.ppt
 
ITIMP40.pptx
ITIMP40.pptxITIMP40.pptx
ITIMP40.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
ITIMP07.pptx
ITIMP07.pptxITIMP07.pptx
ITIMP07.pptx
 
ITCM-10 ZR.pptx
ITCM-10 ZR.pptxITCM-10 ZR.pptx
ITCM-10 ZR.pptx
 
Doc.pptx
Doc.pptxDoc.pptx
Doc.pptx
 
HUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptxHUMAN FOLLOWING SUITCASE.pptx
HUMAN FOLLOWING SUITCASE.pptx
 
ITIOT01.pptx
ITIOT01.pptxITIOT01.pptx
ITIOT01.pptx
 
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptxBRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
BRAILLE LANGUAGE TEXT CONVERSION FOR THE VISUALLY-IMPAIRED.pptx
 
Grid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptxGrid connetecd hybrid EV charging.pptx
Grid connetecd hybrid EV charging.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 

Recently uploaded

DENR-PENRO-Bulacan-Presentation Philippine EIS
DENR-PENRO-Bulacan-Presentation Philippine EISDENR-PENRO-Bulacan-Presentation Philippine EIS
DENR-PENRO-Bulacan-Presentation Philippine EIS
MarlonJayBayag
 
Drip Irrigation technology with solar power
Drip Irrigation technology with solar powerDrip Irrigation technology with solar power
Drip Irrigation technology with solar power
anikchanda4
 
一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理
一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理
一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理
zm9ajxup
 
Artificial Reefs by Kuddle Life Foundation - May 2024
Artificial Reefs by Kuddle Life Foundation - May 2024Artificial Reefs by Kuddle Life Foundation - May 2024
Artificial Reefs by Kuddle Life Foundation - May 2024
punit537210
 
Top 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdfTop 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdf
Jhon Wick
 
Global Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation AtlasGlobal Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation Atlas
Global Landscapes Forum (GLF)
 
Promoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland managementPromoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland management
Global Landscapes Forum (GLF)
 
Climate Change All over the World .pptx
Climate Change All over the World  .pptxClimate Change All over the World  .pptx
Climate Change All over the World .pptx
sairaanwer024
 
Alert-driven Community-based Forest monitoring: A case of the Peruvian Amazon
Alert-driven Community-based Forest monitoring: A case of the Peruvian AmazonAlert-driven Community-based Forest monitoring: A case of the Peruvian Amazon
Alert-driven Community-based Forest monitoring: A case of the Peruvian Amazon
CIFOR-ICRAF
 
Peatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge EducationPeatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge Education
Global Landscapes Forum (GLF)
 
Epcon is One of the World's leading Manufacturing Companies.
Epcon is One of the World's leading Manufacturing Companies.Epcon is One of the World's leading Manufacturing Companies.
Epcon is One of the World's leading Manufacturing Companies.
EpconLP
 
How about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shopHow about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shop
laozhuseo02
 
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptxAGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
BanitaDsouza
 
Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...
Open Access Research Paper
 
Summary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of AustraliaSummary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of Australia
yasmindemoraes1
 
Q&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service PlaybookQ&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service Playbook
World Resources Institute (WRI)
 
Peatlands of Latin America and the Caribbean
Peatlands of Latin America and the CaribbeanPeatlands of Latin America and the Caribbean
Peatlands of Latin America and the Caribbean
Global Landscapes Forum (GLF)
 
Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...
Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...
Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...
PriyankaKilaniya
 
Wildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environmentWildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environment
amishajha2407
 
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Global Landscapes Forum (GLF)
 

Recently uploaded (20)

DENR-PENRO-Bulacan-Presentation Philippine EIS
DENR-PENRO-Bulacan-Presentation Philippine EISDENR-PENRO-Bulacan-Presentation Philippine EIS
DENR-PENRO-Bulacan-Presentation Philippine EIS
 
Drip Irrigation technology with solar power
Drip Irrigation technology with solar powerDrip Irrigation technology with solar power
Drip Irrigation technology with solar power
 
一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理
一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理
一比一原版(UMTC毕业证书)明尼苏达大学双城分校毕业证如何办理
 
Artificial Reefs by Kuddle Life Foundation - May 2024
Artificial Reefs by Kuddle Life Foundation - May 2024Artificial Reefs by Kuddle Life Foundation - May 2024
Artificial Reefs by Kuddle Life Foundation - May 2024
 
Top 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdfTop 8 Strategies for Effective Sustainable Waste Management.pdf
Top 8 Strategies for Effective Sustainable Waste Management.pdf
 
Global Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation AtlasGlobal Peatlands Map and Hotspot Explanation Atlas
Global Peatlands Map and Hotspot Explanation Atlas
 
Promoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland managementPromoting Multilateral Cooperation for Sustainable Peatland management
Promoting Multilateral Cooperation for Sustainable Peatland management
 
Climate Change All over the World .pptx
Climate Change All over the World  .pptxClimate Change All over the World  .pptx
Climate Change All over the World .pptx
 
Alert-driven Community-based Forest monitoring: A case of the Peruvian Amazon
Alert-driven Community-based Forest monitoring: A case of the Peruvian AmazonAlert-driven Community-based Forest monitoring: A case of the Peruvian Amazon
Alert-driven Community-based Forest monitoring: A case of the Peruvian Amazon
 
Peatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge EducationPeatland Management in Indonesia, Science to Policy and Knowledge Education
Peatland Management in Indonesia, Science to Policy and Knowledge Education
 
Epcon is One of the World's leading Manufacturing Companies.
Epcon is One of the World's leading Manufacturing Companies.Epcon is One of the World's leading Manufacturing Companies.
Epcon is One of the World's leading Manufacturing Companies.
 
How about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shopHow about Huawei mobile phone-www.cfye-commerce.shop
How about Huawei mobile phone-www.cfye-commerce.shop
 
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptxAGRICULTURE Hydrophonic FERTILISER PPT.pptx
AGRICULTURE Hydrophonic FERTILISER PPT.pptx
 
Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...Characterization and the Kinetics of drying at the drying oven and with micro...
Characterization and the Kinetics of drying at the drying oven and with micro...
 
Summary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of AustraliaSummary of the Climate and Energy Policy of Australia
Summary of the Climate and Energy Policy of Australia
 
Q&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service PlaybookQ&A with the Experts: The Food Service Playbook
Q&A with the Experts: The Food Service Playbook
 
Peatlands of Latin America and the Caribbean
Peatlands of Latin America and the CaribbeanPeatlands of Latin America and the Caribbean
Peatlands of Latin America and the Caribbean
 
Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...
Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...
Altered Terrain: Colonial Encroachment and Environmental Changes in Cachar, A...
 
Wildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environmentWildlife-AnIntroduction.pdf so that you know more about our environment
Wildlife-AnIntroduction.pdf so that you know more about our environment
 
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...Improving the Management of Peatlands and the Capacities of Stakeholders in I...
Improving the Management of Peatlands and the Capacities of Stakeholders in I...
 

ITIMP35.pptx

  • 1. REMOTE AUTHENTICATION VIA BIOMETRICS: A ROBUST VIDEO- OBJECT STEGANOGRAPHIC MECHANISM OVER WIRELESS NETWORKS
  • 2. ABSTRACT In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes a robust authentication mechanism based on semantic segmentation, chaotic encryption and data hiding.
  • 3. EXISTING SYSTEM PROPOSED SYSTEM EXISTING CONCEPT:  Password-based remote user authentication schemes are widely investigated, with recent research increasingly combining a user’s biometrics with a password to design a remote user authentication scheme that enhances the level of the security.  This paper we propose want to access different application servers. To solve an anonymous multi-server authenticating key agreement scheme based on trust computing using smart cards, password, and biometrics. PROPOSED CONCEPT:  In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring).
  • 4. EXISTING TECHNIQUE :  SINGLE REGISTRATION AND ANONYMITY PROPOSED ALGORITHM:  QUALIFIED SIGNIFICANT WAVELET TREES (QSWTS) TECHNIQUE DEFINITION:  The user only needs to register with the registration center once and then can access different application servers. The privacy of the user has attracted increasing attention from both industry and academia. Therefore, anonymous authentication involves verifying that a user does not use the real identity to execute the authentication procedure. TECHNIQUE DEFINITION:  The approach is implemented as a DCT-DWT dual domain, but the authenticator watermark is not encrypted. A similar approach combining DWT and Integer Wavelet Transform (IWT) QSWTs approach is incorporated in order to select the coefficients where the encrypted biometric signal should be casted.
  • 5. DRAWBACKS:  Traceable problem: In cryptography, the user’s privacy includes anonymity and untraceability, where anonymity means that an adversary cannot obtain the user’s real identity, and untraceability means that an adversary cannot acquire the user’s behavior trajectory.  The distribution of PSK: The distribution of the PSK is a trade-off issue. If the PSK is only kept in the RC, the server’s compromise problem will not happen. ADVANTAGES:  It addresses both spatial and temporal domains, which leads to detecting various malicious changes in spatial and time domains.  It is faster and lower complexity compared to existing algorithms, making it practical and suitable for real- time applications  Hiding Capacity of the secret data bits is high.  Hiding capacity was based on the pixel number corresponding to the two highest peaks of the image histogram
  • 6. BLOCK DIAGRAM Embedding Attacks Decoding Receiving Video Extracting Bits Video Encoding Input Video Frames Input biometrics Encrypted
  • 7. APPLICATIONS • This technique reportedly has been used to detect the source of illegally copied movies. • Content identification and management • Content protection for audio and video content • Forensics and piracy deterrence • Content filtering (includes blocking and triggering of actions) • Communication of ownership and copyrights.
  • 8. REQUIREMENTS HARDWARE: • Processor : Pentium Dual Core 2.00GHZ • Hard Disk : 40 GB • RAM : 2GB (minimum) • Keyboard : 110 keys enhanced SOFTWARE: • MATLAB 7.14 Version R2012a
  • 9. FUTURE ENHANCEMENT • In future research, the effects of compression and mobile transmission of other hidden biometric signals (e.g. voice or iris) should also be examined. The problem of lost biometric data is also of high interest. Techniques from the areas of image error concealment, region restoration or region matching can be used for this purpose. For instance, the lost biometric data can be concealed from the authentication module, so that it attempts to perform authentication even though parts are missing (parts that do not contain any crucial information, e.g. terminations/bifurcations in case of fingerprints).