Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Usage of Bioinformatic Data for Remote Authentication in Wireless Networks


Affiliations
1 Department of Information Technology, St. Joseph’s Institute of Technology, Chennai, India
     

   Subscribe/Renew Journal


Authentication is the step to approve the correctness of an attribute of a individual or entity group. Sensitive information might help in making the authentication. Regularly this encrypted information is processed via wireless network and which need remote authentication for information access process. In the proposed work, a robust authentication technique is performed, which is based on segmentation, symmetric encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. The user’s biometric signal is encrypted using a symmetric encryption method. After encrypted information is vectorized the information hiding process is accomplish using Qualified Significant Wavelet Trees (QSWTs). QSWT is effectively achieve the invisibility and resistance during attacks and stability in data hidden process. Also, the Inverse Discrete Wavelet Transform (IDWT) is applied to extract the hiding data from the stego-object subsequently an appropriate decryption process to recover the biometric image. Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. It is a very useful and efficient method of encryption because of its tendency to use less data for performing its services.

Keywords

Railway Accident, Decision Making, D3 Algorithm.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Klimis Ntalianis and Nicolas Tsapatsoulis, “Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks”, IEEE Transactions on Emerging Topics in Computing, Vol. 4, No.1, pp. 156-174, 2016.
  • M.C. Chuang and M.C. Chen, “An Anonymous Multi-Server Authenticated Key Agreement Scheme based on Trust Computing using Smart Cards and Biometrics”, Expert Systems with Applications, Vol. 41, No. 4, pp. 1411-1418, 2014.
  • D. He and D. Wang, “Robust Biometrics-Based Authentication scheme for Multi-Server Environments”, IEEE Systems Journal, Vol. 9, No. 3, pp. 1-8, 2014.
  • E.J. Yoon and K.Y. Yoo, “Robust Biometrics-based MultiServer Authentication with Key Agreement Scheme for Smart Cards on Elliptic Curve Cryptosystem”, Journal of Supercomputing, Vol. 63, No. 1, pp. 235-255, 2013.
  • A. Madero, “Password Secured Systems and Negative Authentication”, Master Thesis, Engineering Systems Division, Massachusetts Institute of Technology, pp. 1-52, 2013.
  • Al Pascual, “2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters”, Technical Report, Javelin Strategy and Research, pp. 1-82, 2013.
  • M. Jakobsson and M. Dhiman, “The Benefits of Understanding Passwords”, Available at: https://pdfs.semanticscholar.org/51a0/22d608f9ccab3a10dcf 7a48f249f7e189e6e.pdf.
  • H. Kim, W. Jeon, K. Lee, Y. Lee and D. Won, “Cryptanalysis and Improvement of a Biometrics-based Multi-Server Authentication with Key Agreement Scheme”, PLoS ONE, Vol. 13, No. 3, pp. 391-406, 2012.
  • R. Madhusudhan and R.C. Mittal, “Dynamic Id-based Remote User Password Authentication Schemes using Smart Cards: A Review”, Intelligent Algorithms for Data-Centric Sensor Networks, Vol. 35, No. 4, pp. 1235-1248, 2012.
  • M.K. Khan, S.K. Kim and K. Alghathbar, “Cryptanalysis and Security Enhancement of a ‘More Efficient and Secure Dynamic Id-based remote User Authentication Scheme”, Computer Communications, Vol. 34, No. 3, pp. 305-309, 2011.
  • L. Mary Glandence, M. Karthi and V. Maria Anu, “A Statistical Comparison of Logistic Regression and different Bayes Classification Methods for Machine Learning”, ARPN Journal of Engineering and Applied Sciences, Vol. 10, No. 14, pp. 1-14, 2015.
  • W. Stallings, “Cryptography and Network Security: Principles and Practices”, 5th Edition, Prentice-Hall, 2010.
  • M. Weir, S. Aggarwal, M. Collins and H. Stern, “Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords”, Proceedings of 17th ACM Conference on Computer and Communications Security, pp. 162-175, 2010.
  • Y. Wang, J. Liu, F. Xiao and J. Dan, “A More Efficient and Secure Dynamic Id-based Remote USER Authentication Scheme”, Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009.
  • I.E. Liao, C.C. Lee and M.S. Hwang, “A Password Authentication Scheme over Insecure Networks”, Journal of Computer and System Sciences, Vol. 72, No. 4, pp. 727-740, 2006.
  • L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.
  • L. Mary Gladence, M. Karthi and T. Ravi, “A Novel Technique for Multi-Class Ordinal Regression-APDC”, Indian Journal of Science and Technology, Vol. 9, No. 10, pp. 1-8, 2016.

Abstract Views: 183

PDF Views: 0




  • Usage of Bioinformatic Data for Remote Authentication in Wireless Networks

Abstract Views: 183  |  PDF Views: 0

Authors

R. Priscilla
Department of Information Technology, St. Joseph’s Institute of Technology, Chennai, India
M. Karthi
Department of Information Technology, St. Joseph’s Institute of Technology, Chennai, India

Abstract


Authentication is the step to approve the correctness of an attribute of a individual or entity group. Sensitive information might help in making the authentication. Regularly this encrypted information is processed via wireless network and which need remote authentication for information access process. In the proposed work, a robust authentication technique is performed, which is based on segmentation, symmetric encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. The user’s biometric signal is encrypted using a symmetric encryption method. After encrypted information is vectorized the information hiding process is accomplish using Qualified Significant Wavelet Trees (QSWTs). QSWT is effectively achieve the invisibility and resistance during attacks and stability in data hidden process. Also, the Inverse Discrete Wavelet Transform (IDWT) is applied to extract the hiding data from the stego-object subsequently an appropriate decryption process to recover the biometric image. Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. It is a very useful and efficient method of encryption because of its tendency to use less data for performing its services.

Keywords


Railway Accident, Decision Making, D3 Algorithm.

References