A Literature Survey on Novel Remote Authentication via Video Object and Biometrics

نویسندگان

  • T.Sathya
  • T.Krishnan
چکیده

In a wireless communications in order to share secret information between 2 or entities remote authentication could be used. It internally contains three works. The first one is the encryption of finger print image in the form of chaotic image then internally converts that chaotic image into set of vectors. The second one is the extracting human object from the video or teleconferencing or in a direct interview. Then third one is the hiding those vector value into the extracted object. Trojan horse and other attacks could be mostly occurring in cases of remote examinations or in interviewing or in personnel hiring which may create serious threats. This paper proposes a robust remote authentication mechanism based on semantic segmentation, chaotic encryption and data hiding. Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely Deployed to verify the legitimacy of remote users.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of prac...

متن کامل

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud

Rapid development of smart technologies enables use of cloud service for large-scale data storage. Remote access of original data as well as biometric data from cloud storage enhances several challenges. It is inevitable to prevent unauthorized access of data stored in cloud. Biometrics authentication is more efficient than the known traditional authentication mechanisms. Authentication is a ma...

متن کامل

Smart Cards: Remote Authentication using Biometrics

This paper presents an architecture for a secure and reliable remote authentication system, based on local biometric signature validation. Biometric systems are a more secure and reliable authentication mechanism than those that use PIN and passwords. This authentication is based on something that is unique to each person and cannot be lost or borrowed, ensuring the presence of the specific per...

متن کامل

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving

In this paper, a new multi-factor authenticated key exchange scheme, which combines with biometrics, password and the smart card, is proposed. Compared with the previous schemes, this scheme has higher security in remote authentication and preserves privacy of biometrics , and most of the previous schemes rely on the smart card to verify biometrics. The advantage of these approaches is that the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015