Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/3454
DC FieldValueLanguage
dc.contributor.authorTsapatsoulis, Nicolas-
dc.contributor.authorNtalianis, Klimis S.-
dc.date.accessioned2015-02-06T06:30:31Z-
dc.date.accessioned2015-12-08T09:14:14Z-
dc.date.available2015-02-06T06:30:31Z-
dc.date.available2015-12-08T09:14:14Z-
dc.date.issued2015-02-18-
dc.identifier.citationIEEE Transactions on Emerging Topics in Computing, 2015, vol. 4, no. 1, 156-174.en_US
dc.identifier.issn21686750-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/3454-
dc.description.abstractIn wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes a robust authentication mechanism based on semantic segmentation, chaotic encryption and data hiding. Assuming that user X wants to be remotely authenticated, initially X’s video object (VO) is automatically segmented, using a headand-body detector. Next, one of X’s biometric signals is encrypted by a chaotic cipher. Afterwards the encrypted signal is inserted to the most significant wavelet coefficients of the VO, using its Qualified Significant Wavelet Trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in wireless networks. Finally, the Inverse Discrete Wavelet Transform (IDWT) is applied to provide the stego-object (SO). Experimental results, regarding: (a) security merits of the proposed encryption scheme, (b) robustness to steganalytic attacks, to various transmission losses and JPEG compression ratios and (c) bandwidth efficiency measures, indicate the promising performance of the proposed biometrics-based authentication scheme.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofIEEE Transactions on Emerging Topics in Computingen_US
dc.rights© IEEEen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectBiometrics hidingen_US
dc.subjectSteganographic systemen_US
dc.subjectRemote authenticationen_US
dc.subjectBiometricsen_US
dc.subjectQSWTsen_US
dc.subjectVideo objecten_US
dc.titleRemote authentication via biometrics: a robust video-object steganographic mechanism over wireless networksen_US
dc.typeArticleen_US
dc.collaborationCyprus University of Technologyen_US
dc.collaborationUniversity of West Atticaen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsOpen Accessen_US
dc.reviewPeer Revieweden
dc.countryCyprusen_US
dc.countryGreeceen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1109/TETC.2015.2400135en_US
dc.dept.handle123456789/100en
dc.relation.issue1en_US
dc.relation.volume4en_US
cut.common.academicyear2015-2016en_US
dc.identifier.spage156en_US
dc.identifier.epage174en_US
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypearticle-
item.languageiso639-1en-
crisitem.author.deptDepartment of Communication and Marketing-
crisitem.author.facultyFaculty of Communication and Media Studies-
crisitem.author.orcid0000-0002-6739-8602-
crisitem.author.parentorgFaculty of Communication and Media Studies-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

26
checked on Nov 9, 2023

WEB OF SCIENCETM
Citations 20

15
Last Week
0
Last month
0
checked on Oct 29, 2023

Page view(s) 10

501
Last Week
1
Last month
11
checked on May 13, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons