Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/3454
Title: | Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks | Authors: | Tsapatsoulis, Nicolas Ntalianis, Klimis S. |
Major Field of Science: | Engineering and Technology | Field Category: | Electrical Engineering - Electronic Engineering - Information Engineering | Keywords: | Biometrics hiding;Steganographic system;Remote authentication;Biometrics;QSWTs;Video object | Issue Date: | 18-Feb-2015 | Source: | IEEE Transactions on Emerging Topics in Computing, 2015, vol. 4, no. 1, 156-174. | Volume: | 4 | Issue: | 1 | Start page: | 156 | End page: | 174 | Journal: | IEEE Transactions on Emerging Topics in Computing | Abstract: | In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes a robust authentication mechanism based on semantic segmentation, chaotic encryption and data hiding. Assuming that user X wants to be remotely authenticated, initially X’s video object (VO) is automatically segmented, using a headand-body detector. Next, one of X’s biometric signals is encrypted by a chaotic cipher. Afterwards the encrypted signal is inserted to the most significant wavelet coefficients of the VO, using its Qualified Significant Wavelet Trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in wireless networks. Finally, the Inverse Discrete Wavelet Transform (IDWT) is applied to provide the stego-object (SO). Experimental results, regarding: (a) security merits of the proposed encryption scheme, (b) robustness to steganalytic attacks, to various transmission losses and JPEG compression ratios and (c) bandwidth efficiency measures, indicate the promising performance of the proposed biometrics-based authentication scheme. | URI: | https://hdl.handle.net/20.500.14279/3454 | ISSN: | 21686750 | DOI: | 10.1109/TETC.2015.2400135 | Rights: | © IEEE | Type: | Article | Affiliation : | Cyprus University of Technology University of West Attica |
Publication Type: | Peer Reviewed |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
SCOPUSTM
Citations
26
checked on Nov 9, 2023
WEB OF SCIENCETM
Citations
20
15
Last Week
0
0
Last month
0
0
checked on Oct 29, 2023
Page view(s)
530
Last Week
1
1
Last month
4
4
checked on Nov 21, 2024
Google ScholarTM
Check
Altmetric
This item is licensed under a Creative Commons License