Implementation of Video-Object Steganography Mechanism over Robust Remote Authentication via Biometrics

Abstract

Remote verification over remote is a tested one. Many creators proposed a considerable measure of arrangements like, the remote human confirmation plot over remote channels under misfortune tolerant transmission conventions, means to guarantee: (a) strength against translating, commotion and pressure, (b) great encryption limit, and (c) simplicity of execution. For this reason we: (an) utilize wavelet based steganography, (b) encode biometric signs to take into consideration common verification, (c) include a Disordered Pseudo-Arbitrary Piece Generator (C-PRBG) to make the keys that trigger the entire encryption to expand security, and (d) the scrambled biometric flag is covered up in a VO, which can dependably be distinguished in present day applications that include remotely coordinating. The calculations utilized as a part of the current paper was very hard to accomplish the above requirements.In proposed conspire, the strong remote verification is accomplished through three procedures like semantic segmentation, encryption and information hiding. The primary commitment of this proposed framework is, Biometrics based human verification over remote channels under blame tolerant conventions. Programmed extraction of semantically significant video objects for implanting the scrambled biometrics data. Confused figure, which works like an onetime cushion, to scramble biometrics identifiers.

Authors and Affiliations

Therasa M

Keywords

Related Articles

Comparative Survey of UNIX, Linux, Windows7 Operating System

Here I has given the Comparative Survey of Unix, Linux and Windows 7 Operating System. First in brief I has given their history. Then compared their Design principles and then compared the Security provided by Unix, Linu...

Big Data Analytics in Healthcare Industries

The healthcare industry has large amounts of data, driven by record keeping, medicine details, new era of medical needs, compliance & regulatory requirements, other stakeholders in the healthcare delivery and patient car...

கூழங்கைத் தம்பிரான் :- நன்னூல் எழுத்ததிகார உரைத்திறன்

கூழங்கைத் தம்பிரான் :- நன்னூல் எழுத்ததிகார உரைத்திறன்

Relevance of Data Mining for Presumption of Anarchy

Association in Data Mining is used to identify frequent item sets and its correlation. The broad application of association mining in research, market analysis and disease predictions are proved. But sometimes the format...

Smart City “A Dream to be true”

India has witnessed massive growth in its urban population and it is envisaged that the urban population will double to 750 million by 2050. For decades our policy planners and city administrators have been facing challe...

Download PDF file
  • EP ID EP642666
  • DOI -
  • Views 132
  • Downloads 0

How To Cite

Therasa M (2017). Implementation of Video-Object Steganography Mechanism over Robust Remote Authentication via Biometrics. International Journal of Linguistics and Computational Applications, 4(1), 43-47. https://europub.co.uk/articles/-A-642666