Implementation of Video-Object Steganography Mechanism over Robust Remote Authentication via Biometrics

Abstract

Remote verification over remote is a tested one. Many creators proposed a considerable measure of arrangements like, the remote human confirmation plot over remote channels under misfortune tolerant transmission conventions, means to guarantee: (a) strength against translating, commotion and pressure, (b) great encryption limit, and (c) simplicity of execution. For this reason we: (an) utilize wavelet based steganography, (b) encode biometric signs to take into consideration common verification, (c) include a Disordered Pseudo-Arbitrary Piece Generator (C-PRBG) to make the keys that trigger the entire encryption to expand security, and (d) the scrambled biometric flag is covered up in a VO, which can dependably be distinguished in present day applications that include remotely coordinating. The calculations utilized as a part of the current paper was very hard to accomplish the above requirements.In proposed conspire, the strong remote verification is accomplished through three procedures like semantic segmentation, encryption and information hiding. The primary commitment of this proposed framework is, Biometrics based human verification over remote channels under blame tolerant conventions. Programmed extraction of semantically significant video objects for implanting the scrambled biometrics data. Confused figure, which works like an onetime cushion, to scramble biometrics identifiers.

Authors and Affiliations

Therasa M

Keywords

Related Articles

A Systematic Parameter Adaption Scheme in APSO

An adaption feature of particle swarm optimization features have better search efficiency than particle swarm optimization (PSO) is presented. It can perform a global search over the entire search space with faster conve...

Asymptotic Analysis in Secured Message Delivery

Wireless networking is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equip...

Christopher Marlowe’s Modernity in His Poetry, Religion and Drama

This paper will treat of Marlowe’s dramatic principles based on religion and poetry. The protagonists of Marlowe’s plays will appear to be slaves of their respective passion. In pursuing their objects of passion all of t...

Big Data Analytics in Geographic Information System

Geography is an art of understanding the location through which the people can commute. The study of this art would make the human race more effective in terms of infra-structure development, agricultural development, ec...

நடன மரபும் – நித்திய சுமங்கலி வாழ்வும்

நடன மரபும் – நித்திய சுமங்கலி வாழ்வும் என்னும் இக்கட்டுரை நித்திய சுமங்கலிகள் பற்றிய சில தகவல்களை தொரிந்து கொள்ளும் முறையாக இக்கட்டுரை வரையப்படுகின்றது. பல்வேறு ஆய்வுக்குரிய விடயமாக தேவதாசி வாழ்வியல் முறை காணப்படுகின்றது...

Download PDF file
  • EP ID EP642666
  • DOI -
  • Views 138
  • Downloads 0

How To Cite

Therasa M (2017). Implementation of Video-Object Steganography Mechanism over Robust Remote Authentication via Biometrics. International Journal of Linguistics and Computational Applications, 4(1), 43-47. https://europub.co.uk/articles/-A-642666