USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS

Journal Title: ICTACT Journal on Image and Video Processing - Year 2018, Vol 9, Issue 1

Abstract

Authentication is the step to approve the correctness of an attribute of a individual or entity group. Sensitive information might help in making the authentication. Regularly this encrypted information is processed via wireless network and which need remote authentication for information access process. In the proposed work, a robust authentication technique is performed, which is based on segmentation, symmetric encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. The user’s biometric signal is encrypted using a symmetric encryption method. After encrypted information is vectorized the information hiding process is accomplish using Qualified Significant Wavelet Trees (QSWTs). QSWT is effectively achieve the invisibility and resistance during attacks and stability in data hidden process. Also, the Inverse Discrete Wavelet Transform (IDWT) is applied to extract the hiding data from the stego-object subsequently an appropriate decryption process to recover the biometric image. Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. It is a very useful and efficient method of encryption because of its tendency to use less data for performing its services.

Authors and Affiliations

Priscilla R, Karthi M

Keywords

Related Articles

EDGE DETECTION USING MULTISPECTRAL THRESHOLDING

Edge detection is a fundamental tool in image processing and computer vision, particularly in the areas of feature detection and extraction. Among various edge detection methods, Otsu method is one of the best optimal th...

REMOVAL OF UNWANTED OBJECTS FROM IMAGES USING STATISTICS

Nowadays with cheap digital cameras and the easy availability of camera enabled smartphones, people have been taking a lot of photos. But many a times, it happens that the photos clicked have some unwanted objects appear...

IMPROVEMENT IN DETECTION ACCURACY OF DIGITAL MAMMOGRAM USING POINT TRANSFORM AND DATA MINING TECHNIQUE

Cancer is one of the dangerous diseases faced by humans. Every one out of 100 women is facing breast cancer. So, to overcome this huge ratio many researches are being carried out. Prevention is better than cure; this pap...

DEVELOPING A REAL TIME ALGORITHM FOR DIAGNOSING GLAUCOMA

A Glaucoma is a group of eye diseases causing optic nerve damage and if not detected at an early stage it may cause permanent blindness. Glaucoma progression precedes some structural damage to the retina are the symptoms...

COMPARISON OF CONTOUR FEATURE BASED AND INTENSITY BASED INSAT-3D MET IMAGES COREGISTRATION FOR SUB PIXEL ACCURACIES

Image registration in meteorological images that are acquired continuously for their use in weather forecast activities and other related scientific analysis is a critical requirement. Meteorological images are obtained...

Download PDF file
  • EP ID EP522283
  • DOI 10.21917/ijivp.2018.0258
  • Views 59
  • Downloads 0

How To Cite

Priscilla R, Karthi M (2018). USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS. ICTACT Journal on Image and Video Processing, 9(1), 1833-1837. https://europub.co.uk/articles/-A-522283