On the Analysis and Design of Secure Multimedia Authentication Scheme

被引:0
|
作者
Wang, Jinwei [1 ]
Lian, Shiguo [2 ]
Liu, Guangjie [3 ]
机构
[1] CETC, Res Inst 28, Nanjing 210007, Peoples R China
[2] France Telecom R&D Beijing, Beijing 100080, Peoples R China
[3] Nanjing Univ Sci & Tech, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel concept "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set" According to the relation among the aforementioned sets, the security of the authentication scheme; is exploited. Furthermore, a conclusion is drawn according to the analysis :result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle.
引用
收藏
页码:1233 / +
页数:2
相关论文
共 50 条
  • [21] A Secure Authentication Scheme for Bluetooth Connection
    Diallo, A. S.
    Wajdi, A.
    Olanrewaju, R. F.
    Sado, F.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 60 - 63
  • [22] Secure Authentication and Management Scheme for RFID
    Seo, Dae-Hee
    Baek, Jang-Mi
    Cho, Dong-Sub
    Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 106 - 110
  • [23] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [24] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [25] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [26] A Novel Secure Authentication Scheme for VANETs
    Tiwari, Dinesh
    Bhushan, Mayank
    Yadav, Ankit
    Jain, Suman
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 287 - 297
  • [27] Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3572 - 3584
  • [28] Security analysis on "mutual authentication scheme for multimedia medical information systems"
    Karuppiah, Marimuthu
    Obaidat, Mohammad S.
    Islam, S. K. Hafizul
    Vijayakumar, Pandi
    SECURITY AND PRIVACY, 2019, 2 (03)
  • [29] The Design and Analysis of Distributed Authentication Scheme in VANET
    Wang, Jian
    Liu, Yanheng
    Jiao, Yu
    2009 IEEE YOUTH CONFERENCE ON INFORMATION, COMPUTING AND TELECOMMUNICATION, PROCEEDINGS, 2009, : 15 - 18
  • [30] An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments
    Mahmood, Khalid
    Akram, Waseem
    Shafiq, Akasha
    Altaf, Izwa
    Lodhi, Muhammad Ali
    Islam, S. K. Hafizul
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 88