On the Analysis and Design of Secure Multimedia Authentication Scheme

被引:0
|
作者
Wang, Jinwei [1 ]
Lian, Shiguo [2 ]
Liu, Guangjie [3 ]
机构
[1] CETC, Res Inst 28, Nanjing 210007, Peoples R China
[2] France Telecom R&D Beijing, Beijing 100080, Peoples R China
[3] Nanjing Univ Sci & Tech, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel concept "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set" According to the relation among the aforementioned sets, the security of the authentication scheme; is exploited. Furthermore, a conclusion is drawn according to the analysis :result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle.
引用
收藏
页码:1233 / +
页数:2
相关论文
共 50 条
  • [31] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [32] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492
  • [33] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [34] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [35] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [36] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [37] A class of authentication digital watermarks for secure multimedia communication
    Xie, LH
    Arce, GR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (11) : 1754 - 1764
  • [38] A DCT-robust multimedia authentication scheme
    Li, DQ
    Feng, DG
    ANZIIS 2001: PROCEEDINGS OF THE SEVENTH AUSTRALIAN AND NEW ZEALAND INTELLIGENT INFORMATION SYSTEMS CONFERENCE, 2001, : 59 - 62
  • [39] Robust buyer authentication scheme for multimedia object
    Mukherjee, DP
    Maitra, S
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL III, PROCEEDINGS, 2003, : 97 - 100
  • [40] Content Authentication Scheme for Modifiable Multimedia Streams
    Joo, Hankyu
    MULTIMEDIA, COMPUTER GRAPHICS AND BROADCASTING, PT I, 2011, 262 : 377 - 386