On the Analysis and Design of Secure Multimedia Authentication Scheme

被引:0
|
作者
Wang, Jinwei [1 ]
Lian, Shiguo [2 ]
Liu, Guangjie [3 ]
机构
[1] CETC, Res Inst 28, Nanjing 210007, Peoples R China
[2] France Telecom R&D Beijing, Beijing 100080, Peoples R China
[3] Nanjing Univ Sci & Tech, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel concept "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set" According to the relation among the aforementioned sets, the security of the authentication scheme; is exploited. Furthermore, a conclusion is drawn according to the analysis :result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle.
引用
收藏
页码:1233 / +
页数:2
相关论文
共 50 条
  • [41] DCT-based multimedia authentication scheme
    Li, De-Quan
    Su, Pu-Rui
    Feng, Deng-Guo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (06):
  • [42] Analysis and design of a secure key exchange scheme
    Alvarez, Rafael
    Tortosa, Leandro
    Vicent, Jose-Fco.
    Zamora, Antonio
    INFORMATION SCIENCES, 2009, 179 (12) : 2014 - 2021
  • [43] A robust and secure signature scheme for video authentication
    Ahmed, Fawad
    Siyal, M. Y.
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2126 - 2129
  • [44] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [45] An Authentication Scheme for Secure Access to Healthcare Services
    Khan, Muhammad Khurram
    Kumari, Saru
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (04)
  • [46] Secure authentication scheme for session initiation protocol
    Yang, CC
    Wang, RC
    Liu, WT
    COMPUTERS & SECURITY, 2005, 24 (05) : 381 - 386
  • [47] Secure authentication scheme for IoT and cloud servers
    Department of Computer Science and Engineering, Guru Nanak Dev University, Regional Campus, Jalandhar
    Punjab
    144001, India
    不详
    Punjab
    143521, India
    Pervasive Mob. Comput., (210-223):
  • [48] An Authentication Scheme for Secure Access to Healthcare Services
    Muhammad Khurram Khan
    Saru Kumari
    Journal of Medical Systems, 2013, 37
  • [49] A Secure Authentication Scheme with Anonymity for Wireless Communications
    Wu, Chia-Chun
    Lee, Wei-Bin
    Tsaur, Woei-Jiunn
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 722 - 723
  • [50] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15