A New Card Authentication Scheme Based on Image Watermarking and Encryption

被引:0
|
作者
Peng, Xinxin [1 ]
Lu, Jianfeng [1 ]
Li, Li [1 ]
Chang, Chin-Chen [2 ]
Zhou, Qili [1 ]
机构
[1] Hangzhou Dianzi Univ, Inst Graph & Image, Hangzhou, Zhejiang, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, 100 Wenhwa Rd, Taichung 40724, Taiwan
基金
中国国家自然科学基金;
关键词
Image encryption; Authentication; Smart card; Fingerprint; Biological mode; ALGORITHM;
D O I
10.1007/978-3-319-53465-7_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With smart card's vast use, the security is becoming more and more important. Traditional password authentication can't meet user requirements. Many user's authentication schemes have been proposed, especially, based on image encryption. However, most existing schemes have problems of single authentication mode, low encryption intensity and poor quality of restored image. In this paper, we propose a dual authentication scheme using fingerprint biometric modality and digital watermarking techniques. Experimental results show that our dual authentication scheme is of more security, efficiency and low storage cost.
引用
收藏
页码:358 / 369
页数:12
相关论文
共 50 条
  • [1] An Efficient Smart Card Based Authentication Scheme Using Image Encryption
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    Wang, Zhi-Hui
    Mao, Qian
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (06) : 1135 - 1150
  • [2] FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Liu, Hongmei
    Rao, Junhui
    Yao, Xinzhi
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 229 - 232
  • [3] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    [J]. 2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [4] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    [J]. PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +
  • [5] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [6] A new time-frequency based fragile watermarking scheme for image authentication
    Sattar, F
    Barkat, B
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 992 - 995
  • [7] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [8] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [9] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [10] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030