An Efficient Smart Card Based Authentication Scheme Using Image Encryption

被引:0
|
作者
Chang, Chin-Chen [1 ,2 ]
Wu, Hsiao-Ling [1 ]
Wang, Zhi-Hui [3 ]
Mao, Qian [2 ,4 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 407, Taiwan
[2] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[3] Dalian Univ Technol, Sch Software, Dalian 116, Peoples R China
[4] Shanghai Univ Sci & Technol, Dept Opt Elect & Comp Engn, Shanghai 200, Peoples R China
关键词
image encryption; torus automorphism; diffusion; authentication; smart card; ALGORITHM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To date, there are many authentication schemes have been proposed for smart cards. However, when a smart card is stolen or the authentication token is intercepted, most of these schemes will be insecure. In 2012, Chang et al. proposed an authentication scheme for smart card to avoid the aforementioned problem. They combined the smart card and image encryption technology for authentication. However, their scheme has lower quality for the restored image. Hence, we propose two image-encryption schemes in frequency domain. In the first scheme, we scramble the positions of the DCT coefficients. In the second scheme, we scramble the positions of the DCT coefficients; meanwhile, the values of the DCT coefficients are diffused. The experimental results showed that both of our proposed schemes have higher quality of the restored images with low storage.
引用
收藏
页码:1135 / 1150
页数:16
相关论文
共 50 条
  • [1] A New Card Authentication Scheme Based on Image Watermarking and Encryption
    Peng, Xinxin
    Lu, Jianfeng
    Li, Li
    Chang, Chin-Chen
    Zhou, Qili
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 358 - 369
  • [2] An Efficient and Secure Smart Card Based Authentication Scheme
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Zhang, Yong
    Wu, Tsu-Yang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1113 - 1123
  • [3] Efficient remote user authentication scheme using smart card
    Lu, RX
    Cao, ZF
    [J]. COMPUTER NETWORKS, 2005, 49 (04) : 535 - 540
  • [4] Efficient mutual authentication scheme with smart card
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. AGENT COMPUTING AND MULTI-AGENT SYSTEMS, 2006, 4088 : 813 - 818
  • [5] An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    Peng, Cong
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (04): : 390 - 401
  • [6] Cryptanalysis and improvement of an efficient password authentication scheme based on smart card
    [J]. 1600, Computer Society of the Republic of China (25):
  • [7] Cryptanalysis of an Efficient and Secure Smart Card Based Password Authentication Scheme
    Liu, Chi-Wei
    Tsai, Cheng-Yi
    Hwang, Min-Shiang
    [J]. RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 188 - 193
  • [8] An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card
    Sheik, Syed Amma
    Amutha Prabakar, M.
    [J]. International Journal of Information and Computer Security, 2021, 16 (3-4) : 207 - 225
  • [9] Robust password and smart card based authentication scheme with smart card revocation
    Xie Q.
    Liu W.-H.
    Wang S.-B.
    Hu B.
    Dong N.
    Yu X.-Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 418 - 424
  • [10] Smart card based time efficient authentication scheme for global grid computing
    Gnanaraj, Jaspher Willsie Kathrine
    Ezra, Kirubakaran
    Rajsingh, Elijah Blessing
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2013, 3 (01) : 1 - 14