robust biometric based authentication scheme using watermarking

T.Akshaya, K.Kalaiselvi,G.R.Suresh

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 06 May,2016         Pages:1039-1045

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues facial images videos, human voice etc. Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations in remote studying or interviewing for personnel hiring. This paper proposes a robust authentication mechanism based on semantic segmentation, chaotic encryption and data hiding. Biometric verification is considered a subset of biometric authentication. The biometric technologies involved are based on the ways in which individuals can be uniquely identified through one or more distinguishing biological traits, such as fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, keystroke dynamics, DNA and signatures. Biometric authentication is the application of that proof of identity as part of a process validating a user for access to a system. Biometric technologies are used to secure a wide range of electronic communications, including enterprise security, online commerce and banking -- even just logging in to a computer or smart phone. The main aim of this project is to propose a authentication on Stenographic video object using biometrics in wireless networks and to perform robust authentication mechanism based on semantic segmentation, encryption and data hiding.

Kewords

Biometrics Hiding, Steganographic System, Remote Authentication, Biometrics, Video Object.

Reference

. A. Madero, Password secured systems and negative authentication. Thesis S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, 2013. Available: http:hdl.handle.net,1721.1.90691 2. 2013, Identity fraud report: Data breaches becoming a treasure trove for fraudsters,Javelin Strategy and Research, Tech. Rep., 2013.