ICTACT Journal on Image and Video Processing (Aug 2018)

USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS

  • R Priscilla,
  • M Karthi

DOI
https://doi.org/10.21917/ijivp.2018.0258
Journal volume & issue
Vol. 9, no. 1
pp. 1833 – 1837

Abstract

Read online

Authentication is the step to approve the correctness of an attribute of a individual or entity group. Sensitive information might help in making the authentication. Regularly this encrypted information is processed via wireless network and which need remote authentication for information access process. In the proposed work, a robust authentication technique is performed, which is based on segmentation, symmetric encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. The user’s biometric signal is encrypted using a symmetric encryption method. After encrypted information is vectorized the information hiding process is accomplish using Qualified Significant Wavelet Trees (QSWTs). QSWT is effectively achieve the invisibility and resistance during attacks and stability in data hidden process. Also, the Inverse Discrete Wavelet Transform (IDWT) is applied to extract the hiding data from the stego-object subsequently an appropriate decryption process to recover the biometric image. Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. It is a very useful and efficient method of encryption because of its tendency to use less data for performing its services.

Keywords