Final
Final
Presented By:
Chaitra.P (1DA17LDN01)
• Something you are: Inherence Factors (such as a fingerprint or other biometric method)
6. Title: An anonymous multi-server authenticated key agreement scheme based on trust computing using
smart cards and biometrics
Method:
• The authentication schemes are designed for a single server environment and result in users needing to register
many times when they want to access different application servers.
• To solve this problem, the author (Ming-Chin Chuang)propose an anonymous multi-server authenticating key
agreement scheme based on trust computing using smart cards, password, and biometrics.
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might
involve confirming the identity of a person or software program, tracing the origins of an artifact, or
ensuring that a product is what its packaging and labelling claims to be.
The proposed remote human authentication scheme over wireless channels under loss tolerant
transmission protocols, aims to ensure:
1. PC
2. RAM minimum 2GB
3. HDD minimum 100GB
• Software requirement:
The two main directions in the authentication field are positive and negative authentication.
• The proposed scheme is a Positive Authentication System and for security reasons
elements from at least two, and preferably all three, factors like (Ownership,
Knowledge, Inherence ) should be verified.
Step 1: Load encrypted video with hidden data and convert it into frames
Step 2: The video is De-compressed using IDCT
Step 3: Apply DWT Watermarking detection module
Step 4: Enter the decryption password and decrypt biometric signal(Chaos Decryption)
Step 5: Extract original biometric signal
– Steganographic system:
• The art and science of hiding information by embedding messages within other, seemingly
harmless messages. Steganography works by replacing bits of useless or unused data in
regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of
different, invisible information.
• The System that works with Steganographic techniques is said to be Steganographic System.
– Video Object:
• Video shows what object means. A thing that has physical existence.. The goal, end or purpose
of something.
• In numerical analysis and functional analysis, a discrete wavelet transform (DWT) is any
wavelet transform for which the wavelets are discretely sampled.
• As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution: it
captures both frequency and location information (location in time).
• In signal processing using Fourier transform, the signal is decomposed into a series of sines or cosines. It is
impossible to know simultaneously the exact frequency and the exact time of occurrence of that particular
frequency in a signal.
• In order to know the frequency, the signal must be spread in time, or vice versa. A solution is to split the signal up
into components that are not sine or cosine waves.
• A single function and its dilations and translations may be used to generate a set of ortho-normal basis functions
to represent a signal. This would help to condense the information in both the time and frequency domains. This
idea led to the introduction of wavelets.
Morlet Wavelet
Translation of a Wavelet Scaling of a Wavelet
• Image compression is minimizing the size in bytes of a graphics file without degrading the
quality of the image to an unacceptable level.
• The reduction in file size allows more images to be stored in a given amount of disk or
memory space. It also reduces the time required for images to be sent over the Internet or
downloaded from Web pages.
— Image Processing refers to processing an image into digital image. Image Compression is
reducing the amount of data necessary to denote the digital image. Image Compression techniques
to reduce redundancy in raw Image.
Fig5:Image Compression
Dr.AIT ,Department of TCE ,MTECH,DCN
22
Discrete Cosine Transform (DCT)
• A correlation matrix is a table showing correlation coefficients between variables. Each pixel in
the matrix shows the correlation between two Images.
• A correlation matrix is used as a way to summarize data, as an input into a more advanced
analysis, and as a diagnostic for advanced analyses.
Histogram
• An image histogram is a chart that shows the distribution of intensities in an indexed or grayscale image.
• For the above mentioned biometric image, the similarity between encrypted and original images is
3.581% which means, the encrypted Secret image is difficult to retrieve by the intruders or
attackers.
• The Stego Image is obtained by DWT Watermarking Steganographic technique and the Vectorized
Encrypted Biometric Image is hidden in the Cover Image obtained by webcam.
• Before transmission the Stego Image is compressed by DCT Compression to efficiently utilize the
Bandwidth.
• MSE measures the average of the squares of the errors, which is, the average of the squared difference
between the estimated values and what is estimated.
MSE is the mean of the squares of errors in two images I1, I2 Where M and N
represents the dimensions of two images of same size.
In the result obtained, the value of the MSE is 0.82806 which is small value and hence,
this image is better for transmission.
• In the PSNR formula, the format of the image decides the value of R. If the format of the image is 8 bit,
R = 255. If the format of the image is expressed using floating point numbers then, R = 1.
• Acceptable values for the PSNR in lossy image and video compression ranges from 30 and 50 dB,
provided the bit depth is 8 bits, where higher is better. For 16-bit data values the PSNR range from
60 and 80 dB. Usually, the acceptable values for wireless transmission with minimum quality loss
are considered, which lies in the range of 20 dB to 25 dB.
• In the result obtained, the value of the PSNR is 43.808 dB which provides better lossy compression at
transmitting end.
• BER is the ratio of (number of bit errors) to (total number of transferred bits) during a studied
time interval. BER is expressed in negative power.
• In the above result obtained, the BER is (-14250.00000) where BER is 10 to the minus 4, this means that
out of (around 10,000) bits transmitted, 1 had an error. This value is good for transmitting the information
with less error.
• Same parameters are considered, at receiving end and compared for the analysis of proposed method
• As the Image is transmitted through the noisy channel the MSE value increased and PSNR value
decreased. But the bit error rate remains almost the same.
• At the receiving end, the values of the parameters are much better compared to the transmitting end.
(b) Efficient bandwidth usage, since most of the used bandwidth transmits information relevant to the
authentication process, and
(c) Efficient rate control, since in case of traffic congestion/reduction of QoS, the rate control mechanism could
discard blocks from the body region that do not also contain hidden information, instead of discarding face
blocks. This is the content-awareness merit of the proposed bandwidth-friendly scheme .
Dr.AIT ,Department of TCE ,MTECH,DCN 29
CONCLUSION
• Result analysis and its detailed theoretical explanation illustrate the performance of the
proposed system in terms of security. The system is also able to recover the hidden
encrypted biometric signal under different losses. and all these merits are accompanied
by efficient bandwidth usage.
• Biometric signals enter more and more into our everyday lives, since governments,
as well as other organizations, resort to their use in accomplishing crucial
procedures (e.g. citizen authentication). Thus there is an urgent need to further
develop and integrate biometric authentication techniques into practical
applications.
• This method provides a high security and easy way to encrypt, embedding and decrypt
secret image without effecting the quality of images(secret or cover).
• The use of DWT Watermarking and DCT Compression provides high levels of
robustness, keeping at the same time the ease of implementation and the compatibility
to well-known and widely used Image and Video compression