Professional Documents
Culture Documents
BIOMETRICS: A ROBUST
VIDEO-OBJECT STEGANOGRAPHIC
MECHANISM OVER WIRELESS
NETWORKS
STUDENT GUIDE
DETAILS
NAME:- CHAKRADHAR DODDA NAME:-DETAILS
BHULAKSHMI BONTHU MAM
REG NO:- 14BCE0465 CONTACT NO:- 9790862137
CONTACT NO:- 9087858799
INTRODUCTION
• Authentication is the process of recognizing a user's identity.
• It is the mechanism of associating an incoming request with a set of identifying credentials.
The credentials provided are compared to those on a file in a database of the authorized
user's information on a local operating system or within an authentication server.
• The two main directions in the authentication field are positive and negative authentication.
Positive authentication is well-established and it is applied by the majority of existing
authentication systems. Negative authentication has been invented to reduce cyber attacks.
• Biometrics has already been incorporated in remote authentication (but only as password
substitution in smart cards. In order to investigate their full potentiality, biometrics can be
incorporated in hybrid crypto-Steganographic schemes.
• Applications:-This technique reportedly has been used to detect the source of illegally
copied movies.Content identification and management.Content protection for audio and
video content
SCOPE OF THE PROJECT
MODULE 2
• THE ENCRYPTION MECHANISM:
In most contemporary schemes security of the encrypted content mainly depends on the size
of the key. In this paper, the generated key has size equal to the size of each biometric signal.
Each key is generated by a C-PRBG. C-PRBGs that are based on a single chaotic system can
be insecure, since the produced pseudorandom sequence may expose some information about
the employed chaotic system. The basic idea of the C-PRBG is to generate pseudo-random
bits by mixing three different and asymptotically independent chaotic orbits.
BLOCK DIAGRAM
REQUIREMENTS
• FUNCTIONAL REQUIREMENTS
A functional requirement defines a function of a software-system or its
component. A function is described as a set of inputs, the behavior, and outputs.
Our system requires minimum three systems to achieve this concept.
• NON-FUNCTIONAL REQUIREMENTS
Our application efficiently characterizes the server and the cluster requests
and response.
• SOFTWARE REQUIREMENT:
MATLAB 7.14 Version R2017a
• HARDWARE REQUIREMENT:
Operating System : Windows 10 (32bit)
Hardware requirements -
Processor : Intel(R) Core(TM) i3-2348M CPU @1.70GHz
Ram : 2GB
Hard Disk Capacity : 160GB
RESULTS
[1] A. Madero, Password secured systems and negative authentication. Thesis: S.M. in
Engineering and Management, Massachusetts Institute of Technology, Engineering
Systems Division, 2013. [Online]. Available: http://hdl.handle.net/1721.1/90691
[2] 2013, “Identity fraud report: Data breaches becoming a treasure trove for fraudsters,”
Javelin Strategy and Research, Tech. Rep., 2013.
[3] E.-J. Yoon and K.-Y. Yoo, “Robust biometrics-based multi-server authentication with
key agreement scheme for smart cards on elliptic curve cryptosystem,” The Journal of
Supercomputing, vol. 63, no. 1, pp. 235– 255, Jan. 2013.
[4] H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won, “Cryptanalysis and improvement of a
biometrics-based multi-server authentication with key agreement scheme,” in
Computational Science and Its Applications, ser. Lecture Notes in Computer Science,
vol. 7335. Spinger-Verlag, 2012, pp. 391–406.