You are on page 1of 24

DEPARTMENT OF TELECOMMUNICATION ENGINEERING

Dr. AMBEDKAR INSTITUTE OF TECHNOLOGY


(An Autonomous Institute Affiliated to VTU)
Near Jnana Bharathi Campus, Bengaluru – 560056

Project phase-II
Project Review [LDNP43] on:
Remote Authentication via Biometrics

Presented By:
Chaitra.P (1DA17LDN01)

Guide :
Sudha.H.Thimmaiah
Assoc.Prof
COMPANY /
GUIDES JOB TITLE INSTITUTION
Guide Dr. Ambedkar Institute of
Sudha.H.Thimmaiah Assoc. Professor
Technology

Co-Guide and Usharani M.A. Asst. Professor Dr. Ambedkar Institute of


Examiner Technology

Dr.AIT ,Department of TCE ,MTECH,DCN


2
What is Remote User Authentication?
•Remote user authentication is a mechanism in which the remote server verifies the
legitimacy of a user over an insecure communication channel.

•An ideal password authentication schemes should satisfy and achieve all of these.

Dr.AIT ,Department of TCE ,MTECH,DCN


2
• Something you know: Knowledge Factors (such as a password)

• Something you have: Ownership Factors (such as a smart card)

• Something you are: Inherence Factors (such as a fingerprint or other biometric method)

• The authentication must happen in person (i.e..


account holder, laptop user, desktop, mobile phone
user etc..) which is more secured than any other
factors mentioned above.

Dr.AIT ,Department of TCE ,MTECH,DCN 4


1. Title: An Introduction to Biometric Recognition
Method:
• By using biometrics it is possible to confirm or establish an individual’s identity based on “who she is”,
rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password).
• The author (Anil K. Jain, Arun Ross and Salil Prabhakar) gives a brief overview of the field of
biometrics and summarizes some of its advantages, disadvantages, strengths, limitations, and related
privacy concerns.

2. Title: Cryptanalysis and improvement of a biometrics-based multi-server authentication with key


agreement scheme
Method:
• A robust biometrics based multi-server authentication with key agreement scheme for smart cards on
elliptic curve cryptosystem.
• The author,(Hakhyun Kim, Woongryul Jeon, Yunho Lee and Dongho Won ) however, show that Yoon
et al.’s scheme is vulnerable to off-line password guessing attack and propose an improved scheme to
prevent the attack.

Dr.AIT ,Department of TCE ,MTECH,DCN 5


3. Title: Dynamic ID-based remote user password authentication schemes using smart cards
Method:
• Until now, there have been ample of remote user authentication schemes published in the literature and
each published scheme has its own merits and demerits.
• The author (R.K Madhusudhan ) provides a scheme which allows the users to choose and change their
passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can
resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.

4. Title: Password secured systems and negative authentication


Method:
• Today’s industry, government, and critical infrastructure and independent on software systems. In their
absence, our modern world would come to a stop. Given the dependence, the mounting cyber threat is of
critical concern.
• The author,(Hakhyun Kim, Woongryul Jeon, Yunho Lee and Dongho Won ) scheme presents the state
of the practice in password systems and introduces work in negative authentication and implementations.

Dr.AIT ,Department of TCE ,MTECH,DCN 6


5. Title: Robust authentication based multi-server key agreement scheme for smart cards on elliptic curve
cryptosystem
Method:
• It is extremely tedious for users to register numerous servers. In order to resolve this problem, various multi-
server authentication schemes recently have been proposed. However, these schemes are insecure against some
cryptographic attacks or inefficiently designed because of high computation costs.
• The author (E.J. Yoon and K.Y. Yoo) a new efficient and secure biometrics-based multi-server authentication
with key agreement scheme for smart cards on elliptic curve cryptosystem(ECC) without verification table to
minimize the complexity of hash operation among all users and fit multi-server communication environments.
• By adopting the biometrics technique, the proposed scheme can provide more strong user authentication
function.

6. Title: An anonymous multi-server authenticated key agreement scheme based on trust computing using
smart cards and biometrics
Method:
• The authentication schemes are designed for a single server environment and result in users needing to register
many times when they want to access different application servers.
• To solve this problem, the author (Ming-Chin Chuang)propose an anonymous multi-server authenticating key
agreement scheme based on trust computing using smart cards, password, and biometrics.

Dr.AIT ,Department of TCE ,MTECH,DCN 7


• In wireless communications, sensitive information is frequently exchanged,
requiring remote authentication.

• In order to investigate their full potentiality and provide complete security,


biometrics can be incorporated in hybrid Crypto-Steganographic schemes.

• In particular, cryptographic algorithms can scramble biometric signals so that they


cannot be understood, while steganographic methods can hide the encrypted
biometric signals so that they cannot be seen.

Dr.AIT ,Department of TCE ,MTECH,DCN 7


Authentication is the act of confirming the truth of an attribute of a datum or entity. This might
involve confirming the identity of a person or software program, tracing the origins of an artifact, or
ensuring that a product is what its packaging and labelling claims to be.

The proposed remote human authentication scheme over wireless channels under loss tolerant
transmission protocols, aims to ensure:

(A) Robustness against Deciphering, Noise and Compression,


(B) Good Encryption Capacity, And
(C) Ease Of Implementation.

For This Purpose We:

• Employ Wavelet-Based Steganography, TELECONFERENCE


• Encrypt Biometric Signals To Allow For Natural Authentication,
• Involve A Chaotic Pseudo-Random Bit Generator (C-Prbg) to create the keys that trigger the
whole encryption to increase security, and
• The Encrypted Biometric Signal is hidden in a Vo, which can reliably be detected in modern
applications that involve Teleconferencing.
Dr.AIT ,Department of TCE ,MTECH,DCN
8
• Hardware requirement:

1. PC
2. RAM minimum 2GB
3. HDD minimum 100GB

• Software requirement:

1. MATLAB 7.0/2018b

Dr.AIT ,Department of TCE ,MTECH,DCN


10
The two main directions in the authentication field are positive and negative authentication.

• Positive authentication is well-established and it is applied by the majority of existing


authentication systems.
• Negative authentication has been invented to reduce cyber attacks.

• The proposed scheme is a Positive Authentication System and for security reasons
elements from at least two, and preferably all three, factors like (Ownership,
Knowledge, Inherence ) should be verified.

Dr.AIT ,Department of TCE ,MTECH,DCN


10
Dr.AIT ,Department of TCE ,MTECH,DCN
11
Sender side Algorithm:

Step1: Input the video and frames separation.


Step2: Video object is extracted from the video.
Step3: Select the secret frame from video object in which data is to be hidden.
Step4: Apply Hiding module
• Take biometric signal
• Encrypt biometric signal using secret key
• Vectorize encrypted biometric signal
• Apply DWT and sub band decomposition
• Apply QSWT estimation
Step 5: Create video using stego-object

Dr.AIT ,Department of TCE ,MTECH,DCN


10
Receiver side Algorithm:

Step 1: Load encrypted video with hidden data and convert it into frames
Step 2: Decompress the video
Step 3: Apply QSWT detection module
Step 4: Enter the decryption password and decrypt biometric signal
Step 5: Extract original biometric signal

Initially the biometric signal is encrypted by incorporating a chaotic pseudo-random bit


generator and a chaos driven cipher, based on mixed feedback and time variant S-boxes.

The use of such an encryption mechanism is justified since,


1) Chaos presents sensitivity to initial conditions,
2) A C-PRBG statistically works very well as a one-time pad generator.

Dr.AIT ,Department of TCE ,MTECH,DCN


10
Key Techniques used:

– Biometric Hiding:

• Biometric security devices measure unique characteristics of a person, such as voice pattern,
the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely
difficult for someone to break into a system.
• In this proposed method, a biometric is hidden in another biometry of the same person to
provide double Authentication.

– Steganographic system:

• The art and science of hiding information by embedding messages within other, seemingly
harmless messages. Steganography works by replacing bits of useless or unused data in
regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of
different, invisible information.
• The System that works with Steganographic techniques is said to be Steganographic System.

Dr.AIT ,Department of TCE ,MTECH,DCN 15


Key Techniques used:

– Video Object:

• Video shows what object means. A thing that has physical existence.. The goal, end or purpose
of something.

– QSWT (Qualified Significant Wavelet Trees) Technique:

• It is one of the most efficient algorithms of literature that facilitates robust hiding of visually
recognizable patterns,
• It is hierarchical and has multi-resolution characteristics,
• The embedded information is hard to detect by the human visual system (HVS),
• It is among the best known techniques with regards to survival of hidden information after image
compression.

Dr.AIT ,Department of TCE ,MTECH,DCN 16


Video Object Extraction
Step 1: Consider the Image taken from Webcam

1. Resize the Image to a particular scale.(400,400 is considered here)


2. Convert the Image obtained into Black and White Image.
3. Using (Command: bwareaopen) Remove small objects from binary
Image.
4. Using (Command: strel) Morphological structuring element.
The required Structure or the part of the Image is only retained.
5. Using(Command: Imerode) erodes the gray-scale, binary, or packed
binary image IM, returning the eroded image IM2
6. Using(Command: bwlabel) Label connected components in 2-D binary
image
7. Using (Command: regionprops) returns measurements for the set of
properties specified by properties for each 8-connected component
(object) in the binary image(Properties:'BoundingBox','Area','Centroid').

Dr.AIT ,Department of TCE ,MTECH,DCN 17


Video Object Extraction Cntd…….

8.Using(Command: Find) Find indices and values of nonzero elements.


9.Consider a zeros matrix of the same size as the resized Image.
10.The area of segmented part in Zeros matrix is made 1.
11. (Command: imdilate) is used for smoothening of the image
Encryption of the Secret Image
Step2: Consider the Secret Image to be hidden i.e (Biometric Signals Image)
• Using Chaotic Encryption Method a Random array is generated and Bit
XOR’ed with Secret Image to obtain the Encrypted Image.
• The Vectorized output of Biometric Signal is obtained.

Tasks to be Completed:
1. Data is Transmitted by Hiding the Secret Image in Cover Image.
2. The Secret Image and Cover Image must be separated .
3. The Host Video Object is stored.

Dr.AIT ,Department of TCE ,MTECH,DCN 18


Results
• Result obtained While considering an Image

Dr.AIT ,Department of TCE ,MTECH,DCN 19


Results
• Results obtained while considering webcam snapshot

Dr.AIT ,Department of TCE ,MTECH,DCN 20


This method provides a robust authentication mechanism based on semantic
segmentation, chaotic encryption, and data hiding.

• It is one of the most efficient algorithms of literature that facilitates robust


hiding of visually recognizable patterns.

• The embedded information is hard to detect by the human visual system.


• Biometrics is inherently more reliable.
• Biometric traits cannot be lost or forgotten.
• They are more difficult to forge.

Dr.AIT ,Department of TCE ,MTECH,DCN 12


• Authentication is the act of conforming the truth of an attribute of a datum or entity.
In this method a robust and more accurate authentication mechanism based on
semantic segmentation, chaotic encryption, and data hiding.

• Biometric signals enter more and more into our everyday lives, since governments,
as well as other organizations, resort to their use in accomplishing crucial
procedures (e.g. citizen authentication). Thus there is an urgent need to further
develop and integrate biometric authentication techniques into practical
applications.

Dr.AIT ,Department of TCE ,MTECH,DCN 22


• This method provides a high security and easy way to encrypt, embedding and
decrypt secret image without effecting the quality of images(secret or cover).

• The use of QSWT’s provides high levels of robustness, keeping at the same time
the ease of implementation and the compatibility to well-known and widely used
Image and Video compression

• All these merits are accompanied by efficient bandwidth usage

Dr.AIT ,Department of TCE ,MTECH,DCN 23


Thank you

You might also like