Professional Documents
Culture Documents
Project phase-II
Project Review [LDNP43] on:
Remote Authentication via Biometrics
Presented By:
Chaitra.P (1DA17LDN01)
Guide :
Sudha.H.Thimmaiah
Assoc.Prof
COMPANY /
GUIDES JOB TITLE INSTITUTION
Guide Dr. Ambedkar Institute of
Sudha.H.Thimmaiah Assoc. Professor
Technology
•An ideal password authentication schemes should satisfy and achieve all of these.
• Something you are: Inherence Factors (such as a fingerprint or other biometric method)
6. Title: An anonymous multi-server authenticated key agreement scheme based on trust computing using
smart cards and biometrics
Method:
• The authentication schemes are designed for a single server environment and result in users needing to register
many times when they want to access different application servers.
• To solve this problem, the author (Ming-Chin Chuang)propose an anonymous multi-server authenticating key
agreement scheme based on trust computing using smart cards, password, and biometrics.
The proposed remote human authentication scheme over wireless channels under loss tolerant
transmission protocols, aims to ensure:
1. PC
2. RAM minimum 2GB
3. HDD minimum 100GB
• Software requirement:
1. MATLAB 7.0/2018b
• The proposed scheme is a Positive Authentication System and for security reasons
elements from at least two, and preferably all three, factors like (Ownership,
Knowledge, Inherence ) should be verified.
Step 1: Load encrypted video with hidden data and convert it into frames
Step 2: Decompress the video
Step 3: Apply QSWT detection module
Step 4: Enter the decryption password and decrypt biometric signal
Step 5: Extract original biometric signal
– Biometric Hiding:
• Biometric security devices measure unique characteristics of a person, such as voice pattern,
the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely
difficult for someone to break into a system.
• In this proposed method, a biometric is hidden in another biometry of the same person to
provide double Authentication.
– Steganographic system:
• The art and science of hiding information by embedding messages within other, seemingly
harmless messages. Steganography works by replacing bits of useless or unused data in
regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of
different, invisible information.
• The System that works with Steganographic techniques is said to be Steganographic System.
– Video Object:
• Video shows what object means. A thing that has physical existence.. The goal, end or purpose
of something.
• It is one of the most efficient algorithms of literature that facilitates robust hiding of visually
recognizable patterns,
• It is hierarchical and has multi-resolution characteristics,
• The embedded information is hard to detect by the human visual system (HVS),
• It is among the best known techniques with regards to survival of hidden information after image
compression.
Tasks to be Completed:
1. Data is Transmitted by Hiding the Secret Image in Cover Image.
2. The Secret Image and Cover Image must be separated .
3. The Host Video Object is stored.
• Biometric signals enter more and more into our everyday lives, since governments,
as well as other organizations, resort to their use in accomplishing crucial
procedures (e.g. citizen authentication). Thus there is an urgent need to further
develop and integrate biometric authentication techniques into practical
applications.
• The use of QSWT’s provides high levels of robustness, keeping at the same time
the ease of implementation and the compatibility to well-known and widely used
Image and Video compression