16
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION ARATHI JAYAPRAKASH MTECH 1 ST YEAR REG NO : 16304002 2016-2017 PONDICHERRY UNIVERSITY DEPARTMENT OF ELECTRONICS ENGINEERING

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

Embed Size (px)

Citation preview

Page 1: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA

TRANSMISIONARATHI JAYAPRAKASH

MTECH 1ST YEARREG NO : 16304002

2016-2017

PONDICHERRY UNIVERSITYDEPARTMENT OF

ELECTRONICS ENGINEERING

Page 2: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 2

INTRODUCTION

Digital images prone to error when transmitted over wireless channel

Tamper to image data could change the decision

Content based authentication is efficient which used where content does not change

Server database stores a set of images and a symmetric key through advanced encryption standard (AES)

Each image chooses an image as password from database

10/24/2016

Page 3: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 3

INTRODUCTION (contd..)

► Encrypted data transmitted via AWGN

► At receiver, extracts the features and encrypts with each user keys

► Authenticates the user with closest match

► Effectively authenticate user even under high noise and attack

10/24/2016

Page 4: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 4

OBJECTIVE

Developing the secured wireless transmission of image content by providing high authenticity

Comparing the level of authentication graph between conventional text password and image feature

10/24/2016

Page 5: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 5

PROPOSED METHOD

Authentication mainly uses convolution method to recover from noisy channels

Uses semi-fragile signature method and image signing procedure in encryption domain

It concerns with verifying authenticity of received image with some allowable and acceptable manipulations

10/24/2016

Page 6: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 6

PROPOSED METHOD (contd..)

Two problems are involved

Generated signature size is proportional to size of content

Correlation between features and bit by bit comparison causes security problem

To avoid this a content dependent key used,ie. hashing is done

10/24/2016

Page 7: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 710/24/2016

Page 8: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 810/24/2016

Page 9: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 9

PROGRAM ALGORITHM METHODS

1. 16 byte key for each user is generated and stored in database

2. Once registered ,user’s select transmission process by selecting user and image from the stored in database

3. Extraction of wavelet feature from image I done like mean and standard deviation using haar wavelet transform and encryption uses data key

4. 14 valued extracted features are encrypted using symmetric encryption

10/24/2016

Page 10: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 10

PROGRAM ALGORITHM METHODS (contd.)5. Encrypted values converted to binary and transmitted over channel

6. Baseband modulation is used and technique of bipolar coding to convert data

7. Noise is added with specific signal to noise ratio to make signal amplitude fluctuating

8. Some bits are changed as per user choice which is called tampering where actual data is made to change

10/24/2016

Page 11: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 11

PROGRAM ALGORITHM METHODS (contd.)9. At receiver ,selects images from database and extract the wavelet

features of it

10. No public key available, only data key is used

11. Encrypts the features with keys available and compare with stored database feature

12. Distance between received image feature and other features extracted from database is calculated as Euclidean distance

13. Smallest distance is assumed to be authenticated10/24/2016

Page 12: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 12

GRAPHS AND DISCUSSIONS

Rate of authentication achieved is better than conventional method i.e. text based authentication

10/24/2016

Page 13: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 13

GRAPHS AND DISCUSSIONS (contd..)

Rate of authentication achieved is better even under tampering effects. The accuracy decreases as number of tampering bytes are increased

10/24/2016

Page 14: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 14

CONCLUSION

Modified scheme of authentication for image content is proposed

No computational complexity and suitable for wireless communication and other real time applications

Image based content authentication is more robust and secure than text based password

10/24/2016

Page 15: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 15

REFERENCES

Mohammad Ziaullah, Prakash Shetty, Shoaib Kamal :’ Image Feature Based Authentication and Digital Signature for Wireless Data Transmission’ ; 2016 International Conference on Computer Communication and Informatics (Ieeel -20 16), Jan. 07 - 09, 2016, Coimbatore, INDIA

Lou D.C., Liu J.L., Li C.T.: 'Digital Signature-Based Image Authentication', in LU C.S. (EDS.): 'Multimedia security: steganography and digital water marking techniques for protection of intellectual property' (Idea Group Inc., 2003.

Schneider M., Chang S.-F.: ‘Content based digital signature for image authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp. 227-230.

Lu C.S.: 'On the security of structural information extraction/embedding for image authentication'. Proc. IEEE ISCAS'04, 2004,pp.169-172.

10/24/2016

Page 16: IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 1610/24/2016