Mutual image-based authentication framework with JPEG2000 in wireless environment

被引:3
|
作者
Ginesu, G. [1 ]
Giusto, D. D. [1 ]
Onali, T. [1 ]
机构
[1] Univ Cagliari, Dept Elect Engn, MCLab, I-09123 Cagliari, Italy
关键词
Computer hardware - Data privacy - Data reduction - Data transfer - Electronic commerce - Image coding - Pattern recognition - Servers - Telecommunication networks;
D O I
10.1155/WCN/2006/73685
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking, require a strong level of protection, allowing for verification of legitimate users' identity and enabling the user to distinguish trusted servers from shadow ones. A novel framework for image-based authentication ( IBA) is then proposed and evaluated. In order to provide mutual authentication, the proposed method integrates an IBA password technique with a challenge-response scheme based on a shared secret key for image scrambling. The wireless environment is mainly addressed by the proposed system, which tries to overcome the severe constraints on security, data transmission capability, and user friendliness imposed by such environment. In order to achieve such results, the system offers a strong solution for authentication, taking into account usability and avoiding the need for hardware upgrades. Data and application scalability is provided through the JPEG2000 standard and JPIP framework.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [1] Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment
    G. Ginesu
    D. D. Giusto
    T. Onali
    EURASIP Journal on Wireless Communications and Networking, 2006
  • [2] A unified authentication framework for JPEG2000
    Zhang, ZS
    Qiu, G
    Sun, QB
    Lin, X
    Ni, ZC
    Shi, YQ
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 915 - 918
  • [3] Exploiting JPEG2000 and JPIP for image based authentication
    Carta, Maria Teresa
    Giusto, Daniele
    Perra, Cristian
    Podda, Barbara
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 3109 - +
  • [4] Image indexing in the JPEG2000 framework
    Liu, CP
    Mandal, M
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS, 2000, 4210 : 272 - 280
  • [5] Image authentication scheme for resisting JPEG, JPEG2000 compression and scaling
    Lin, Chih-Hung
    Hsieh, Wen-Shyong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (01) : 126 - 136
  • [6] An approach to compressed image retrieval based on JPEG2000 framework
    Tang, JG
    Zhang, WY
    Li, C
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2005, 3584 : 391 - 399
  • [7] User authentication based on JPEG2000 images
    Carta, Maria Teresa
    Podda, Barbara
    Perra, Cristian
    VISUAL CONTENT PROCESSING AND REPRESENTATION, 2006, 3893 : 207 - 213
  • [8] Wireless Image Monitoring System for Transmission Lines Based on JPEG2000
    Xu, Liangzhu
    Lei, Lin
    Wang, Jianhua
    Liu, Xunrong
    Ma, Lijuan
    POWER AND ENERGY ENGINEERING CONFERENCE 2010, 2010, : 535 - 538
  • [9] Layer Stuffing Tool for Packet-based JPEG2000 Image Authentication
    Liu, Chiang-Lung
    ISCE: 2009 IEEE 13TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2009, : 401 - 404
  • [10] JPEG2000 for wireless applications
    Islam, A
    Chebil, F
    Miled, M
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXVI, 2003, 5203 : 255 - 271