Authentication Method

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Shih-fu Chang - One of the best experts on this subject based on the ideXlab platform.

  • A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
    IEEE Transactions on Circuits and Systems For Video Technology, 2001
    Co-Authors: Ching-yung Lin, Shih-fu Chang
    Abstract:

    —Image Authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing Methods for image Authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we present an effective technique for image Authentication which can prevent malicious manipulations but allow JPEG lossy compression. The Authentication signature is based on the invariance of the relation-ships between discrete cosine transform (DCT) coefficients at the same position in separate blocks of an image. These relationships are preserved when DCT coefficients are quantized in JPEG compression. Our proposed Method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. We describe adaptive Methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling. We also present theoretical and experimental results to demonstrate the effectiveness of the technique.

  • generating robust digital signature for image video Authentication
    1998
    Co-Authors: Ching-yung Lin, Shih-fu Chang
    Abstract:

    Image/video Authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image Authentication technique that verifies the originality of the received images. The Authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video Authentication Method that generates robust signatures for compressed video. The signatures can survive some of the transcoding process of MPEG.

  • robust image Authentication Method surviving jpeg lossy compression
    Storage and Retrieval for Image and Video Databases, 1997
    Co-Authors: Ching-yung Lin, Shih-fu Chang
    Abstract:

    Image Authentication verifies the originality of an image by detecting malicious manipulations. This goal is different from that of image watermarking which embeds into the image a signature surviving most manipulations. Existing Methods for image Authentication treat all types of manipulation equally (i.e., as unacceptable). However, some applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we describe an effective technique for image Authentication which can prevent malicious manipulations but allow JPEG lossy compression. The Authentication signature is based on the invariance of the relationship between DCT coefficients of the same position in separate blocks of an image. This relationship will be preserved when these coefficients are quantized in a JPEG compression process. Our proposed Method can distinguish malicious manipulations from JPEG lossy compression regardless of how high the compression ratio is. We also show that, in different practical cases, the design of authenticator depends on the number of recompression times and on whether the image is decoded into integral values in the pixel domain during the recompression process. Theoretical and experimental results indicate that this technique is effective for image Authentication.

마이클 셴필드 - One of the best experts on this subject based on the ideXlab platform.

  • client credential based secure session Authentication Method and apparatus
    2007
    Co-Authors: 알레그잰더 셔킨, 마이클 셴필드
    Abstract:

    A secure session Authentication Method and a secure session Authentication apparatus based on a client credential are provided to maintain integrity of data by using the client credential. A secure session Authentication Method includes a process for authenticating a message between a client device(110) and a server(120) by using a client credential based Authentication Method. The secure session Authentication Method further includes a process for generating a key by using the client credential. The secure session Authentication Method further includes a process for authenticating the message between the client device and the server by using the key. The client credential is composed of a cipher. The cipher is generated repeatedly until the desired length of the key is obtained.

Hong Wen - One of the best experts on this subject based on the ideXlab platform.

  • A Data Authentication Method Based on Vector Projection for Industrial Edge Computing System
    DEStech Transactions on Computer Science and Engineering, 2019
    Co-Authors: Yi Chen, Jiang Yixin, Zhang Yunan, Hong Wen, Qianru Wang, Zhen Wang
    Abstract:

    In this paper, we consider a success rate of data Authentication for industrial edge computing system. We propose a data Authentication Method based on vector projection, which is a novel secure Authentication program. The proposed Authentication Method is divided into initial Authentication, calculating the vector projection of channel state information (CSI), and checking the validity of data frames. Experimental results show that the proposed scheme can significantly achieve a high success rate of data Authentication.

  • deep learning based physical layer Authentication for industrial wireless sensor networks
    Sensors, 2019
    Co-Authors: Runfa Liao, Hong Wen, Fei Pan, Yixin Jiang, Feiyi Xie, Minggui Cao
    Abstract:

    In this paper, a deep learning (DL)-based physical (PHY) layer Authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes’ Authentication Method, the convolutional neural network (CNN)-based sensor nodes’ Authentication Method, and the convolution preprocessing neural network (CPNN)-based sensor nodes’ Authentication Method, have been adopted to implement the PHY-layer Authentication in IWSNs. Among them, the improved CPNN-based algorithm requires few computing resources and has extremely low latency, which enable a lightweight multi-node PHY-layer Authentication. The adaptive moment estimation (Adam) accelerated gradient algorithm and minibatch skill are used to accelerate the training of the neural networks. Simulations are performed to evaluate the performance of each algorithm and a brief analysis of the application scenarios for each algorithm is discussed. Moreover, the experiments have been performed with universal software radio peripherals (USRPs) to evaluate the Authentication performance of the proposed algorithms. Due to the trainings being performed on the edge sides, the proposed Method can implement a lightweight Authentication for the sensor nodes under the edge computing (EC) system in IWSNs.

Naonobu Okazaki - One of the best experts on this subject based on the ideXlab platform.

  • on applying support vector machines to a user Authentication Method using surface electromyogram signals
    Artificial Life and Robotics, 2018
    Co-Authors: Hisaaki Yamaba, Tokiyoshi Kurogi, Kentaro Aburada, Shinichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
    Abstract:

    At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an Authentication Method that prevents shoulder surfing is needed. We are investigating a new user Authentication Method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a Method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the Method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based Method as a gesture classifier and we also discussed its security.

  • PROPOSAL AND IMPLEMENTATION OF A SHOULDER-SURFING ATTACK RESISTANT Authentication Method USING TWO SHIFT FUNCTIONS
    2016
    Co-Authors: Yoshihiro Kita, Mirang Park, Fumio Sugai, Naonobu Okazaki
    Abstract:

    Recently, mobile terminals such as smartphones have come to be widely used. Most of such mobile termi-nals store several types of important data, such as personal information. Therefore, it is necessary to lock and unlock terminals using a personal authen-tication Method such as personal identification num-bers (PIN) in order to prevent data theft. However, most existing Authentication Methods have a com-mon problem referred to as “shoulder-surfing, ” which means inferring Authentication information by watch-ing the Authentication sequence. In the present pa-per, a new icon-based Authentication Method is pro-posed that is simple but sufficiently secure even when the Authentication sequence is being watched. The proposed Method is implemented on a mobile data terminal and is evaluated through a series of experi-ments and questionnaire surveys

Ching-yung Lin - One of the best experts on this subject based on the ideXlab platform.

  • A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
    IEEE Transactions on Circuits and Systems For Video Technology, 2001
    Co-Authors: Ching-yung Lin, Shih-fu Chang
    Abstract:

    —Image Authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing Methods for image Authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we present an effective technique for image Authentication which can prevent malicious manipulations but allow JPEG lossy compression. The Authentication signature is based on the invariance of the relation-ships between discrete cosine transform (DCT) coefficients at the same position in separate blocks of an image. These relationships are preserved when DCT coefficients are quantized in JPEG compression. Our proposed Method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. We describe adaptive Methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling. We also present theoretical and experimental results to demonstrate the effectiveness of the technique.

  • generating robust digital signature for image video Authentication
    1998
    Co-Authors: Ching-yung Lin, Shih-fu Chang
    Abstract:

    Image/video Authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image Authentication technique that verifies the originality of the received images. The Authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video Authentication Method that generates robust signatures for compressed video. The signatures can survive some of the transcoding process of MPEG.

  • robust image Authentication Method surviving jpeg lossy compression
    Storage and Retrieval for Image and Video Databases, 1997
    Co-Authors: Ching-yung Lin, Shih-fu Chang
    Abstract:

    Image Authentication verifies the originality of an image by detecting malicious manipulations. This goal is different from that of image watermarking which embeds into the image a signature surviving most manipulations. Existing Methods for image Authentication treat all types of manipulation equally (i.e., as unacceptable). However, some applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we describe an effective technique for image Authentication which can prevent malicious manipulations but allow JPEG lossy compression. The Authentication signature is based on the invariance of the relationship between DCT coefficients of the same position in separate blocks of an image. This relationship will be preserved when these coefficients are quantized in a JPEG compression process. Our proposed Method can distinguish malicious manipulations from JPEG lossy compression regardless of how high the compression ratio is. We also show that, in different practical cases, the design of authenticator depends on the number of recompression times and on whether the image is decoded into integral values in the pixel domain during the recompression process. Theoretical and experimental results indicate that this technique is effective for image Authentication.