The Study of Network Authentication Methods Based on Palmprint and Digital Watermarking

Article Preview

Abstract:

Semi-fragile digital watermarking is able to distinguish between accidental attacks and malicious tampering, thus been closely watched in terms of multimedia content authentication. From the perspective of combining digital watermarking technology and palmprint identification, using the hidden and semi-fragile features of digital watermarking and the invariance character of palm information, the two-factor network authentication can be realized. The authentication enhances network security, and it is also a strong authentication scheme. The paper put forward a network authentication method based on palmprint and digital watermarking. The digital watermarking algorithm based on logistic encryption and discrete wavelets transform (DWT). The experimental results show that the algorithm has good semi-fragile feature, it can determine the authenticity of the palmprint image, so the method increases the reliability and efficiency of user authentication.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

814-817

Citation:

Online since:

September 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yao Xia, Liu Fang, Ding Ailing: Journal of Xidian University, Vol. 25 (2002), pp.628-631.

Google Scholar

[2] Sun Yinjie, Chen Zhifang, Wang Min, Hong Li: Computer Technology and Devrlopment, Vol. 18 (2008), pp.147-150.

Google Scholar

[3] Liu Fang, Research Methodology of Defocused Palmprint Feature Extraction, Shenyang University of Technology master degree thsis, (2007).

Google Scholar

[4] Han Qi, Li Qiong, Yuridia Gonzalez, Niu Xiamu: Acta Electronica Sinica, Vol. 33 (2005), pp.2331-2335.

Google Scholar

[5] Schneider B: Cornm A CM, Vol. 42 (1999), pp.136-139.

Google Scholar

[6] Zhang Chuntian, Su Yuting, Guan Xiaokang: Journal of China Institute of Communications, Vol. 21 (2000), pp.46-51.

Google Scholar

[7] Yi Kaixiang, Shi Jiaoying, Sun Xin: Journal of Image and Graphics, Vol. 6(A) (2001), pp.111-116.

Google Scholar

[8] Li Zhaohong, Hou Jianjun: Acta Electronica Sinica, Vol. 34 (2006), pp.2134-2137.

Google Scholar

[9] Sang Haifeng, Zhao Yun, Yuan Weiqi, Chen Jing: Chinese Journal of Scientific Instrument, Vol. 32 (2011), pp.2549-2556.

Google Scholar

[10] Wai Kinkong, David Zhang, Li Wenxin: Pattern Recognition, Vol. 36 (2003), pp.2339-2347.

Google Scholar