By Topic

On the analysis and design of secure multimedia authentication scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jinwei Wang ; 28th Res. Inst, CETC, Nanjing ; Shiguo Lian ; Guangjie Liu

In this paper, a novel concept "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "cover authentication set", "attack authentication set", "watermark-based authentication set" or "signature-based authentication set", "verified authentication set" and "malicious-attack authentication set". According to the relation among the aforementioned sets, the security of the authentication schemes is exploited. Furthermore, a conclusion is drawn according to the analysis result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle.

Published in:

Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on

Date of Conference:

25-27 Aug. 2008