Dynamical Digital Authentication for Wireless Domain With Randomized Dispersing of Multiple Secret Signatures

Soumit Chowdhury, Arkadip Ray, R. Mukherjee, N. Ghoshal
{"title":"Dynamical Digital Authentication for Wireless Domain With Randomized Dispersing of Multiple Secret Signatures","authors":"Soumit Chowdhury, Arkadip Ray, R. Mukherjee, N. Ghoshal","doi":"10.1109/WISPNET.2018.8538754","DOIUrl":null,"url":null,"abstract":"The work promotes reliable dynamical validations for transmitted e-documents using session wise randomly hidden secret multi-signatures. Client triggers this protocol by deriving the random circular sequencing of such invisible signatures onto the cover image e-document. Additional security and authenticity criteria met with dynamical orientations of hidden signature bits on concern sub block pixel bytes of the cover image. Vitally both these dynamical fabrications are fully governed by the respective mathematical operations executed on client-server based mutual secret key and session random challenge. Hence, same dynamical authentications for those valid copyright signatures can also be complied at the server end. Apart from that multi-copy signature dispersing with hosting of each individual signature copy on each separate regions of the cover image serves better authenticity and robustness under attacks. Further region wise varied transforms on sub image blocks with variable threshold range driven sign bit encoding on separate transformed pixel bytes of such sub blocks ensures excellent robustness and recovery of signatures. Finally, exhaustive experimental results also confirmed strong superiority of this scheme over existing works with significant enhancements on standard evaluation parameters. Overall, this protocol reflects better trusted authentication, confidentiality and non-repudiation for wireless digital transmissions in contrast to the current ideas.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"150 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISPNET.2018.8538754","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The work promotes reliable dynamical validations for transmitted e-documents using session wise randomly hidden secret multi-signatures. Client triggers this protocol by deriving the random circular sequencing of such invisible signatures onto the cover image e-document. Additional security and authenticity criteria met with dynamical orientations of hidden signature bits on concern sub block pixel bytes of the cover image. Vitally both these dynamical fabrications are fully governed by the respective mathematical operations executed on client-server based mutual secret key and session random challenge. Hence, same dynamical authentications for those valid copyright signatures can also be complied at the server end. Apart from that multi-copy signature dispersing with hosting of each individual signature copy on each separate regions of the cover image serves better authenticity and robustness under attacks. Further region wise varied transforms on sub image blocks with variable threshold range driven sign bit encoding on separate transformed pixel bytes of such sub blocks ensures excellent robustness and recovery of signatures. Finally, exhaustive experimental results also confirmed strong superiority of this scheme over existing works with significant enhancements on standard evaluation parameters. Overall, this protocol reflects better trusted authentication, confidentiality and non-repudiation for wireless digital transmissions in contrast to the current ideas.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
随机分散多重秘密签名的无线域动态数字认证
该工作采用会话智能随机隐藏秘密多重签名,促进了传输电子文档的可靠动态验证。客户端通过在封面图像电子文档上导出这些不可见签名的随机循环序列来触发此协议。在封面图像的相关子块像素字节上隐藏签名位的动态方向满足附加的安全性和真实性标准。实际上,这两种动态构造都完全由各自在基于客户端-服务器的相互秘密密钥和会话随机挑战上执行的数学操作控制。因此,对于那些有效的版权签名,也可以在服务器端进行相同的动态认证。此外,多副本签名分散托管每个单独的签名副本在封面图像的每个单独的区域提供更好的真实性和鲁棒性攻击。在子图像块上进一步进行区域可变变换,对这些子块的单独变换像素字节进行可变阈值范围驱动的符号位编码,确保了签名的出色鲁棒性和恢复性。最后,详尽的实验结果也证实了该方案较现有方案具有较强的优越性,在标准评价参数上有显著提高。总的来说,与目前的想法相比,该协议反映了无线数字传输更好的可信身份验证、机密性和不可否认性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Deep Reinforcement Learning for the Capacitated Vehicle Routing Problem with Soft Time Window Integrated Interference Solutions Between 5G and Satellite Systems Modulation Recognition Method of MAPSK Signal Artificial Intelligence Routing Method in Wireless Sensor Network for Sewage Treatment Monitoring Electromagnetically Induced Transparency in a Coupled NV Spin-Mechanical Resonator System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1