Home| Join Now | Sign In | Trainers Login              
SPIRO, Spiro, project for student, student projects

A UNIT OF SPIRO GROUP OF COMPANIES

A RESEARCH & DEVELOPMENT ORGANIZATION

For Project Enquiry +91 9791 044 044

To Search
Last Live Projects with video description
VLSI Projects, Student Projects, Best Projects, College Projects Matlab Projects, vlsi projects Final Year Projects in Chennai , Final Year Training Projects in Chennai
Slideshow Image 1
Remote Authentication via Biometrics: A Robust Video Object Steganographic Mechanism Over Wireless Networks
Post Your concept Get Project
Guidance
It is purposely dedicated for innovative students. Here we encourage students who have new concepts and projects in various domains.

For Project Title


Project Zone > Electronics > Image Processing

Social share: Facebook SPIRO Google Plus

Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks

Category : Image Processing


Sub Category : STEGANOGRAPHY


Project Code : IMP01


Project Abstract

In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes a robust authentication mechanism based on semantic segmentation, chaotic encryption and data hiding. Assuming that user X wants to be remotely authenticated, initially X’s video object (VO) is automatically segmented, using a headand- body detector. Next, one of X’s biometric signals is encrypted by a chaotic cipher. Afterwards the encrypted signal is inserted to the most significant wavelet coefficients of the VO, using its Qualified Significant Wavelet Trees (QSWTs). QSWTs provide both invisibility and significant resistance against lossy transmission and compression, conditions that are typical in wireless networks. Finally, the Inverse Discrete Wavelet Transform (IDWT) is applied to provide the stego-object (SO). Experimental results, regarding: (a) security merits of the proposed encryption scheme, (b) robustness to steganalytic attacks, to various transmission losses and JPEG compression ratios and (c) bandwidth efficiency measures, indicate the promising performance of the proposed biometrics-based authentication scheme.

 

EXISTING SYSTEM

PROPOSED SYSTEM

EXISTING CONCEPT:
      Password-based remote user authentication schemes are widely investigated, with recent research increasingly combining a user’s biometrics with a password to design a remote user authentication scheme that enhances the level of the security.

·         These papers we propose want to access different application servers. To solve an anonymous multi-server authenticating key agreement scheme based on trust computing using smart cards, password, and biometrics.

PROPOSED CONCEPT:

     In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring).

EXISTING  TECHNIQUE :

         SINGLE REGISTRATION AND ANONYMITY

PROPOSED ALGORITHM:

          QUALIFIED SIGNIFICANT WAVELET TREES (QSWTS)

TECHNIQUE DEFINITION:

          The user only needs to register with the registration center once and then can access different application servers. The privacy of the user has attracted increasing attention from both industry and academia. Therefore, anonymous authentication involves verifying that a user does not use the real identity to execute the authentication procedure.

ALGORITHM DEFINITION:        
 
 The approach is implemented as a DCT-DWT dual domain, but the authenticator watermark is not encrypted. A similar approach combining DWT and Integer Wavelet Transform (IWT) QSWTs approach is incorporated in order to select the coefficients where the encrypted biometric signal should be casted.

DRAWBACKS:

         Traceable problem: In cryptography, the user’s privacy includes anonymity and untraceability, where anonymity means that an adversary cannot obtain the user’s real identity, and untraceability means that an adversary cannot acquire the user’s behavior trajectory.

                 The distribution of PSK: The distribution of the PSK is a trade-off issue. If the PSK is only kept in the RC, the server’s compromise problem will not happen.

ADVANTAGES:
          It addresses both spatial and temporal domains, which leads to detecting various malicious changes in spatial and time domains.

          It is faster and   lower complexity compared to existing algorithms, making it practical and suitable for real-time applications

          Hiding Capacity of the secret data bits is high.

          Hiding capacity was based on the pixel number corresponding to the two highest peaks of the image histogram


 
 
MILE STONES
GUARANTEES
CONTACT US
 
Training and Developemet, Engg Projects
So far we have provided R&D training for more than 1,00,000 engineering Students.
Latest Projects 2012, Latest Technologiy Project
Had conducted seminars in the recent trends of technology at various colleges.
Our research projects had been presented in various National & International Conferences.
Most of our projects were identified by the industries as suitable for their needs.
Our n-number of students got research scholarship to extend our assisted projects for further development.
   
   
Training and Developemt, Project Development in Chennai
SPIRO guarantees small class sizes.
Final Year Projects
SPIRO guarantees quality instructors.
Student Projects, Stupros
SPIRO guarantees competence.
Projects, student projects
SPIRO guarantees that training from SPIRO will be more cost-effective than training from any other source.
Final Year Projects, Projects, student projects
SPIRO guarantees that students in open-enrollment classes are protected against cancellations and will be able to receive desired training at the cost they expect and in the time frame they have planned.
Projects for student
SPIRO guarantees overall quality with a 100% money-back guarantee. If you're not totally satisfied for any reason, simply withdraw before the second day of any class. Notify the instructor and return all course materials and you will receive a 100% refund.
SPIRO SOLUTIONS PRIVATE LIMITED
For ECE,EEE,E&I, E&C & Mechanical,Civil, Bio-Medical
#1, C.V.R Complex, Singaravelu St, T.Nagar, Chennai - 17,
(Behind BIG BAZAAR)Tamilnadu,India
Mobile : +91-9962 067 067, +91-9176 499 499
Landline : 044-4264 1213
Email: info@spiroprojects.com

For IT, CSE, MSC, MCA, BSC(CS)B.COM(cs)
#78, 3rd Floor, Usman Road, T.Nagar, Chennai-17.
(Upstair Hotel Saravana Bhavan) Tamilnadu,India
Mobile: +91-9791 044 044, +91-9176 644 044
E-Mail: info1@spiroprojects.com
About Us | Project Training | Privacy policy | Disclaimer | Contact Us

Copyright © 2015-2016 Stupros All rights reserved.