Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme

Authentication is the important issue over the internet. It results in need of robust security services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with Cascade forward back propagation neural network. The proposed (n, n) Shamir secret sharing scheme is implemented successfully for share encryption and decryption process. It reveals the secret only and only when all the n number of participants are available at the reconstruction process. The generated shares have a best quality so that human brain cant predict the original secret by any combination. The neural network is already trained for RGB image database and images are stored in particular group having a group category number which is to be predicted as output of neural network. For testing purpose, we take an image, store it in a group, create its shares and now identifies to which group it belongs. The neural network here provides the correct group of that image which we have trained earlier.

[1]  Donghui Guo,et al.  Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing , 2006, 2006 International Conference on Computational Intelligence and Security.

[2]  Xiaojiang Du,et al.  Two matrices for Blakley's secret sharing scheme , 2012, 2012 IEEE International Conference on Communications (ICC).

[3]  Mitsugu Iwamoto A Weak Security Notion for Visual Secret Sharing Schemes , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Bhavani M. Thuraisingham,et al.  Secure Data Objects Replication in Data Grid , 2010, IEEE Transactions on Dependable and Secure Computing.

[5]  Achour Mostéfaoui,et al.  Low-Cost Secret-Sharing in Sensor Networks , 2010, 2010 IEEE 12th International Symposium on High Assurance Systems Engineering.

[6]  B TRajendraA,et al.  A New Approach to Analyze Visual Secret Sharing Schemes For Biometric Authentication-A Survey , 2013, FOCS 2013.

[7]  Tai-Wen Yue,et al.  A Neural-Network Approach for Visual Cryptography and Authorization , 2004, HIS.

[8]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[9]  Wei-Ho Chung,et al.  A Probabilistic Model of $(t,n)$ Visual Cryptography Scheme With Dynamic Group , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Siddharth Bali,et al.  Public key cryptography using neural networks and genetic algorithms , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).