Wavelet Domain Scrambling for Image-Based Authentication

A simple image scrambling method for image-based authentication (IBA) is proposed and evaluated. The devised scheme may be embedded into any wavelet-based IBA framework to provide mutual authentication with challenge-response architecture. The severe constraints on security, data transmission capability and user friendliness are addressed by the complete system, especially in the wireless environment. Data and application scalability is provided through the JPEG2000 standard and JPIP framework

[1]  Daniele D. Giusto,et al.  Application-Scalable Image-based Authentication Framework with JPEG2000 , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[2]  Rik Van de Walle,et al.  Image scrambling without bandwidth expansion , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Tamal Bose,et al.  Two-dimensional periodically shift variant digital filters , 1996, IEEE Trans. Circuits Syst. Video Technol..

[4]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[5]  Hitoshi Kiya,et al.  A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000 , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[6]  Shiguo Lian,et al.  A novel image encryption scheme based-on JPEG encoding , 2004, Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004..

[7]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[10]  Rabab Kreidieh Ward,et al.  The generalized Fibonacci transformations and application to image scrambling , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Zhang Han,et al.  A new image encryption algorithm based on chaos system , 2003, IEEE International Conference on Robotics, Intelligent Systems and Signal Processing, 2003. Proceedings. 2003.

[12]  Hongjun Wu,et al.  Efficient and secure encryption schemes for JPEG2000 , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.