Dynamical Digital Authentication for Wireless Domain With Randomized Dispersing of Multiple Secret Signatures

Soumit Chowdhury, Arkadip Ray, R. Mukherjee, N. Ghoshal
{"title":"Dynamical Digital Authentication for Wireless Domain With Randomized Dispersing of Multiple Secret Signatures","authors":"Soumit Chowdhury, Arkadip Ray, R. Mukherjee, N. Ghoshal","doi":"10.1109/WISPNET.2018.8538754","DOIUrl":null,"url":null,"abstract":"The work promotes reliable dynamical validations for transmitted e-documents using session wise randomly hidden secret multi-signatures. Client triggers this protocol by deriving the random circular sequencing of such invisible signatures onto the cover image e-document. Additional security and authenticity criteria met with dynamical orientations of hidden signature bits on concern sub block pixel bytes of the cover image. Vitally both these dynamical fabrications are fully governed by the respective mathematical operations executed on client-server based mutual secret key and session random challenge. Hence, same dynamical authentications for those valid copyright signatures can also be complied at the server end. Apart from that multi-copy signature dispersing with hosting of each individual signature copy on each separate regions of the cover image serves better authenticity and robustness under attacks. Further region wise varied transforms on sub image blocks with variable threshold range driven sign bit encoding on separate transformed pixel bytes of such sub blocks ensures excellent robustness and recovery of signatures. Finally, exhaustive experimental results also confirmed strong superiority of this scheme over existing works with significant enhancements on standard evaluation parameters. Overall, this protocol reflects better trusted authentication, confidentiality and non-repudiation for wireless digital transmissions in contrast to the current ideas.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"150 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISPNET.2018.8538754","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The work promotes reliable dynamical validations for transmitted e-documents using session wise randomly hidden secret multi-signatures. Client triggers this protocol by deriving the random circular sequencing of such invisible signatures onto the cover image e-document. Additional security and authenticity criteria met with dynamical orientations of hidden signature bits on concern sub block pixel bytes of the cover image. Vitally both these dynamical fabrications are fully governed by the respective mathematical operations executed on client-server based mutual secret key and session random challenge. Hence, same dynamical authentications for those valid copyright signatures can also be complied at the server end. Apart from that multi-copy signature dispersing with hosting of each individual signature copy on each separate regions of the cover image serves better authenticity and robustness under attacks. Further region wise varied transforms on sub image blocks with variable threshold range driven sign bit encoding on separate transformed pixel bytes of such sub blocks ensures excellent robustness and recovery of signatures. Finally, exhaustive experimental results also confirmed strong superiority of this scheme over existing works with significant enhancements on standard evaluation parameters. Overall, this protocol reflects better trusted authentication, confidentiality and non-repudiation for wireless digital transmissions in contrast to the current ideas.
随机分散多重秘密签名的无线域动态数字认证
该工作采用会话智能随机隐藏秘密多重签名,促进了传输电子文档的可靠动态验证。客户端通过在封面图像电子文档上导出这些不可见签名的随机循环序列来触发此协议。在封面图像的相关子块像素字节上隐藏签名位的动态方向满足附加的安全性和真实性标准。实际上,这两种动态构造都完全由各自在基于客户端-服务器的相互秘密密钥和会话随机挑战上执行的数学操作控制。因此,对于那些有效的版权签名,也可以在服务器端进行相同的动态认证。此外,多副本签名分散托管每个单独的签名副本在封面图像的每个单独的区域提供更好的真实性和鲁棒性攻击。在子图像块上进一步进行区域可变变换,对这些子块的单独变换像素字节进行可变阈值范围驱动的符号位编码,确保了签名的出色鲁棒性和恢复性。最后,详尽的实验结果也证实了该方案较现有方案具有较强的优越性,在标准评价参数上有显著提高。总的来说,与目前的想法相比,该协议反映了无线数字传输更好的可信身份验证、机密性和不可否认性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信