期刊文献+

一种基于信息隐藏的移动终端认证方案

A mobile terminal authentication scheme based on information hiding
下载PDF
导出
摘要 提出了一种用信息隐藏技术代替加密技术来实现的移动终端认证方案,以图像作为信息隐藏的载体,借鉴Kerberos[1]认证协议中相互认证的思想,实现了移动终端身份认证。在认证过程中使用了隐写术[2]和数字水印[3],前者用于认证信息的传递,后者保证认证图像的唯一性,同时实现各服务器之间的身份认证。二者相辅相成,更好地保证了认证信息的隐蔽与安全。针对于Kerberos系统中可能会发生的重放攻击,文中采用时间戳连同协商随机数的方法得以解决。 A mobile terminal authentication scheme based on information hiding technology instead of encryption technology is put forward.In this scheme,the image is used as the carrier of information hiding,and the authentication of the mobile terminal is realized by using the mutual authentication of Kerberos authentication protocol.In the authentication process,steganography and digital watermarking are used.The former is used to transfer the authentication information,the latter is to ensure the uniqueness of the authentication image,and to realize the authentication between the servers.The two complement each other,to ensure that the certification of information security and security.For the replay attack that may occur in the Kerberos system,this paper adopts the method of the time stamp and the random number.
作者 姚帅 沈勇
出处 《信息技术》 2017年第12期158-160,167,共4页 Information Technology
关键词 身份认证 信息隐藏 移动终端 KERBEROS 隐写术 数字水印 identity authentication inlo rmation hiding mobile terminal Ker beros steganog raphy digital watermarking
  • 相关文献

参考文献3

二级参考文献22

  • 1I.J. Cox, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6 (12): 1673 - 1687.
  • 2N. F. Johnson, S. Jajodia. Exploring Steganography:seeing the unseen. IEEE Transactions on Computer,1998, 31(2): 26-34.
  • 3W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for data hiding. IBM System Journal, 1996, 35(3): 313- 336.
  • 4PEYRET P, LISIMAQUE G, CHUA T Y. Smart cards provide very high security and flexibility in subscribers management [ J]. IEEE Trans on Consumer Electronics, 1990,36 ( 3 ) :744-752.
  • 5LAMPORT L. Password authentication with insecure communication [J]. Communications of the ACM, 1981,24(11) :770-772.
  • 6HWANG M S, LI L H. A new remote user authentication scheme using smart cards [ J]. IEEE Trans on Consumer Electronics, 2000,46( 1 ) :28-30.
  • 7SUN H M. An efficient remote user authentication scheme using smart cards[J]. IEEE Yrans on Consumer Electronics,2000,46(4) : 958- 961.
  • 8WU S T, CHIEU B C. A user friendly remote authentication scheme with smart cards [ J ]. Computers & Security, 2003,22 ( 6 ) : 547- 550.
  • 9YANG Chou-chen, WANG Ren-chiun. Cryptanalysis of a user friendly remote authentication scheme with smart cards [ J ]. Computers & Security,2004,23(5) :425-427.
  • 10WU S T, CHIEU B C. A note on a user friendly remote authentication scheme with smart cards[J]. IEICE Trans on Fund,2004, E87- A (8) :2180-2181.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部