Face authentication is an important biometric authentication method commonly used in security applications.It is vulnerable to different types of attacks that use authorized users’facial images and videos captured fr...Face authentication is an important biometric authentication method commonly used in security applications.It is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating secur-ity applications.This paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble technique.The proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of emotions.The proposed model is applied to the KDEF dataset using 10-fold cross-valida-tions.Several improvements are made to the proposed model.First,the VGG16 model is applied to the seven common emotions.Second,the system usability is enhanced by analyzing and selecting only the four common and easy-to-use emotions.Third,the horizontal ensemble technique is applied to enhance the emotion recognition accuracy and minimize the error during authen-tication processes.Finally,the Horizontal Ensemble Best N-Losses(HEBNL)is applied using challenge-response emotion to improve the authentication effi-ciency and minimize the computational power.The successive improvements implemented on the proposed model led to an improvement in the accuracy from 92.1%to 99.27%.展开更多
Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the e...Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawb...The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawbacks exist when using the shared secrets in the Challenge-Response protocol : (1) It's difficult to store and maintain large amount of MS's authentication key in the SwMI when the network is large. (2) It's hard to support non-renouncement services when using the symmetrical cryptography. An authentication protocol for TETRA using Identity-based Public Keys for the SwMI to authenticate the MSs and an authentication protocol based on hash chain for the MSs to authenticate the SwMI are presented, which can effectively compensate the alopy-mentioned drawbacks.展开更多
基金This work is partially supported by the Deanship of Scientific Research at Jouf University under Grant No(DSR-2021–02–0369).
文摘Face authentication is an important biometric authentication method commonly used in security applications.It is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating secur-ity applications.This paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble technique.The proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of emotions.The proposed model is applied to the KDEF dataset using 10-fold cross-valida-tions.Several improvements are made to the proposed model.First,the VGG16 model is applied to the seven common emotions.Second,the system usability is enhanced by analyzing and selecting only the four common and easy-to-use emotions.Third,the horizontal ensemble technique is applied to enhance the emotion recognition accuracy and minimize the error during authen-tication processes.Finally,the Horizontal Ensemble Best N-Losses(HEBNL)is applied using challenge-response emotion to improve the authentication effi-ciency and minimize the computational power.The successive improvements implemented on the proposed model led to an improvement in the accuracy from 92.1%to 99.27%.
基金National Natural Science Foundation of China (Grant Nos. 90412014 and 90604004)Jiangsu Provincial Key Laboratory of Network and Information Security (Grant No. BM2003201)Jiangsu Provincial High-Tech Research Program (Grant No. BG2004036)
文摘Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
文摘The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawbacks exist when using the shared secrets in the Challenge-Response protocol : (1) It's difficult to store and maintain large amount of MS's authentication key in the SwMI when the network is large. (2) It's hard to support non-renouncement services when using the symmetrical cryptography. An authentication protocol for TETRA using Identity-based Public Keys for the SwMI to authenticate the MSs and an authentication protocol based on hash chain for the MSs to authenticate the SwMI are presented, which can effectively compensate the alopy-mentioned drawbacks.