Font Size: a A A

A Credit Card Authentication Scheme Based On Secret Sharing And Image Watermarking

Posted on:2018-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:X X PengFull Text:PDF
GTID:2348330515962814Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays,credit card has become a part of our lives.Although the credit card brings us convenience and different types of services,it is easy to be fraud by malicious third-party and caused our economic losses.In general,private information needs be provided by credit card users in order to authenticate identity.However,personal information can be easily stolen.Therefore,the traditional password authentication cannot meet the needs of security authentication.In order to provide better protection,many authentication schemes based on image encryption have been proposed.In consideration of the problems of complicated processing,insufficient memory space and low security of credit card authentication,an authentication algorithm based on Shamir secret sharing and signature matching is proposed.Firstly,the user's face image and signature information are shared according to Shamir secret sharing,then four shadow images are obtained.Secondly,the images of two strangers are split into three channels of RGB,and four shadow images are merged with channels RGB through certain embedding rules.When the user needs to be authenticated,the steps can be considered as the reverse operation of the previous embedding process.Experimental results show that the algorithm has low computational complexity and low storage space.In addition,according to the shortcomings of image encryption,such as single authentication,weak algorithm robustness,low quality of image restoration and inability to resist simulation attack,an authentication algorithm based on image encryption and digital watermarking is proposed.Firstly,the user's fingerprint as watermark information is embedded into the DCT frequency domain of the face image.Secondly,the DCT frequency domain matrix is compressed and stored in the credit card.Lastly,the inverse process is executed for legitimate authentication.The experimental results show that the proposed algorithm is well robustness and the quality of the restored face image is improved,and it can resist the simulation attack.
Keywords/Search Tags:credit card security, shamir secret sharing, authentication, image encryption, digital watermarking
PDF Full Text Request
Related items