Abstract

The work highlights a secure and trusted data transmission protocol focusing on dynamic cum multi-phase authentication scenarios suitable for defense sector applications under wireless environments. Initially the user communicates a proprietary logo image chosen dynamically and marked visibly on a selected region of the authentic digital document. Receiver identifies two secret codes against this logo and its respective region number after sensing the logo from the document. In the second phase invisible fabrication of multiple ownership digitized signature shares on the document is governed by the generated secret data which dynamically decides the bit fabrication sequences, locations of fabrications and the proper ordering of the fabricated shares. This data is actually produced through the separate encryption of the user secret key with those tracked hidden codes and the underneath code of the acknowledgment message at the client side. Similarly the same data casting places and the exact share orientations are dynamically computed by the receiver using all those unexposed information for detecting the fabricated shares from the authenticated document. Finally the copyright signatures are constructed by merging those detected shares with their respective private shares only by the receiver. Random threshold reference point based distinctly separate bit coding policy on each transformed coefficients of the sub image block pixel bytes ensuring high security and robustness against attacks under wireless platform. Significantly the experimental results have fully confirmed the strong excellence and superiority of this scheme over existing approaches in various aspects with better handling of authentication, confidentiality, and non-repudiation issues.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call