Secure Watemarking Method with Smart Card

نویسنده

  • Hafid Mammass
چکیده

we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove the most known attacks. Keywords-component; Smart card, cryptography, RSA, symmetric and asymmetric algorithms, watermarking, detection, DCT, DCT inverse

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Method Invocation in JASON

In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...

متن کامل

USENIX Association Proceedings of the 5 th Smart Card Research and Advanced Application

In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...

متن کامل

A Secure Communication Model for HCE based NFC Services

Near Field Communication (NFC) is a new promising short-range wireless communication technology that provides ease of use by triggering the communication with a simple touch and making the user feel secure by short distance communication. Most promising functionality of NFC technology is via card emulation operating mode that enables an NFC Smartphone to behave like a contactless smart card. By...

متن کامل

The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications

This document describes an industrial application of the B method in smart card applications. In smart card memory, data modification may be interrupted due to a card withdrawal or a power loss. The EEPROM memory may result in an unstable state and the values subsequently read may be erroneous. The transaction mechanism provides a secure means for modifying data located in the EEPROM. As the se...

متن کامل

Secure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment

This paper describes a mechanism for secure online user authentication and document signature with a cryptogram Java card in an insecure environment. The mechanism requires possession of both the card and some secrets, known as Concepts, to authenticate the user. The concepts are represented in image form. A method of secure document signing with the concept-based images is also outlined. Possi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013