Secure Watemarking Method with Smart Card
نویسنده
چکیده
we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove the most known attacks. Keywords-component; Smart card, cryptography, RSA, symmetric and asymmetric algorithms, watermarking, detection, DCT, DCT inverse
منابع مشابه
Secure Method Invocation in JASON
In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...
متن کاملUSENIX Association Proceedings of the 5 th Smart Card Research and Advanced Application
In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...
متن کاملA Secure Communication Model for HCE based NFC Services
Near Field Communication (NFC) is a new promising short-range wireless communication technology that provides ease of use by triggering the communication with a simple touch and making the user feel secure by short distance communication. Most promising functionality of NFC technology is via card emulation operating mode that enables an NFC Smartphone to behave like a contactless smart card. By...
متن کاملThe Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications
This document describes an industrial application of the B method in smart card applications. In smart card memory, data modification may be interrupted due to a card withdrawal or a power loss. The EEPROM memory may result in an unstable state and the values subsequently read may be erroneous. The transaction mechanism provides a secure means for modifying data located in the EEPROM. As the se...
متن کاملSecure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment
This paper describes a mechanism for secure online user authentication and document signature with a cryptogram Java card in an insecure environment. The mechanism requires possession of both the card and some secrets, known as Concepts, to authenticate the user. The concepts are represented in image form. A method of secure document signing with the concept-based images is also outlined. Possi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013