Parallel Encryption Method on Brain Wave for a Person Authentication

نویسندگان

  • Jung-Sook Kim
  • Jang-Young Chung
چکیده

In this paper, we proposed an efficient parallel encryption scheme on brain wave for user authentication using the chaos maps and junk data. Two different methods were proposed. The first method uses the fixed block size of brain wave and uses variable block size of junk data. The second method uses variable block size of brain wave and variable block size of junk data. Two methods are same processing phase. The only difference is the block size of brain wave. Especially, the person authentication using unstructured data requires the real-time processing. And many researchers have been developed the encryption method with fixed maps. However, it has better security that variable maps are used for generating the random number in chaos maps. And we developed a parallel encryption method using the threads. To execute two encryption schemes, two threads are created. The one manages the process that generates five phase chaos maps and another thread manages the encryption scheme. The processing phase of the encryption scheme is composed of five phase. As a result, the encrypted brain-wave signals are produced well and the processing time for authentication is reasonable in real-time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Parallel implementation of underwater acoustic wave propagation using beamtracing method on graphical processing unit

The mathematical modeling of the acoustic wave propagation in seawater is the basis for realizing goals such as, underwater communication, seabed mapping, advanced fishing, oil and gas exploration, marine meteorology, positioning and explore the unknown targets within the water. However, due to the existence of various physical phenomena in the water environment and the various conditions gover...

متن کامل

Maximum a Posteriori Model Adaptation

In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016