DOI:
https://doi.org/10.14483/22484728.9858Publicado:
2014-12-28Número:
Vol. 8 Núm. 2 (2014)Sección:
Visión InvestigadoraSystem for creating and authentication credentials
Palabras clave:
Card secure identification, Discrete Cosine Transform (DCT), Authentication, Robustness, Security (es).Descargas
Resumen (es)
This article present a system for creating and credential authentication personal identi- fication (ID) safe, using one-dimensional and two-dimensional barcodes, data encryption and symmetric key technique watermark. To do this, a watermark is inserted on the photo of the user, generated from a unique identification code which will be available in printed credential so that at the time of validation of the credential is carried by calculating the cross-correlation between the watermark contained in the photograph of the user and the watermark calculated at the time of validation using the same unique identification code. We show that proper selection of parameters for inserting the watermark: length, gain, position of the watermark and decision threshold, are essential to ensure the proper functioning of the proposed scheme, ensuring maintain sufficient quality in visual image to the user recognition and in turn be robust enough to withstand the attack of converting digital-analog (D / A) and analog-digital (A/D).
Resumen (en)
System for creating and authentication credentialsReferencias
Mi-Cheng-Lu, Cheng-Yuan-Ku, Lain-Chyr-Hwang, Hui-Ming-Chao. “Using smart card in RFID infraestructure to protect consumer privacy”. International Journal of innovative computing information
and control. Volume 7 No. 4. April 2011.
R. Schyndel, A. Tirkel and C. Osborne, “A Digital Watermark”, Proc. Of IEEE int Conf. on Image Precessing, Vol. 2, pp.86-90, 1994.
O. Bruyndonckx, J.J. Quinsquater and B. Macq. “Spatial Method for Copyright Labeling of digital Image”, Proc Of IEEE Nonlinear Signal and Image Processing, 1995, pp. 456-459
IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp 529-539
D. Kundur and D. Hatznakos, “Digital Watermarking for Tamper Proofing and Authentication, Proceedinggs of de IEEE vol. 87, No. 7, 1999.
J. Cox J. Killian and T. Shamoon “Secure spread sectrum watermarketing for multimedia”, IEE trans On image Proceesing Vol 6 No, 12, 1997, pp. 1687.
D. I. Tapia, J. R. Cueli, O. Garc´ıa. J. M. Camacho. J. Bajo, A. Saavedra. “Identificaci´on por radiofrecuencia: fundamentos y aplicaciones”. Art´ıculo de la 1era conferencia cient´ıfica sobre RFID. Ciudad Real. Noviembre de 2007.
J. Zapata, M. Arango, W. Adame. “Herramientas tecnol´ogicas al servicio de la gesti´on empresarial”. Revista: Avances en sistemas e inform´atica. Vol. 7. No. 3, Diciembre 2010.
M. Zedillo. “An´alisis de algoritmos de marca de agua robustos ante ataques geom´etricos en el dominio de la transformada de Fourier”. Tesis de Maestr´ıa en Ciencias de Ingenier´ıa en Microelectr´onica. SEPI-ESIME Unidad Culhuac´an. 2006.
C. M´aximo S. ´Avila. “Autenticaci´on y recuperaci´on de im´agenes digitales”. Tesis de Maestr´ıa en Ciencias de Ingenier´ıa en Microelectr´onica. SEPI-ESIME Unidad Culhuac´an. 2011.
E. Bollain-y-Goytia, M. Nakano-Miyatake and H. Perez-Meana “Authentication of Identification Card Using Watermarking” IEEE International 48th Midwest Symposium on Circuits and Systems 2005, pp.1422-1425
M. Gonz´alez Lee. “Detecci´on optima de marcas de agua digitales”, Ed. THP . 18. M´exico, Primera edici´on 5 Septiembre 2005, pp. 4-12.
N. Ferguson and B. Scheneier, “Practical Cryptography”,
Wiley Publishing, Inc. USA, 2003,pp 88.