A Survey on Different Digital Authentication Systems Using Fuzzy Logic

A Survey on Different Digital Authentication Systems Using Fuzzy Logic

Ayan Chatterjee, Mahendra Rong
DOI: 10.4018/978-1-5225-3004-6.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The communication through wireless medium is very popular to the developed society. More specifically, the use of the internet as well as the use of social networking sites is increasing. Therefore, information security is an important factor during wireless communication. Three major components of it are confidentiality, integrity, and availability of information among authorized users. Integrity level is maintained through various digital authentication schemes. Fuzzy logic is an important soft computing tool that increases the digital watermarking system in various ways. In this chapter, different popular and high secured watermarking schemes using fuzzy logic are analyzed with their mathematical and experimental efficiency. A comparative analysis is developed here with corresponding different parameters.
Chapter Preview
Top

Introduction

Information security is a big issue in present decade during wireless communication. Actually, it is communication of privacy among authorized users. The major wings of information security are confidentiality, integrity and availability of data. According to the architecture of wireless communication, it can be realized that the internet channel, through which important and secured information are exchanged among authorized users, is not well secured from unauthorized access. So, to protect the important data from unauthorized users, i.e. to maintain the basic ingredients of information security, various approaches are developed gradually. Cryptography is the most basic approach of information security. In this particular methodology, secret message is altered to another text using a particular algorithm, i.e. encryption algorithm with corresponding secret keys. This changed text is sent to receiver end. Then actual message is extracted from the changed text by using the decryption technique of corresponding encryption algorithm and predefined secret keys. In this approach, secret key maintains the security from unauthorized users. But the disadvantage of the scheme is the survival of communication is realized by unauthorized users. To take away this problem, next approach steganography is developed. In this methodology, secret message is embedded in a cover file, such as- image, video/audio etc. This embedded cover file is sent through wireless medium to the receiver end. Receiver extracts this secret message from the embedded file. But unauthenticated users can’t realize the existence of communication. In both of cryptography and steganography, only confidentiality and availability of information are maintained among authenticated users. But integrity level is not considered in these two popular and important particular methodologies. In other words, if any unauthorized user changes the information during communication, that can’t be realized at the receiver end using the approaches cryptography and steganography only. So, to increase integrity level, digital authentication, more specifically digital watermarking approach is developed. The important side of this approach is if the information is distorted by some middle hacker(s) that can be realized at the receiver end. So, here the concentration is only on digital watermarking.

Fuzzy logic is an important soft computing tool and it has major application area in optimization. But, the fuzzy rule bases are used also in the issue of digital watermarking and acts efficiently to increase integrity level. In this chapter, some popular as well as secured digital watermarking schemes using fuzzy logic are described in comparative manner. Also, efficiency of fuzzy in this particular field is analyzed. In the next section, some related survey works are described. Then the proposed discussion is developed in comparative way. Some experimental results are also shown here to observe the efficiency of the schemes. At last, a conclusion is drawn followed by future trends of proposed work.

Key Terms in this Chapter

Peak Signal to Noise Ratio (PSNR): A mathematical expression is applied to realize the alteration between the actual cover medium and watermarked cover medium.

Fuzzy Logic: Fuzzy logic is a special kind of soft computing tool and it is applicable in the field of artificial intelligence effectively.

Digital Watermarking: Digital watermarking is the way of authentication with an embedded image or audio or video.

Digital Authentication: Digital authentication is the way of realizing reality of documents/information digitally.

Soft Computing: Soft Computing is the way of solution of NP hard problems through artificial intelligence.

Complete Chapter List

Search this Book:
Reset