Abstract: Inwireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring).........
Keywords: Wireless communication, Authentication, Data hiding, Encrypted information, Choatic encryption, Sematic segmentation
[1]. E.-J. Yoon and K.-Y. Yoo, "Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem," The Journal of Supercomputing, vol. 63, no. 1, pp. 235– 255, Jan. 2013.
[2]. H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won, "Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme," in Computational Science and Its Applications, ser. Lecture Notes in Computer Science, vol. 7335. Spinger-Verlag, 2012, pp. 391–406.
[3]. E.-J. Yoon, S.-H. Kim, and K.-Y. Yoo, "Cryptanalysis and security enhancement of a "more efficient & secure dynamic id-based remote user authentication scheme‟,"International Journal of Innovative Computing, Information and Control, vol. 8, no. 5(B), pp. 3661–3675, May 2012.
[4]. R. Madhusudhan and R. C. Mittal, "Dynamic id-based remote user password authentication schemes using smart cards: A review," Intelligent Algorithms for Data-Centric Sensor Networks, vol. 35, no. 4, pp. 1235– 1248, Jul. 2012.