Downloads: 130
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 12, December 2013
Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme
A. Swetha | P. Chenna Reddy [2]
Abstract: Internet is a popular communicating channel. Because of the advance in networking and multimedia applications, multimedia contents can easily be attacked by the unauthorized persons. To confirm content integrity and to prevent duplication, image authentication techniques have been emerged. A secure digital signature scheme is one of the image authentication techniques that is suitable for an insecure environment, and is robust to transmission errors. This scheme exploits the scalability of a structural digital signature in order to achieve a tradeoff between security and image transfer for networked image applications. In order to make the digital signatures robust to image degradations multi-scale features are used, and to improve the security against forgery attacks key-dependent wavelet filters are employed. Further, this secure digital signature scheme is able to identify the tampered areas in the attacked image, and is very robust to cutting and pasting counterfeiting attacks. It can also tolerate different image processing manipulations at the cost of only extra payload introduced into the channel by associating the signature with the image. The main objective is to test the robustness against transmission errors, and some acceptable image processing manipulations, and to show the excellent ability in detecting the tampered areas, and removes the areas which do not belong to an object. . Experimental results show the robustness, and the validity of the proposed scheme.
Keywords: Authentication, Secure digital signature, Digital signature, Content authenticity verification, Error concealment
Edition: Volume 2 Issue 12, December 2013,
Pages: 112 - 116
Similar Articles with Keyword 'Authentication'
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal [2] | Renuka Singh [2]
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya [10] | R. Sathya [8]