International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 130 | Views: 180

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 12, December 2013

Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme

A. Swetha | P. Chenna Reddy [2]

Abstract: Internet is a popular communicating channel. Because of the advance in networking and multimedia applications, multimedia contents can easily be attacked by the unauthorized persons. To confirm content integrity and to prevent duplication, image authentication techniques have been emerged. A secure digital signature scheme is one of the image authentication techniques that is suitable for an insecure environment, and is robust to transmission errors. This scheme exploits the scalability of a structural digital signature in order to achieve a tradeoff between security and image transfer for networked image applications. In order to make the digital signatures robust to image degradations multi-scale features are used, and to improve the security against forgery attacks key-dependent wavelet filters are employed. Further, this secure digital signature scheme is able to identify the tampered areas in the attacked image, and is very robust to cutting and pasting counterfeiting attacks. It can also tolerate different image processing manipulations at the cost of only extra payload introduced into the channel by associating the signature with the image. The main objective is to test the robustness against transmission errors, and some acceptable image processing manipulations, and to show the excellent ability in detecting the tampered areas, and removes the areas which do not belong to an object. . Experimental results show the robustness, and the validity of the proposed scheme.

Keywords: Authentication, Secure digital signature, Digital signature, Content authenticity verification, Error concealment

Edition: Volume 2 Issue 12, December 2013,

Pages: 112 - 116

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait