Research Article

Digital Signature Scheme for Image

by  Kanchan K. Doke, S. M. Patil
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Issue 16
Published: July 2012
Authors: Kanchan K. Doke, S. M. Patil
10.5120/7708-1012
PDF

Kanchan K. Doke, S. M. Patil . Digital Signature Scheme for Image. International Journal of Computer Applications. 49, 16 (July 2012), 1-6. DOI=10.5120/7708-1012

                        @article{ 10.5120/7708-1012,
                        author  = { Kanchan K. Doke,S. M. Patil },
                        title   = { Digital Signature Scheme for Image },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 49 },
                        number  = { 16 },
                        pages   = { 1-6 },
                        doi     = { 10.5120/7708-1012 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Kanchan K. Doke
                        %A S. M. Patil
                        %T Digital Signature Scheme for Image%T 
                        %J International Journal of Computer Applications
                        %V 49
                        %N 16
                        %P 1-6
                        %R 10.5120/7708-1012
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present emerging technique for image authentication. It also introduces the new concept of image content authentication and discusses the most important requirements for an effective image authentication system design. Methods which are described provide strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations. [1]

References
  • S. M Saad "Design of robust and secure digital signature scheme for image authentication over wireless channels". IET Inf. Secure. , 2009, Vol. 3, Iss. 1, pp. 1–8 1
  • LOU D. C. , LIU J. L. , LI C. -T. : 'Digital Signature-Based Image Authentication', in LU C. S. (EDS. ): 'Multimedia security: steganography and digital watermarking techniques for protection of intellectual property' (Idea Group Inc. , 2003)
  • SCHNEIDER M. , CHANG S. -F. : 'A content based digital signature for image authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp. 227–230
  • LU C. S. : 'On the security of structural information extraction/embedding for image authentication'. Proc. IEEE ISCAS'04, 2004, pp. 169–172
  • SUN Q. , HE D. , YE S. : 'Feature selection for semi fragile signature based authentication systems'. Proc. IEEE Workshop on Image Signal Processing, 2003, pp. 99–103
  • LIN C. -Y. , CHANG S. -F. : 'A robust image authentication method distinguishing JPEG compression from malicious manipulation', IEEE Trans. Circuits Syst. Video Technol. , 2001, 11, (2), pp. 153–168
  • YE S. , LIN X. , SUN Q. : 'Content-based error detection and concealment for image transmission over wireless channel'. Proc. IEEE Int. Symp. Circuits and Systems, Thailand, 2003
  • KUNDER D. , HATZINAKOS D. : 'Digital watermarking using multiresolution wavelet decomposition'. Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Seattle, Washington, 1998
  • Mark Fontenot. : 'A WAVELETS INTRODUCTION. ' CCSC: South Central Conference, February 2002.
  • SWAMINATHAN A. , MAO Y. , WU M. : 'Robust and secure image hashing', IEEE Trans. Inf. Forensics Sec. , 2006, 1, (2), pp. 215–229
  • LU C. S. , LIAO H. M. : 'Structural digital signature for image authentication: an incidental distortion resistant scheme', IEEE Trans. on Multimed. , 2003, 5, (2), pp. 161–173
  • YE S. , SUN Q. , CHANG E. C. : 'Edge directed filter based error concealment for wavelet-based images'. Proc. IEEE Int. Conf. Image Processing, Singapore, 2004
  • GINESU G. , GIUSTO D. D. , ONALI T. : 'Mutual image based authentication framework with JPEG2000 in wireless environment', EURASIP J. Wirel. Commun. Netw. , 2006, 2006, pp. 1–14 (Article ID 73685)
  • LIN C. -Y. , SOW D. , CHANG S. -F. : 'Using self authentication and recovery images for error concealment in wireless environment'. Proc. SPIE ITCom Conf. , August 2001
  • SUN Q. , YE S. , LIN C. -Y. : 'A crypto signature scheme for image authentication over wireless channel', Int. J. Image Graph. , 2005, 5, (1),pp. 1–1
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

cryptography digital signature wavelet content authentication structural feature

Powered by PhDFocusTM