We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Image Authentication using RSA and Chaotic Map

by Chitra Solanki, Madhu Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 17
Year of Publication: 2015
Authors: Chitra Solanki, Madhu Sharma
10.5120/20835-3399

Chitra Solanki, Madhu Sharma . Image Authentication using RSA and Chaotic Map. International Journal of Computer Applications. 118, 17 ( May 2015), 7-12. DOI=10.5120/20835-3399

@article{ 10.5120/20835-3399,
author = { Chitra Solanki, Madhu Sharma },
title = { Image Authentication using RSA and Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 17 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number17/20835-3399/ },
doi = { 10.5120/20835-3399 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:57.240392+05:30
%A Chitra Solanki
%A Madhu Sharma
%T Image Authentication using RSA and Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 17
%P 7-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is basically a way by which sender and recipient must prove their identities to each other. Image authentication verifies the originality of an image by detecting malicious manipulations. Reliable image authentication technology must be able to protect an image from time it was first produced until the final stage of use. In this paper we describe an effective technique for image authentication which can prevent malicious manipulations by using RSA and Baker's map. Chaos refers to a type of complex dynamical behavior that possesses some special features such as being extremely sensitive to small variations in initial conditions. Moreover this is certificateless-based scheme and allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority to store and manage user's certificates. In 2014, Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang has given a similar designed certificateless-based signature scheme based on RSA operations; however, their scheme is modified and improved by using it on image rather than text [2].

References
  1. Atul kahate, 2003, cryptography and network security.
  2. Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang,2014, A Strong RSA-based and Certificateless-based Signature Scheme.
  3. Chitra Solanki, Madhu Sharma, 2015,An Efficient RSA-based and chaos-based Authentication Scheme.
  4. Pragya Agarwal, Shilpi Gupta, Anu Mehra, 2013,Transmission and Authentication of Text Messages through Image Steganography.
  5. Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest Jeffrey I. Schiller, Bruce Schneier,1997, The risks of key recovery key escrow problem and trusted third party encryption.
  6. R. L RIVEST, A. SHAMIR, L. ADLEMAN. ,1978,A method for obtaining digital signatures and public key cryptosystem, Association of compting machinery(ACM).
  7. George Makris , Ioannis Antoniou, 2012, Cryptography with Chaos, Proceedings, 5th Chaotic Modeling and Simulation International Conference, Athens Greece.
  8. Alireza Jolfaei, Abdolrasoul Mirghadri, 2011 Image encryption using chaos and block cipher.
  9. Yue Wu, Joseph P. Noonan, and Sos Agaian, 2011, NCPR and UACI Randomness Tests for Image Encryption.
  10. Narendra K Pareek , Vinod Patidar, Krishan K Sud, 2011, A Symmetric Encryption Scheme for Color BMP Images.
  11. B. Srikanth, G. Padmaja, Dr. Syed Khasim, Dr. P. V. S Lakshmi, A. Harita, 2014, Secured Bank Authentication using Image Processing and Visual Cryptography.
  12. Tanmay Bhattacharya, Sirshendu Hore, S. R. Bhadra Chaudhuri, 2012, An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN.
Index Terms

Computer Science
Information Sciences

Keywords

UACI and NPCR correlation coefficient certificateless.