CFP last date
20 May 2024
Reseach Article

Digital Signature Scheme for Image

by Kanchan K. Doke, S. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 16
Year of Publication: 2012
Authors: Kanchan K. Doke, S. M. Patil
10.5120/7708-1012

Kanchan K. Doke, S. M. Patil . Digital Signature Scheme for Image. International Journal of Computer Applications. 49, 16 ( July 2012), 1-6. DOI=10.5120/7708-1012

@article{ 10.5120/7708-1012,
author = { Kanchan K. Doke, S. M. Patil },
title = { Digital Signature Scheme for Image },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 16 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number16/7708-1012/ },
doi = { 10.5120/7708-1012 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:23.438567+05:30
%A Kanchan K. Doke
%A S. M. Patil
%T Digital Signature Scheme for Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 16
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present emerging technique for image authentication. It also introduces the new concept of image content authentication and discusses the most important requirements for an effective image authentication system design. Methods which are described provide strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations. [1]

References
  1. S. M Saad "Design of robust and secure digital signature scheme for image authentication over wireless channels". IET Inf. Secure. , 2009, Vol. 3, Iss. 1, pp. 1–8 1
  2. LOU D. C. , LIU J. L. , LI C. -T. : 'Digital Signature-Based Image Authentication', in LU C. S. (EDS. ): 'Multimedia security: steganography and digital watermarking techniques for protection of intellectual property' (Idea Group Inc. , 2003)
  3. SCHNEIDER M. , CHANG S. -F. : 'A content based digital signature for image authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp. 227–230
  4. LU C. S. : 'On the security of structural information extraction/embedding for image authentication'. Proc. IEEE ISCAS'04, 2004, pp. 169–172
  5. SUN Q. , HE D. , YE S. : 'Feature selection for semi fragile signature based authentication systems'. Proc. IEEE Workshop on Image Signal Processing, 2003, pp. 99–103
  6. LIN C. -Y. , CHANG S. -F. : 'A robust image authentication method distinguishing JPEG compression from malicious manipulation', IEEE Trans. Circuits Syst. Video Technol. , 2001, 11, (2), pp. 153–168
  7. YE S. , LIN X. , SUN Q. : 'Content-based error detection and concealment for image transmission over wireless channel'. Proc. IEEE Int. Symp. Circuits and Systems, Thailand, 2003
  8. KUNDER D. , HATZINAKOS D. : 'Digital watermarking using multiresolution wavelet decomposition'. Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Seattle, Washington, 1998
  9. Mark Fontenot. : 'A WAVELETS INTRODUCTION. ' CCSC: South Central Conference, February 2002.
  10. SWAMINATHAN A. , MAO Y. , WU M. : 'Robust and secure image hashing', IEEE Trans. Inf. Forensics Sec. , 2006, 1, (2), pp. 215–229
  11. LU C. S. , LIAO H. M. : 'Structural digital signature for image authentication: an incidental distortion resistant scheme', IEEE Trans. on Multimed. , 2003, 5, (2), pp. 161–173
  12. YE S. , SUN Q. , CHANG E. C. : 'Edge directed filter based error concealment for wavelet-based images'. Proc. IEEE Int. Conf. Image Processing, Singapore, 2004
  13. GINESU G. , GIUSTO D. D. , ONALI T. : 'Mutual image based authentication framework with JPEG2000 in wireless environment', EURASIP J. Wirel. Commun. Netw. , 2006, 2006, pp. 1–14 (Article ID 73685)
  14. LIN C. -Y. , SOW D. , CHANG S. -F. : 'Using self authentication and recovery images for error concealment in wireless environment'. Proc. SPIE ITCom Conf. , August 2001
  15. SUN Q. , YE S. , LIN C. -Y. : 'A crypto signature scheme for image authentication over wireless channel', Int. J. Image Graph. , 2005, 5, (1),pp. 1–1
Index Terms

Computer Science
Information Sciences

Keywords

cryptography digital signature wavelet content authentication structural feature