CFP last date
20 June 2024
Reseach Article

Wavelet Signature for Image and Document Authentication

Published on October 2013 by Sridevi Tengale, Padmapriya Patil
International conference on Green Computing and Technology
Foundation of Computer Science USA
ICGCT - Number 3
October 2013
Authors: Sridevi Tengale, Padmapriya Patil
310f5299-c1df-47ec-a2aa-d93146216a75

Sridevi Tengale, Padmapriya Patil . Wavelet Signature for Image and Document Authentication. International conference on Green Computing and Technology. ICGCT, 3 (October 2013), 43-48.

@article{
author = { Sridevi Tengale, Padmapriya Patil },
title = { Wavelet Signature for Image and Document Authentication },
journal = { International conference on Green Computing and Technology },
issue_date = { October 2013 },
volume = { ICGCT },
number = { 3 },
month = { October },
year = { 2013 },
issn = 0975-8887,
pages = { 43-48 },
numpages = 6,
url = { /proceedings/icgct/number3/14769-1308/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International conference on Green Computing and Technology
%A Sridevi Tengale
%A Padmapriya Patil
%T Wavelet Signature for Image and Document Authentication
%J International conference on Green Computing and Technology
%@ 0975-8887
%V ICGCT
%N 3
%P 43-48
%D 2013
%I International Journal of Computer Applications
Abstract

This paper takes a content-based robust and secure image and document authentication technique which makes use of structural digital signature scalability in order to achieve a good tradeoff between security and data transfer. Here the multi-scale features are used to make digital signatures robust to image degradations and key dependent parametric wavelet filters are employed to improve the security against forgery attacks based on the wavelet transform due to its excellent multi-scale and precise localization properties.

References
  1. Lou D. C. , Liu J. L. , Li C. -T. : 'Digital Signature- Based Image Authentication', in LU C. S. (EDS. ): Multimedia security: steganography and digital watermarking techniques for protection of intellectual property' (Idea Group Inc. , 2003).
  2. Schneider M. , Chang S. -F. : 'content based digital signature for image authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp. 227–230.
  3. Lu C. S. : 'On the security of structural information extraction/embedding for image authentication'. Proc. IEEE ISCAS'04, 2004, pp. 169–172.
  4. Sun Q. , HE D. , YE S. : 'Feature selection for semi fragile signature based authentication systems'. Proc. IEEE Workshop on Image Signal Processing, 2003, pp. 99–103.
  5. Sun Q. , YE S. , Lin C. -Y. : 'A crypto signature scheme for image authentication over wireless channel', Int. J. Image Graph. , 2005, 5, (1), pp. 1–14.
  6. Ye S. , Sun Q. , Chang EE-C. : 'Error resilient content based image authentication over wireless channel'. Proc. IEEE ICIP'06,2006
  7. Swami Nathan A. , Mao Y. , Wu M. : 'Robust and secure image hashing', IEEE Trans. Inf. Forensics Sec. , 2006, 1, (2), pp. 215–229
  8. Lu C. S. , LIAO H. M. : 'Structural digital signature for image authentication: an incidental distortion. Resistant Scheme', IEEE Trans. on Multimed. , 2003,5, (2), pp
  9. Ye S. , Sun Q. , Chang E. C. : 'Edge directed filter based error concealment for wavelet-based images'. Proc. IEEE Int . Conf. Image Processing, Singapore, 2004.
  10. Kanchan K Doke. , S. M Patil "Digital signature scheme for image" IJCA(0975-8887) Volume49- No,16,july
  11. Lin C. -Y. , Chang S. -F. : 'A robust image authentication method distinguishing JPEG compression from malicious manipulation', IEEE Trans. Circuit Syst. Video Technol. , 2001, 11, (2), pp. 153-168
  12. Mark Fontenot. : 'WAVELETS INTROUCTION. ' CCSC: South Central Conference, February2002
Index Terms

Computer Science
Information Sciences

Keywords

Wavelet Signature Image Authentication Dwt