Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJCTT-V1I3P117 | DOI : https://doi.org/10.14445/22312803/IJCTT-V1I3P117
Robust and secure digital signature for image authentication over wireless Channels
J Sravanthi, Dr. MHM Krishna Prasad
Citation :
J Sravanthi, Dr. MHM Krishna Prasad, "Robust and secure digital signature for image authentication over wireless Channels," International Journal of Computer Trends and Technology (IJCTT), vol. 1, no. 3, pp. 326-331, 2011. Crossref, https://doi.org/10.14445/22312803/IJCTT-V1I3P117
Abstract
Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity and originality triggers an emergent need of authenticating corrupted images by transmission. To meet this need, this paper proposes a content-based image authentication scheme that exploits structural digital signature scalability in order to achieve a good tradeoff between security and data transfer. In this paper we propose the multi-scale features are used to make digital signatures robust to image degradations and key dependent parametric wavelet that are characterized by excellent energy compaction and de-correlation properties and filters are employed to improve the security against forgery attacks based on the wavelet transform due to its excellent multiscale and precise localization properties. Experimental results demonstrate the effectiveness and validity of the proposed scheme.
Keywords
CONTENT-BASED IMAGE AUTHENTICITY VERIFICATION ,WIRELESS IMAGE AUTHENTICATION.
References
[1] SEITZ J.: ‘Digital watermarking for digital media’ (Idea Group Publishing, 2005), Ch. 2.
[2] SCHNEIDER M., CHANG S.-F.: ‘A content based digital signature for image authentication’. Proc. IEEE Int. Conf.Image Processing (ICIP’96), 1996, pp. 227–230.
[3] FRIDRISH J., BALDOZA A.C., SIMARED R.J.: ‘Robust digital watermarking based on key dependent basis functions’. Proc. Int. Conf. LNCS:IH, Portland, OR, USA, April 1998, vol. 1525, pp. 143–157.
[4] ANTHONY T., HO S., YONG L.G.: ‘Image content authentication using pinned sine transform’, EURASIP J. Appl. Signal Process., 2004, 14, pp. 2174–2184.
[5] SUN Q., HE D., YE S.: ‘Feature selection for semi fragile signature based authentication systems’. Proc. IEEE Workshop on Image Signal Processing, 2003, pp. 99–103.
[6] SUN Q., YE S., LIN C.-Y.: ‘A crypto signature scheme for image authentication over wireless channel’, Int. J. Image Graph., 2005, 5, (1), pp. 1–14.
[7] PETER M., UHL M.: ‘Watermark security via wavelet filter parametrization’. Proc. Int. Conf. ICASSP, USA, 2000.
[8] SUN Q., YE S., LIN C.-Y.: ‘A crypto signature scheme for image authentication over wireless channel’, Int. J. Image Graph., 2005, 5, (1), pp. 1–14.
[9] PETER M., UHL M.: ‘Watermark security via wavelet filter parametrization’. Proc. Int. Conf. ICASSP, USA, 2000.