Digital Signature Verification Scheme for Image Authentication

被引:0
作者
Singh, Manpreet [1 ]
Kaur, Harpreet [1 ]
Kakkar, Ajay [1 ]
机构
[1] Thapar Univ, Dept ECE, Patiala, Punjab, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS) | 2015年
关键词
Authentication; block processing; digital signature; integrity; security; tampering; BINARY IMAGE; SECRET; SECURE; ROBUST;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Image authentication is one of the security checks to detect any forgery or malicious manipulations, which may have occurred due to insecure transmission. An effective scheme is proposed in this paper which can detect the tampering and also it supports the image compression. A digital signature corresponding to the image will be transmitted along with the image itself. Receiver will regenerate the signature corresponding to the received image and if both the signatures match, it means there is no tampering of data and the received image is authentic (or original). As it allows lossy compression techniques therefore matching is done by setting some threshold value. For example with 10% tolerance if both hash files match up to 90% the image will be considered as authentic.
引用
收藏
页数:5
相关论文
共 15 条
[1]   Digital Image Authentication From JPEG Headers [J].
Kee, Eric ;
Johnson, Micah K. ;
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1066-1075
[2]   A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability [J].
Lee, Che-Wei ;
Tsai, Wen-Hsiang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (01) :207-218
[3]   Image Integrity Authentication Scheme Based on Fixed Point Theory [J].
Li, Xu ;
Sun, Xingming ;
Liu, Quansheng .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (02) :632-645
[4]  
Lin Ching-Yung, 2003, IEEE CIRCUITS SYSTEM, V3, P23
[5]   Image Authentication Using Distributed Source Coding [J].
Lin, Yao-Chung ;
Varodayan, David ;
Girod, Bernd .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (01) :273-283
[6]   Structural digital signature for image authentication: An incidental distortion resistant scheme [J].
Lu, CS ;
Liao, HYM .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (02) :161-173
[7]   Design of a robust and secure digital signature scheme for image authentication over wireless channels [J].
Saad, S. M. .
IET INFORMATION SECURITY, 2009, 3 (01) :1-8
[8]  
Schneider Marc, 1996, IEEE C IM PROC SEP, P227
[9]   A secure and robust digital signature scheme for JPEG2000 image authentication [J].
Sun, QB ;
Chang, SF .
IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (03) :480-494
[10]   A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement [J].
Tzeng, CH ;
Tsai, WH .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (09) :443-445