Robust and secure digital signature for image authentication over wireless Channels

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© July to Aug Issue 2011 by IJCTT Journal
Volume-1 Issue-3                           
Year of Publication : 2011
Authors : J Sravanthi, Dr. MHM Krishna Prasad

MLA

J Sravanthi, Dr. MHM Krishna Prasad "Robust and secure digital signature for image authentication over wireless Channels"International Journal of Computer Trends and Technology (IJCTT),V1(3):326-331 July to Aug Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: — Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity and originality triggers an emergent need of authenticating corrupted images by transmission. To meet this need, this paper proposes a content-based image authentication scheme that exploits structural digital signature scalability in order to achieve a good tradeoff between security and data transfer. In this paper we propose the multi-scale features are used to make digital signatures robust to image degradations and key dependent parametric wavelet that are characterized by excellent energy compaction and de-correlation properties and filters are employed to improve the security against forgery attacks based on the wavelet transform due to its excellent multiscale and precise localization properties. Experimental results demonstrate the effectiveness and validity of the proposed scheme.

References-

[1] SEITZ J.: ‘Digital watermarking for digital media’ (Idea Group Publishing, 2005), Ch. 2.
[2] SCHNEIDER M., CHANG S.-F.: ‘A content based digital signature for image authentication’. Proc. IEEE Int. Conf.Image Processing (ICIP’96), 1996, pp. 227–230.
[3] FRIDRISH J., BALDOZA A.C., SIMARED R.J.: ‘Robust digital watermarking based on key dependent basis functions’. Proc. Int. Conf. LNCS:IH, Portland, OR, USA, April 1998, vol. 1525, pp. 143–157.
[4] ANTHONY T., HO S., YONG L.G.: ‘Image content authentication using pinned sine transform’, EURASIP J. Appl. Signal Process., 2004, 14, pp. 2174–2184.
[5] SUN Q., HE D., YE S.: ‘Feature selection for semi fragile signature based authentication systems’. Proc. IEEE Workshop on Image Signal Processing, 2003, pp. 99–103.
[6] SUN Q., YE S., LIN C.-Y.: ‘A crypto signature scheme for image authentication over wireless channel’, Int. J. Image Graph., 2005, 5, (1), pp. 1–14.
[7] PETER M., UHL M.: ‘Watermark security via wavelet filter parametrization’. Proc. Int. Conf. ICASSP, USA, 2000.

KeywordsCONTENT-BASED IMAGE AUTHENTICITY VERIFICATION ,WIRELESS IMAGE AUTHENTICATION .