Digital image authentication and encryption using digital signature

Author(s):  
Shahzad Alam ◽  
Amir Jamil ◽  
Ankur Saldhi ◽  
Musheer Ahmad
Author(s):  
Siva Charan Muraharirao ◽  
Manik Lal Das

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.


Author(s):  
Siva Charan Muraharirao ◽  
Manik Lal Das

The recent advances in multimedia technology demand protection of digital images from unintentional manipulation for content integrity, copyright, and ownership. Digital watermarking technique has wide acceptance in the industry for anti-piracy, ownership verification, and digital image authentication. There have been a large number of schemes in the literature proposed for digital watermarking using non-cryptographic and cryptographic primitives. Use of Least Significant Bits (LSB) is one of the oldest but classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security. Cryptographic primitives such as hash function, digital signature, and message authentication codes have been used in several applications including multimedia for data authentication. Digital signature-based image authentication provides strong security, but the approach requires managing public key infrastructure, which is a costly operation. Partial data protection is also an optimal approach for protecting important data while leaving unimportant data unprotected. Considering security weakness of the LSB-based approach and cost overhead of the public key-based approach, the authors present in this chapter a digital image authentication scheme using LSB, keyed hash, and partial encryption. They show that the proposed watermarking scheme is secure and efficient in comparison to other related schemes.


2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2011 ◽  
Vol 2 (2) ◽  
pp. 55-78
Author(s):  
Yue Li ◽  
Chia-Hung Wei

Sign in / Sign up

Export Citation Format

Share Document