A crypto signature scheme for image authentication over wireless channel

Author(s):  
Qibin Sun ◽  
Shuiming Ye ◽  
Ching-Yung Lin ◽  
Shih-Fu Chang
2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Ximeng Liu ◽  
Hui Zhu ◽  
Jianfeng Ma ◽  
Qi Li ◽  
Jinbo Xiong

With rapidly development of wireless communication, more mobile devices are used in our daily life. Although the need for accessing a wireless network is evident, new problems, such as keeping and preserving user identity’s privacy, should be greatly concerned. Attribute based signature scheme is an important cryptographic primitive which provides a powerful way for user to control their privacy. In wireless environment, the capacity of wireless channel is also valuable resources which is limited. More information can be transmitted through the wireless channel when the cost of using signature to verify the message becomes less. In order to reduce the bandwidth needed to transmit attribute based signatures and keep signer’s privacy, attribute based multisignature scheme (ABMS) was proposed in this paper. Moreover, we formalize and construct the ABMS. Our scheme is existentially unforgeable against chosen message attack on Computational Diffie-Hellman (CDH) assumption in the standard model. The simulation shows that our ABMS scheme is more appropriate for wireless communication to guarantee integrity of the data.


2013 ◽  
Vol E96.C (2) ◽  
pp. 171-179 ◽  
Author(s):  
Tatsuhiko IWAKUNI ◽  
Kenji MIYAMOTO ◽  
Takeshi HIGASHINO ◽  
Katsutoshi TSUKAMOTO ◽  
Shozo KOMAKI ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document