short signature
Recently Published Documents


TOTAL DOCUMENTS

65
(FIVE YEARS 10)

H-INDEX

11
(FIVE YEARS 2)

2021 ◽  
Vol 14 (3) ◽  
pp. 38
Author(s):  
Azhar Hadmi ◽  
Awatif Rouijel

Perceptual image hashing system generates a short signature called perceptual hash attached to an image before transmission and acts as side information for analyzing the trustworthiness of the received image. In this paper, we propose a novel approach to improve robustness for perceptual image hashing scheme for generating a perceptual hash that should be resistant to content-preserving manipulations, such as JPEG compression and Additive white Gaussian noise (AWGN) also should differentiate the maliciously tampered image and its original version. Our algorithm first constructs a robust image, derived from the original input by analyzing the stability of the extracted features and improving their robustness. From the robust image, which does perceptually resemble the original input, we further extract the final robust features. Next, robust features are suitably quantized allowing the generation of the final perceptual hash using the cryptographic hash function SHA1. The main idea of this paper is to transform the original image into a more robust one that allows the extraction of robust features. Generation of the robust image turns out be quite important since it introduces further robustness to the perceptual image hashing system. The paper can be seen as an attempt to propose a general methodology for more robust perceptual image hashing. The experimental results presented in this paper reveal that the proposed scheme offers good robustness against JPEG compression and Additive white Gaussian noise.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 3649-3659
Author(s):  
Chandrashekhar Meshram ◽  
Ahmed Alsanad ◽  
Jitendra V. Tembhurne ◽  
Shailendra W. Shende ◽  
Kailash Wamanrao Kalare ◽  
...  

2020 ◽  
Vol 1673 ◽  
pp. 012050
Author(s):  
Xiaoming Hu ◽  
Fangshu Chen ◽  
Wenan Tan ◽  
Chuang Ma

Author(s):  
Chandrashekhar Meshram ◽  
Rabha W. Ibrahim ◽  
Ahmed J. Obaid ◽  
Sarita Gajbhiye Meshram ◽  
Akshaykumar Meshram ◽  
...  

2020 ◽  
Vol 56 (3) ◽  
pp. 1742-1753 ◽  
Author(s):  
Zhijun Wu ◽  
Anxin Guo ◽  
Meng Yue ◽  
Liang Liu

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 80063-80073 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Sarita Gajbhiye Meshram ◽  
Akshaykumar Meshram

2020 ◽  
pp. 1-9
Author(s):  
Chandrashekhar Meshram ◽  
Mohammad S. Obaidat ◽  
Jitendra V. Tembhurne ◽  
Shailendra W. Shende ◽  
Kailash W. Kalare ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Viet Cuong Trinh

Aggregate signature scheme allows each signer to sign a different message and then all those signatures are aggregated into a single short signature. In contrast, multisignature scheme allows multisigners to jointly sign only one message. Aggregate multisignature scheme is a combination of both aforementioned signature schemes, where signers can choose to generate either a multisignature or an aggregate signature. This combination scheme has many concrete application scenarios such as Bitcoin blockchain, Healthcare, Multicast Acknowledgment Aggregation, and so on. On the other hand, to deal with the problems of expensive certificates in certified public key cryptography and key escrow in identity-based cryptography, the notion of certificateless public key cryptography has been introduced by Riyami and Paterson at Asiacrypt’03. In this paper, we propose the first certificateless aggregate multisignature scheme that achieves the constant-size of signature and is secure in the standard model under a generalization of the Diffie-Hellman exponent assumption. In our scheme, however, the signature is generated with the help of the authority.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 90036-90044 ◽  
Author(s):  
Hongliang Zhu ◽  
Ying Yuan ◽  
Yuling Chen ◽  
Yaxing Zha ◽  
Wanying Xi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document