Signer Authentication Scheme using Digital Signatures

Manpreet singh

Abstract


The chances of interference and malicious manipulations are more when the data is being transferred and is present on channel therefore some kind of authentication system is must to validate the sender before the original data is being processed. An effective scheme is proposed in this article to detect the tampering and support the image compression. A digital signature corresponding to the image will be transmitted along with the image itself that will be used at receiver to validate the sender. Receiver will regenerate the signature corresponding to the received image and if both the signatures match, it means there is no tampering of data and image comes from the actual signer. It also allows the lossy compression techniques by setting some threshold value for matching of signatures. For example with 10% tolerance if both hash files match up to 90% the image will be considered as authentic.


Keywords


Authentication, Block processing, digital signature, Integrity Tampering, Security

Full Text:

PDF

References


. Schneider M, Shih-Fu C. A robust content based digital signature for image authentication. IEEE conference on Image Processing pp.227-230. Sep. 1996. DOI: 10.1109/ICIP.1996.560425.

. Ching-Yung L, Shih-Fu C. Robust digital signature for multimedia authentication. IEEE Circuits and Systems Magazine 2003; 3(4):23-6.

. Wong PW, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 2001; 10(10): 1593-601.

. Xiao D, Jin J. A reversible two-level image authentication scheme based on chaotic fragile watermark. 9th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT) pp.1-6, Nov. 2012. DOI: 10.1109/CEWIT.2012.6606974.

. Chun-Shien L, Hong-Yuan ML. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions Multimedia 2003; 5(2): 161-73.

. Saad SM. Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Information Security 2009; 3(1): 1-8.

. Sun Q, Shih-Fu C. A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Transactions Multimedia 2005; 7(3): 480-94.

. Yao-Chung L, Varodayan D, Girod B. Image Authentication Using Distributed Source Coding. IEEE Transactions on Image Processing 2012; 21(1): 273-83.

. Kee E, Johnson MK, Farid H. Digital Image Authentication From JPEG Headers. IEEE Transactions on Information Forensics and Security 2011; 6(3): 1066-75.

. Li X, Sun X, Liu Q. Image Integrity Authentication Scheme Based on Fixed Point Theory. IEEE Transactions on Image Processing 2015; 24(2): 632-45.

. Chih-Hsuan T, Wen-Hsiang T. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters 2003; 7(9): 443-5.

. Yang H, Kot AC. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters 2006; 13(12): 741-4.

. Wu M, Liu B. Data hiding in binary images for authentication and annotation. IEEE Transactions on Multimedia 2004; 6(4): 528-38.

. Yang H, Kot AC. Pattern-based data hiding for binary images authentication by connectivity-preserving. IEEE Transactions on Multimedia 2007; 9(3): 475-86.

. Che-Wei L, Wen-Hsiang T. A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability. IEEE Transactions on Image Processing 2012; 21(1): 207-18.


Refbacks

  • There are currently no refbacks.