Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis

Published on March 2020 | Categories: Documents | Downloads: 31 | Comments: 0 | Views: 657
of 5
Download PDF   Embed   Report

Comments

Content

Signal & Image Processing : An International Journal (SIPIJ) Vol.2, N o.2, June 2011

Digital Signature and Watermark Methods For Image Authentication using Cryptography  Analysis 1

 2

3

M.Sreerama Murty, D.Veeraiah, A.Srinivas Rao 1

Department of Computer Science and Engineering Sai Spurthi Institute of Technology,Khamamm,Andhra Pradesh,India [email protected] 2

Department of Computer Science and Engineering Sai Spurthi Institute of Technology,Khamamm,Andhra Pradesh,India [email protected] 3

Department of Computer Science and Engineering Sai Spurthi Institute of Technology,Khamamm,Andhra Pradesh,India [email protected]

 Abstract The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. A digital watermark and signature method for image authentication using cryptography analysis is proposed. The digital signature created for the original image and apply watermark. Images are resized before transmission in the network. After digital signature and water marking an image, apply the encryption and decryption process to an image for the authentication. The encryption is used to securely transmit transmit data in open networks for the encryption of of an image using public key and decrypt that image using private key .

Cryptography, Authentication, security  Keywords:  Digital Signature, Water Marking, Cryptography,

1. Introduction 1.1 Digital Signature Digital signature is a sort of Cryptography. Cryptography means keeping communications private. Its mainly used for the converting of the information is encryption and decryption. No one can’t access the information without access key. The main process of the digital signature is similarly as the handwritten signauture.its like paper signature and it having the digital certificate using this verifies the identity.

DOI : 10.5121/sipij.2011.2214

170

Signal & Image Processing : An International Journal (SIPIJ) Vol.2, N o.2, June 2011

1.2 Watermarking Watermarking is a sub-discipline of information hiding. It is the process of embedding information into a digital signal in a way that is difficult to remove. It’s providing copyright protection for intellectual method that’s in digital format.

1.3 Cryptography The cryptography is providing better mechanisms for information security. In this analysis to provide the public and private keys for recovery the original information. The ability store and transfer sensitive information. By using the different encryption methods for generating public keys, decryption using for private keys. This method applied to digital signatures and watermarking for to provide high security in transactions.

2. Literature Survey 2. 1 “Digital Signature and Digital Watermark Scheme for Image Authentication” This paper is investigate the combination of digital signature and watermarking is applied a host image for authentication process. The original images are having the water mark and apply the digital signature on it before the transmission in the internet.

2.2 “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping” The combination of chaotic theory and cryptography forms an important field of information security. In this paper implement encryption and decryption using chaotic mapping applying plain-image.

2.3“Image Encryption Using Block-Based Transformation Algorithm ” Encryption is used to securely transmit data in open networks. In this paper developed for the confidential image data from unauthorized access. The original images was divided into sub images and apply the transformation algorithms for better security.

3. Methodologies 3.1 Digital signature and Watermarking Digital signature is a sort of Cryptography. Cryptography means keeping communications private. It deals with encryption, decryption and authentication.

3.1.1. Secret key or Symmetric Cryptography In this processes sender and receiver massages have to know the similarly key for encryption and decryption of a message.

171

Signal & Image Processing : An International Journal (SIPIJ) Vol.2, N o.2, June 2011

3.1.2 Public key or Asymmetric Cryptography Asymmetric Cryptography involves two related keys, one of which only the the private key and the other 'public key.

3.1.3 Creation of Digital Signature The creation of digital signature is done by getting the details from administrator, and the created signature is posted to the signature table and this is used by the certification authority. This is done by the certification authority and creates a personal identification to the person. This is carried out by using the Digital Signature  Algorithm and the Secure Hashing  algorithm. This digital signature provides a personalization.

Fig 3.1.1: Using the SHA with the DSA

3.1.4 Digital Signature Algorithm (i) GLOBAL PUBLIC-KEY COMPONENTS 1. p = a prime number, where 2 L-1 < p < 2L for 512 = < L = <1024 and L a multiple of 64 2. q = a prime divisor of p - 1, where 2159 < q < 2160 (p-1)/q (p-1)/q 3. g = h  mod p, where h is any integer with 1 < h < p - 1 such that h  mod P>1 (g has order q mod p). (ii) THE USER’S PRIVATE KEY: x = a randomly or pseudo randomly generated integer with 0 < x < q (iii) USER’S PUBLIC KEY: x y = g  mod p (iv) USER’S PER-MESSAGE SECRET NUMBER: k = a randomly or pseudo randomly generated integer with 0 < k < q

172

Signal & Image Processing : An International Journal (SIPIJ) Vol.2, N o.2, June 2011

3.2. Watermarking Digital Signature Digital image watermarking schemes mainly fall into two broad categories:

3.2.1 Spatial-domain techniques The spatial –domain techniques consist of two categories, these are a) Least-Significant Bit (LSB): The given image contains pixels these pixels are indicated by the 8-bit sequence, the watermarks are linked two the last, bit of selected pixels of the original image. its used to hide the information and attackers could not destroy the information. b) SSM-Modulation-Based Technique: These technique are applied in the water marking algorithms with an linked information and attached to the original image with pseudo noise signal

,its modulated by the watermark �

3.2.2 Frequency-domain techniques The frequency-domain techniques mainly used for watermarking of the human visual system are better captured by the spectral coefficients. The transforms are broadly categorized in two ways (a) Discrete Cosine Transformation (DCT) (b) Discrete Wavelet Transformation (DWT)

The following figures are explained about Discrete Cosine Transformation and Discrete Wavelet Transformation.

Original Image

Water Marked Image

Fig: 3.2.2.1 One Level DWT

173

Signal & Image Processing : An International Journal (SIPIJ) Vol.2, N o.2, June 2011

Authors

M.Sreerama Murthy Recived M.Tech in Computer Science and Engineering from University College of Engineering, JNTU, Kakinada.B.Tech in Information Technology from Sai Spurthi Institute of Technology (JNTU,Hyderabad). And now presently working as Assistant Professor Sai Spurthi Institute of Technology,Khammam.His research interests includes Mobile Computing,Image Processing,DataMining ,Computer Networks and Embedded Systems. D. Veeraiah Recived M.Tech in Computer Scince and Engineering from Anurag Engineering Coolge (JNTUH),B.Tech in Information Technology from Mother Teresa Institute of Science and Technology( JNTU,Hyderabad). And now presently working as Assoc. Professor Sai Spurthi Institute of Technology,Khammam.His research interests includes Image Processing,Computer Networks,Mobile Computing,Compiler Design.

A.Srinivas Rao Recived M.Tech in Computer Scince and Engineering from Anurag Engineering College (JNTUH),B.Tech in Information Technology from Mother Teresa Institute of Science and Technology( JNTU,Hyderabad). And now presently working as Assoc. Professor Sai Spurthi Institute of Technology,Khammam.His research interests includes Mobile Computing,Image Processing,Computer Networks,Compiler Design

179

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close