Download - ppt
DESIGN OF A ROBUST AND SECURE DIGITAL SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS
SK. SAMEENA (13RC1D5814)
ABSTRACT EXISTING SYSTEM DIS ADVANTAGES OF EXISTING SYSTEM PROPOSED SYSTEM ADVANTAGES OF PROPOSED SYSTEM MODULES SYSTEM REQUIREMENTS
CONTENTS:
The introduction of 3G wireless communication systems , together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks.
ABSTRACT
The contribution of this paper is to develop a signature based image authentication scheme, which tries to overcome the severe constraints on security and the data transmission capability imposed by a wireless environment.
Existing System:
There are two main problems in this system. i. One is that the size of the generated signature is
proportional to the size of the content and it makes the signing very time consuming.
ii. the other is that the basis of authentication is the correlation between feature sets and not bit-bit comparison that could cause some security problems.
DIS ADVANTAGES:
The proposed scheme exploits the scalability of a structural digital signature in order to achieve a good tradeoff between security and image transfer for networked image applications.
Proposed System:
i. The proposed system generates only one fixed-length digital signature per image regardless of the image size and the packet loss during transmission.
ii. multi-scale features are used to make digital signatures robust to image degradations and key dependent parametric wavelet filters are employed to improve the security against forgery attacks.
ADVANTAGES:
It has two modules they are as follow
1. Image signing procedure
2. Image authentication procedure
Modules
the system generates a digital signature by performing a signing process on the image in the following order
1. decompose the image using parameterized wavelet filters
2. extract the SDS3. cryptographically hash the extracted SDS, generate
the crypto signature by the image senders private key
1.Image signing procedure:
the proposed scheme authenticates both the integrity and the source of the received image by applying the following process on the image in the following order:
1. perform content-adaptive error concealment, if some blocks are damaged.
2. extract the SDS of the received image.3. decrypt the signature by using the sender’s public
key.
2.Image authentication procedure