ppt

10
DESIGN OF A ROBUST AND SECURE DIGITAL SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS SK. SAMEENA (13RC1D5814)

Upload: mahi-prince

Post on 05-Jan-2016

213 views

Category:

Documents


1 download

DESCRIPTION

ppt

TRANSCRIPT

Page 1: ppt

DESIGN OF A ROBUST AND SECURE DIGITAL SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS 

SK. SAMEENA (13RC1D5814)

Page 2: ppt

ABSTRACT EXISTING SYSTEM DIS ADVANTAGES OF EXISTING SYSTEM PROPOSED SYSTEM ADVANTAGES OF PROPOSED SYSTEM MODULES SYSTEM REQUIREMENTS

CONTENTS:

Page 3: ppt

The introduction of 3G wireless communication systems , together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks.

ABSTRACT

Page 4: ppt

The contribution of this paper is to develop a signature based image authentication scheme, which tries to overcome the severe constraints on security and the data transmission capability imposed by a wireless environment.

Existing System:

Page 5: ppt

There are two main problems in this system. i. One is that the size of the generated signature is

proportional to the size of the content and it makes the signing very time consuming.

ii. the other is that the basis of authentication is the correlation between feature sets and not bit-bit comparison that could cause some security problems.

DIS ADVANTAGES:

Page 6: ppt

The proposed scheme exploits the scalability of a structural digital signature in order to achieve a good tradeoff between security and image transfer for networked image applications.

Proposed System:

Page 7: ppt

i. The proposed system generates only one fixed-length digital signature per image regardless of the image size and the packet loss during transmission.

ii. multi-scale features are used to make digital signatures robust to image degradations and key dependent parametric wavelet filters are employed to improve the security against forgery attacks.

ADVANTAGES:

Page 8: ppt

It has two modules they are as follow

1. Image signing procedure

2. Image authentication procedure

Modules

Page 9: ppt

the system generates a digital signature by performing a signing process on the image in the following order

1. decompose the image using parameterized wavelet filters

2. extract the SDS3. cryptographically hash the extracted SDS, generate

the crypto signature by the image senders private key

1.Image signing procedure:

Page 10: ppt

the proposed scheme authenticates both the integrity and the source of the received image by applying the following process on the image in the following order:

1. perform content-adaptive error concealment, if some blocks are damaged.

2. extract the SDS of the received image.3. decrypt the signature by using the sender’s public

key.

2.Image authentication procedure