Вы находитесь на странице: 1из 10

DESIGN OF A ROBUST AND SECURE DIGITAL SIGNATURE

SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS


CHANNELS

SK. SAMEENA

(13RC1D5814)

CONTENTS:
ABSTRACT
EXISTING SYSTEM
DIS ADVANTAGES OF EXISTING SYSTEM
PROPOSED SYSTEM
ADVANTAGES OF PROPOSED SYSTEM
MODULES
SYSTEM REQUIREMENTS

ABSTRACT

The introduction of 3G wireless communication systems ,


together with the invasive distribution of digital images and
the growing concern on their originality triggers an emergent
need of authenticating images received by unreliable channels,
such as public Internet and wireless networks.

Existing System:

The contribution of this paper is to develop a signature based


image authentication scheme, which tries to overcome the
severe constraints on security and the data transmission
capability imposed by a wireless environment.

DIS ADVANTAGES:

There are two main problems in this system.


i.
One is that the size of the generated signature is
proportional to the size of the content and it makes
the signing very time consuming.
ii. the other is that the basis of authentication is the
correlation between feature sets and not bit-bit
comparison that could
cause some security
problems.

Proposed System:

The proposed scheme exploits the scalability of a structural


digital signature in order to achieve a good tradeoff between
security and image transfer for networked image applications.

ADVANTAGES:

i.

ii.

The proposed system generates only one fixedlength digital signature per image regardless of the
image size and the packet loss during transmission.
multi-scale features are used to make digital
signatures robust to image degradations and key
dependent parametric wavelet filters are employed
to improve the security against forgery attacks.

Modules
It has two modules they are as follow
1.

Image signing procedure

2.

Image authentication procedure

1.Image signing procedure:


the system generates a digital signature by
performing a signing process on the image in the
following order
1. decompose the image using parameterized wavelet
filters
2. extract the SDS
3. cryptographically hash the extracted SDS, generate
the crypto signature by the image senders private
key

2.Image authentication procedure


the proposed scheme authenticates both the integrity
and the source of the received image by applying the
following process on the image in the following
order:
1. perform content-adaptive error concealment, if
some blocks are damaged.
2. extract the SDS of the received image.
3. decrypt the signature by using the senders public
key.

Вам также может понравиться