Open Access Open Access  Restricted Access Subscription or Fee Access

Digital Signature Scheme for Image

Tammana ., Ankit Chaudhary

Abstract


: Image authentication techniques have currently added great consideration due to its importance for a large number of multimedia applications. Digital images are progressively communicated over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These methods comprise conformist cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The purpose of this paper is to present evolving technique for image authentication. It also familiarizes the new concept of image content authentication and deliberates the most important requirements for an effective image authentication system design. Methods which are discussed provide strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different anticipated image processing operations.[

Full Text:

PDF

References


http://www.Digital Signature.com

http://www.twitter.com

www.semiarsonly.com

www.studymafia.com

www.seminarprojects.com

www.wikipedia.com

www.scribd.com

www.researchreport.com

www.linkdn.com

www.csmaterial.com




DOI: https://doi.org/10.37628/ijoippr.v3i2.328

Refbacks

  • There are currently no refbacks.