مشخصات مقاله | |
انتشار | مقاله سال 2015 |
تعداد صفحات مقاله انگلیسی | 5 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه IEEE |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Digital Image Authentication and Encryption using Digital Signature |
ترجمه عنوان مقاله | تشخیص هویت و رمزگذاری تصویر دیجیتال با استفاده از امضای دیجیتالی |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | مهندسی نرم افزار، امنیت اطلاعات، هوش مصنوعی |
مجله | کنفرانس بین المللی پیشرفت در مهندسی کامپیوتر و برنامه های کاربردی – International Conference on Advances in Computer Engineering and Applications |
دانشگاه | Faculty of Engineering and Technology – Jamia Millia Islamia – India |
کلمات کلیدی | امضای دیجیتال، رمزگذاری سلیمون رید، نقشه لجستیک، RSA، SHA-1 |
کلمات کلیدی انگلیسی | Digital signature, reed solomon encoding, logistic map, RSA, SHA-1 |
کد محصول | E6078 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
I. INTRODUCTION
In modern era, technology has its own benefits and pitfalls. The major drawbacks include the unethical intrusion over the channels to steal the important information from the sender. To reduce the information leakage over the channels, various encryption methods [13, 14] have been proposed. With the advancement in technology, the security of digital images has become more and more crucial since the communications of digital products over internet are taking place more and more frequently. The organizations are migrating towards the electronic documents to reduce the paper work. To safeguard the electronic documents from potential hackers, public-key cryptography [1, 3, 6] known as digital signatures are used to authenticate the data sent over the channels. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and protection in transmission of information in digital form [9]. Encryption can protect the privacy of data, but other methods are still needed to protect the integrity and authenticity of data. For example verification of a message authentication codes (MAC) or a digital signature. A digital signature [7] has many advantages like relative alleviate of laying down that the signature is authentic, the difficulty of forging a signature, the nontransferability of signature, the difficulty of altering signature, and the nonrepudiation of digital signature to insure that the signer cannot later deny signing. The signature must employ some information which is unique to sender to preclude both counterfeit and denial [8]. It must be comparatively easy to produce. To tackle this problem, a simple and effective method employing the concept of digital signature and error coding technique for image encryption is proposed by Aloka [1]. In Aloka et al. the digital signature is appended to the encoded image which is obtained by applying BCH encoding technique. At the receiver side, the digital signature can be employed to verify the legitimacy of the image. A digital correlation technique is used to verify the legitimacy of the deciphered image. In this paper, we tapped the features of SHA-1 hash scheme, Reed Solomon algorithm and digital signature to verify the authenticity of the image received. We used chaotic logistic map to spread the digital signature within the encrypted image, consequently making the proposed technique secure. |