2012
DOI: 10.5120/7708-1012
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signature Scheme for Image

Abstract: Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Doke et al [ 20 ] proposed a low phase filter method for acquiring an X random pattern for each random matrix recurrently. Through the signing operation on the image, the model generates a digital signature.…”
Section: Classification Of Active Image Forgery Detectionmentioning
confidence: 99%
“…Doke et al [ 20 ] proposed a low phase filter method for acquiring an X random pattern for each random matrix recurrently. Through the signing operation on the image, the model generates a digital signature.…”
Section: Classification Of Active Image Forgery Detectionmentioning
confidence: 99%
“…The digital signature is generated through a system by placing process of signing in image which is digital [3]. The steps involved in image signing process are [4]: 1) The image is decomposed by using the parameterized wavelet feature. 2) SDS is extracted 3) Hash cryptographically extract SDS and generate signature of crypto by using sender key which is private of an image.…”
Section: Active Approachmentioning
confidence: 99%
“…System generate digital signature by applying signing process on digital image. Image Signing process contain following steps [3]: 1) Decompose the image using parameterized wavelet feature. 2) Extract the SDS 3) Cryptographically hash the extracted SDS, generate the crypto signature by the image senders private key.…”
Section: ) Digital Signaturementioning
confidence: 99%