Digital Signature Scheme for Image
نویسندگان
چکیده
منابع مشابه
Digital Signature Scheme for Image
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on th...
متن کاملCombined Digital Signature and Digital Watermark Scheme for Image Authentication
Conventional digital signature schemes for image authentication encode the signature in a file separate from the original image, thus require extra bandwidth to transmit it. Meantime, the watermark technique embeds some information in the host image. In this paper, a combined digital watermark and digital signature scheme for image authentication is proposed. The scheme extracts signature from ...
متن کاملImage Authentication Scheme using Digital Signature and Digital Watermarking
Usual digital signature schemes for image authentication encode the signature in a file separate from the original image, so this process require extra bandwidth to transmit it. Meantime, watermarking is an information hiding sub-discipline that embeds some information into host image. In this paper a joined digital signature and digital watermarking scheme for image authentication is proposed ...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملDigital Signature based Proxy Multi-Signature Scheme
A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose ECDLP based solution for chen et. al [1] scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less computation overhead compare...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/7708-1012