2011
DOI: 10.5121/sipij.2011.2214
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis

Abstract: The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. A digital watermark and signature method for image authentication using cryptography analysis is proposed. The digital signature created for the original ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…In that global public key, privet key & public key of user & per message one secrete number is given. Authentication is also done by using image verification [1]. Similarly in frequency domain watermarking is done by using DCT & FHT.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In that global public key, privet key & public key of user & per message one secrete number is given. Authentication is also done by using image verification [1]. Similarly in frequency domain watermarking is done by using DCT & FHT.…”
Section: Literature Reviewmentioning
confidence: 99%
“…If this person makes a modification, this is called an attack. [12,13,14,15,20,21] There are various kinds of attacks like copy, removal, mosaic etc. Watermark detection is an algorithm which is used to find the attacked data to attempt to extract the watermark from it.…”
Section: Principle Of Digital Watermarkingmentioning
confidence: 99%
“…In development of cryptographic technique the researchers have focused on cryptographic and steganographic techniques [16][17][18][19][20].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…For example for ASCII value of capital A is 65 and small a is 97. The code is used here for key to encrypt and embed at source and extract and decrypt at destination [13].…”
Section: Introductionmentioning
confidence: 99%