An image authentication and verification based on public key

被引:0
|
作者
Li Lizong [1 ]
Gao Tiegang [2 ]
Gu Qiaolun [1 ]
Bi Lei [3 ]
机构
[1] Tianjin Univ Technol & Educ, Coll Informat, Tianjin, Peoples R China
[2] Nankai Univ, Coll Software, Tianjin, Peoples R China
[3] Fortinet Inc, Anti Virsus Team, Tianjin, Peoples R China
基金
中国国家自然科学基金;
关键词
public key; image authentification; RSA; image verification; WATERMARKING;
D O I
10.1109/AICI.2009.76
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposed an algorithm for image authentication and verification. The algorithm is based on public key. The owner of image extracts the information as watermark information from the image which he wants to transmit to others. The owner embeds the watermark information into the image with public key. Anyone can judge the valid of the watermarked image, and locate the place which has been tampered. Experimental results show that the algorithm is better than the approximate image message authentication codes (IMACs).
引用
收藏
页码:389 / +
页数:2
相关论文
共 50 条
  • [31] Securing networked image transmission using public-key cryptography and identity authentication
    Gowda, V. Dankan
    Kumar, Pullela S. V. V. S. R.
    Latha, J.
    Selvakumar, C.
    Shekhar, R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 779 - 791
  • [32] A Blockchain-based DNSSEC Public Key Verification Scheme
    Chen W.-Y.
    Li X.-D.
    Yang X.
    Xu Y.-Z.
    Zidonghua Xuebao/Acta Automatica Sinica, 2023, 49 (04): : 731 - 743
  • [33] Image Authentication by Motion Blur Consistency Verification
    Kakar, Pravin
    Natarajan, Sudha
    Ser, Wee
    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 188 - 193
  • [34] Digital Signature Verification Scheme for Image Authentication
    Singh, Manpreet
    Kaur, Harpreet
    Kakkar, Ajay
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [35] A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme
    Naidu, V. Lokanadham
    Ramani, K.
    Ganesh, D.
    Munwar, Sk
    Basha, P.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 108 - 115
  • [36] One-way quantum identity authentication based on public key
    ZHANG XingLan College of Computer Science and Technology
    Science Bulletin, 2009, (12) : 2018 - 2021
  • [37] Biological Features Authentication Safe Signcryption Plan Based on Public Key
    Xing Shubao
    Xue Huifeng
    PROGRESS IN SAFETY MANAGEMENT RESEARCH AND PRACTICE, 2009, : 124 - 127
  • [38] Implicit Authentication in Neural Key Exchange Based on the Randomization of the Public Blockchain
    Noh, Siwan
    Rhee, Kyung-Hyune
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 545 - 549
  • [39] One-way quantum identity authentication based on public key
    Zhang XingLan
    CHINESE SCIENCE BULLETIN, 2009, 54 (12): : 2018 - 2021
  • [40] Hierarchical multiple image watermarking for image authentication and ownership verification
    Patra, JC
    Ang, KK
    Ang, EL
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 2661 - 2664