An image authentication and verification based on public key

被引:0
|
作者
Li Lizong [1 ]
Gao Tiegang [2 ]
Gu Qiaolun [1 ]
Bi Lei [3 ]
机构
[1] Tianjin Univ Technol & Educ, Coll Informat, Tianjin, Peoples R China
[2] Nankai Univ, Coll Software, Tianjin, Peoples R China
[3] Fortinet Inc, Anti Virsus Team, Tianjin, Peoples R China
基金
中国国家自然科学基金;
关键词
public key; image authentification; RSA; image verification; WATERMARKING;
D O I
10.1109/AICI.2009.76
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposed an algorithm for image authentication and verification. The algorithm is based on public key. The owner of image extracts the information as watermark information from the image which he wants to transmit to others. The owner embeds the watermark information into the image with public key. Anyone can judge the valid of the watermarked image, and locate the place which has been tampered. Experimental results show that the algorithm is better than the approximate image message authentication codes (IMACs).
引用
收藏
页码:389 / +
页数:2
相关论文
共 50 条
  • [41] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
  • [42] Secret key authentication with software-only verification
    Hoepman, JH
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 313 - 326
  • [43] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
  • [44] A Multi-Party User Authentication and Key Agreement Protocol Based on Public Key Cryptosystem
    Yalamanchili, Sushma
    Rao, M. Kameswara
    Smitha, Ch.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 80 - 84
  • [45] An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key
    Lu, Xiaofeng
    Yang, Fan
    Zou, Luwen
    Lio, Pietro
    Hui, Pan
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (03) : 1101 - 1116
  • [46] Public watermarking for reversible image authentication
    Gu, Qiaolun
    Gao, Tiegang
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 95 - +
  • [47] Public Key Image Encryption Based on Compressed Sensing
    Xie, Dong
    IEEE ACCESS, 2019, 7 : 131672 - 131680
  • [48] Public key authentication scheme over quaternions
    Valluri, Maheswara Rao
    Narayan, Shailendra Vikash
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (01): : 169 - 181
  • [49] Password authentication without the server public key
    Chang, YF
    Chang, CC
    Liu, YL
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3088 - 3091
  • [50] AUTHENTICATION OF SIGNATURES USING PUBLIC KEY ENCRYPTION
    BOOTH, KS
    COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 772 - 774