TY - GEN
T1 - Column level image authentication technique using hidden digital signatures
AU - Khan, Sahib
AU - Wahid, Muneeza
AU - Khan, Tawab
AU - Ahmad, Nasir
AU - Zafar, Muhammad Haseeb
N1 - Publisher Copyright:
© 2018 Chinese Automation and Computing Society in the UK - CACSUK.
PY - 2018/9
Y1 - 2018/9
N2 - Column level image authentication technique is a new and efficient technique to authenticate the contents of an image. The proposed technique uses hidden digital signatures for this purpose. Individual signature is calculated from selected pixels for each column and are hidden in the designated pixels of the same column. The authentication of the image is confirmed by the comparison of the embedded and calculated signatures. The match found, validate the image contents and the failure detect manipulation in a specific column. The proposed technique preserved the size of image and does not introduce any additional data to it and save bandwidth. Along with authentication, proposed method is proficient to detect any type of manipulation made in a single or multiple column. It is sound enough to sense single bit amendment in an image. Moreover, the hidden digital signatures do not create any significant distortion to attract human visual system.
AB - Column level image authentication technique is a new and efficient technique to authenticate the contents of an image. The proposed technique uses hidden digital signatures for this purpose. Individual signature is calculated from selected pixels for each column and are hidden in the designated pixels of the same column. The authentication of the image is confirmed by the comparison of the embedded and calculated signatures. The match found, validate the image contents and the failure detect manipulation in a specific column. The proposed technique preserved the size of image and does not introduce any additional data to it and save bandwidth. Along with authentication, proposed method is proficient to detect any type of manipulation made in a single or multiple column. It is sound enough to sense single bit amendment in an image. Moreover, the hidden digital signatures do not create any significant distortion to attract human visual system.
KW - Digital Signatures
KW - Image Authentication
KW - Manipulation Detection
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=85069216373&partnerID=8YFLogxK
U2 - 10.23919/IConAC.2018.8748967
DO - 10.23919/IConAC.2018.8748967
M3 - Conference contribution
AN - SCOPUS:85069216373
T3 - ICAC 2018 - 2018 24th IEEE International Conference on Automation and Computing: Improving Productivity through Automation and Computing
BT - ICAC 2018 - 2018 24th IEEE International Conference on Automation and Computing
A2 - Ma, Xiandong
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 24th IEEE International Conference on Automation and Computing, ICAC 2018
Y2 - 6 September 2018 through 7 September 2018
ER -