design of secure&robust ds
TRANSCRIPT
-
7/31/2019 Design of Secure&Robust Ds
1/22
Design of a robust and secure digital signaturescheme for image authentication over wireless
channels
-
7/31/2019 Design of Secure&Robust Ds
2/22
-
7/31/2019 Design of Secure&Robust Ds
3/22
Contents
Modules design
-> Image Uploading
-> Wavelet decomposition-> Digital signature
-> Crypto signature
-> Verification:
-> Image authentication
Conclusion
-
7/31/2019 Design of Secure&Robust Ds
4/22
Introduction: The introduction of 3G wireless communication
systems, together with the invasive distributionof digital images and the growing concern ontheir originality triggers
To meet this need, a content-based imageauthentication scheme that is suitable for aninsecure network and robust to transmissionerrors is proposed.
The proposed scheme exploits the scalability of astructural digital signature in order to achieve agood tradeoff between security and imagetransfer for networked image applications.
-
7/31/2019 Design of Secure&Robust Ds
5/22
Abstract:
An emergent need of authenticating imagesreceived by unreliable channels, such as publicInternet and wireless networks.
To meet this need, a content-based imageauthentication scheme that is suitable for aninsecure network and robust to transmissionerrors is proposed
-
7/31/2019 Design of Secure&Robust Ds
6/22
Existing System
In existing system a distributed networkenvironment that makes multimedia contentsvulnerable to privacy and malicious attacks.
For insecure environments, it is possible for anenemy to tamper with images duringtransmission.
These techniques are required to be robustagainst normal image processing andtransmission errors, while being able to detectmalevolent tampering on the image.
-
7/31/2019 Design of Secure&Robust Ds
7/22
Proposed System
In this paper, a modified digital signature schemefor image authentication has been proposed.
Content-dependent structural image features andwavelet. Liter parameterization is incorporated intothe traditional crypto signature
The proposed scheme does not require anycomputational overhead, it is especially suited forwireless authentication systems and other real-timeapplications.
-
7/31/2019 Design of Secure&Robust Ds
8/22
-
7/31/2019 Design of Secure&Robust Ds
9/22
Block Diagram
Image signing procedure
-
7/31/2019 Design of Secure&Robust Ds
10/22
Block DiagramImage authentication procedure
-
7/31/2019 Design of Secure&Robust Ds
11/22
System Design
-
7/31/2019 Design of Secure&Robust Ds
12/22
Sender Use Case
-
7/31/2019 Design of Secure&Robust Ds
13/22
Receiver Use case
-
7/31/2019 Design of Secure&Robust Ds
14/22
Sender Sequence Diagram
-
7/31/2019 Design of Secure&Robust Ds
15/22
Receiver Sequence Diagram
-
7/31/2019 Design of Secure&Robust Ds
16/22
Activity
-
7/31/2019 Design of Secure&Robust Ds
17/22
Sender Collaboration
-
7/31/2019 Design of Secure&Robust Ds
18/22
Receiver Collaboration
-
7/31/2019 Design of Secure&Robust Ds
19/22
Sender Side Diagram
-
7/31/2019 Design of Secure&Robust Ds
20/22
Receiver Side Diagram
-
7/31/2019 Design of Secure&Robust Ds
21/22
Conclusion
Content-dependent structural image features and
wavelet filter parameterization are incorporatedinto the traditional crypto signature scheme.
To enhance the system robustness and security
Because the proposed scheme does not requireany computational overhead.
It is especially suited for wireless authenticationsystems and other real-time applications.
The analysis and the experimental results confirmthat the proposed scheme can achieve goodrobustness against transmission errors.
-
7/31/2019 Design of Secure&Robust Ds
22/22
THANK YOU