An image authentication technique in frequency domain using secure hash algorithm (FDSHA)

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The demand of security is getting higher in these days due to the development of computers and Internet. In this paper, we proposed a novel image authentication scheme in frequency domain using SHA-1 that allows two parties to exchange images while guaranteeing image authentication, integrity and nonrepudiation from the image sender, over an unsecured channel. The main idea is that at sender end, an image hash of the authenticating image of size 160 bits is generated using SHA-1 and this 160 bits then encrypted by sender's public key to produce a signature. Then the signature is embedded into cover image in frequency domain along with the authenticating image and creates stego-image with a minimum amount of perceivable degradation to the "cover" media. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Nag, A., Biswas, D., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). An image authentication technique in frequency domain using secure hash algorithm (FDSHA). In Communications in Computer and Information Science (Vol. 125 CCIS, pp. 335–341). https://doi.org/10.1007/978-3-642-18440-6_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free