ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original image is taken and is encrypted by RSA. The digital signature obtained is concealed in the image. Digital signature is sent along with the encrypted image which decreases the probability of meticulous attack by the intruder. The encrypted image is shuffled using Chaotic Logistic Map to get the final shuffled encrypted image. The use of Logistic Map improves the randomness in the image. For the authentication, a comparator is employed which evaluates correctness of the hash extracted. The simulations have been carried out to examine the proposed authentication and encryption technique.
IV. CONCLUSION
The robust technique of image authentication and Image encryption technique based on digital signature and error correcting code is proposed. It has implemented successfully in Python language. We have tested the algorithm on the Lena image. The dimension of image is changed due to addition of extra bits by Reed Solomon code that makes difficulty to encrypt the image. The authenticity of received image is checked using digital signature. This project successfully transfers the digital signature over the channel without giving the chances of intrusion by the intruder. Even if the image is intruded at the receiver end, the receiver will be able to differentiate between obtained image and original image by comparing the hashes. The digital signature is also verified with the same technique. Furthermore, the algorithm is shown to be highly sensitive to its alteration of image. Experimental results show that our scheme has high security and is capable of authenticating the image.