Skip to main content

Digital Signature of an Image by Elliptic Curve Cryptosystem

  • Conference paper

Abstract

Digital Images for seamless transmission over mobile network are required to be ensured with authentication and increasing concern for their integrity, originality and non repudiation qualities. In this paper, a novel approach of digital signature scheme of an image is introduced. The proposed scheme consists of three main steps. First, pixel selection, second, pixel values digest through hash function, and finally, creation of digital signature using elliptic curve cryptography based on public key cryptosystem. In this process, the sender uses the private key for hash value encryption, and the recipient uses the public key for signature verification. Instead of directly sending an original image to the recipients, the embedded copy is sent with signed digital signature for authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koblitz, N., Menezes, A.J., Vanstone, S.A.: The state of elliptic curve cryptography. Design, Codes, and Cryptography 19(2-3), 173–193 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  2. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Informn, Theory IT-31(4), 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  3. Shankar, T.N., Sahoo, G.: Cryptography with ellipitic curves. International Journal of Computer Science And Applications 2(1), 38–42

    Google Scholar 

  4. Shankar, T.N., Sahoo, G.: Cryptography with ASCII codes. International Journal of Secure Digital Age Information 1(2), 141–121

    Google Scholar 

  5. Younes, M.A.B., Jantan, A.: Image Encryption Using Block-Based Transformation Algorithm. IAENG International Journal of Computer Science, IJCS 35(1) (2003)

    Google Scholar 

  6. Shankar, T.N., Sahoo, G., Niranjan, S.: Elliptic Curve Point Multiplication by Using Complementary Recording for Image Encryption. In: INCOCCI 2010, Ieee Xplore, pp. 546–551 (2010)

    Google Scholar 

  7. Shankar, T.N., Sahoo, G., Niranjan, S.: Image Encryption for Mobile Devices. In: ICCCCT 2010, Ieee Xplore, pp. 612–516 (2010)

    Google Scholar 

  8. Johnson, D., Menezes, A., Vanstone, S.: The Elliptic Curve Digital Signature Algorithm (ECDSA). Certicom Research, Canada

    Google Scholar 

  9. Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice-Hall (1999)

    Google Scholar 

  10. Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A New Chaotic Algorithm for Video Encryption. IEEE Trans. Consumer Electron. 48(4), 838–844 (2002)

    Article  Google Scholar 

  11. Sudharsanan, S.: Shared Key Encryption of JPEG Color Images. IEEE Trans. Consumer Electron. 51(4), 1204–1211 (2005)

    Article  Google Scholar 

  12. Dang, P.P., Chau, P.M.: Image Encryption for Secure Internet Multimedia Applications. IEEE Trans. Consumer Electron. 46(3), 395–403 (2000)

    Article  Google Scholar 

  13. Schneider, M., Chang, S.-F.: Robust Content Based Digital Signature for Image Authentication. In: Proceedings of IEEE International Conference on Image Processing (ICIP 1996), vol. 3, pp. 227–230 (1996)

    Google Scholar 

  14. Lou, D.-C., Liu, J.-L.: Fault Resilient and Compression Tolerant Digital signature for Image Authentication. IEEE Transactions on Consumer Electronics 46(1), 31–39 (2000)

    Article  Google Scholar 

  15. Fridrich, J.: Robust Bit Extraction from Images. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems (ICMCS 1999), vol. 2, pp. 536–540 (1999)

    Google Scholar 

  16. Jansirani, A., Rajesh, R., Balasubramanian, R., Eswaran, P.: Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding. The International Arab Journal of Information Technology 8(2), 117–123 (2011)

    Google Scholar 

  17. Lu, C.-S., Liao, H.-Y.M.: Structural Digital Signature for Image Authentication, An Incidental Distortion Resistant Scheme. IEEE Transactions on Multimedia 5(2), 161–173 (2003)

    Article  MathSciNet  Google Scholar 

  18. Alwan, R.H., Kadhim, F.J., Al-Taani, A.T.: Data Embedding Based on Better Use of Bits in Image Pixels. International Journal of Information and Communication Engineering 2(2), 104–107 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Shankar, T.N., Sahoo, G., Niranjan, S. (2012). Digital Signature of an Image by Elliptic Curve Cryptosystem. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27317-9_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27317-9_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27316-2

  • Online ISBN: 978-3-642-27317-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics