Abstract
Digital Images for seamless transmission over mobile network are required to be ensured with authentication and increasing concern for their integrity, originality and non repudiation qualities. In this paper, a novel approach of digital signature scheme of an image is introduced. The proposed scheme consists of three main steps. First, pixel selection, second, pixel values digest through hash function, and finally, creation of digital signature using elliptic curve cryptography based on public key cryptosystem. In this process, the sender uses the private key for hash value encryption, and the recipient uses the public key for signature verification. Instead of directly sending an original image to the recipients, the embedded copy is sent with signed digital signature for authentication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Koblitz, N., Menezes, A.J., Vanstone, S.A.: The state of elliptic curve cryptography. Design, Codes, and Cryptography 19(2-3), 173–193 (2000)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Informn, Theory IT-31(4), 469–472 (1985)
Shankar, T.N., Sahoo, G.: Cryptography with ellipitic curves. International Journal of Computer Science And Applications 2(1), 38–42
Shankar, T.N., Sahoo, G.: Cryptography with ASCII codes. International Journal of Secure Digital Age Information 1(2), 141–121
Younes, M.A.B., Jantan, A.: Image Encryption Using Block-Based Transformation Algorithm. IAENG International Journal of Computer Science, IJCS 35(1) (2003)
Shankar, T.N., Sahoo, G., Niranjan, S.: Elliptic Curve Point Multiplication by Using Complementary Recording for Image Encryption. In: INCOCCI 2010, Ieee Xplore, pp. 546–551 (2010)
Shankar, T.N., Sahoo, G., Niranjan, S.: Image Encryption for Mobile Devices. In: ICCCCT 2010, Ieee Xplore, pp. 612–516 (2010)
Johnson, D., Menezes, A., Vanstone, S.: The Elliptic Curve Digital Signature Algorithm (ECDSA). Certicom Research, Canada
Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice-Hall (1999)
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A New Chaotic Algorithm for Video Encryption. IEEE Trans. Consumer Electron. 48(4), 838–844 (2002)
Sudharsanan, S.: Shared Key Encryption of JPEG Color Images. IEEE Trans. Consumer Electron. 51(4), 1204–1211 (2005)
Dang, P.P., Chau, P.M.: Image Encryption for Secure Internet Multimedia Applications. IEEE Trans. Consumer Electron. 46(3), 395–403 (2000)
Schneider, M., Chang, S.-F.: Robust Content Based Digital Signature for Image Authentication. In: Proceedings of IEEE International Conference on Image Processing (ICIP 1996), vol. 3, pp. 227–230 (1996)
Lou, D.-C., Liu, J.-L.: Fault Resilient and Compression Tolerant Digital signature for Image Authentication. IEEE Transactions on Consumer Electronics 46(1), 31–39 (2000)
Fridrich, J.: Robust Bit Extraction from Images. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems (ICMCS 1999), vol. 2, pp. 536–540 (1999)
Jansirani, A., Rajesh, R., Balasubramanian, R., Eswaran, P.: Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding. The International Arab Journal of Information Technology 8(2), 117–123 (2011)
Lu, C.-S., Liao, H.-Y.M.: Structural Digital Signature for Image Authentication, An Incidental Distortion Resistant Scheme. IEEE Transactions on Multimedia 5(2), 161–173 (2003)
Alwan, R.H., Kadhim, F.J., Al-Taani, A.T.: Data Embedding Based on Better Use of Bits in Image Pixels. International Journal of Information and Communication Engineering 2(2), 104–107 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shankar, T.N., Sahoo, G., Niranjan, S. (2012). Digital Signature of an Image by Elliptic Curve Cryptosystem. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27317-9_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-27317-9_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27316-2
Online ISBN: 978-3-642-27317-9
eBook Packages: Computer ScienceComputer Science (R0)