SlideShare a Scribd company logo
1 of 16
IMAGE FEATURE BASED
AUTHENTICATION AND DIGITAL
SIGNATURE FOR WIRELESS DATA
TRANSMISION
ARATHI JAYAPRAKASH
MTECH 1ST YEAR
REG NO : 16304002
2016-2017
PONDICHERRY UNIVERSITY
DEPARTMENT OF ELECTRONICS
ENGINEERING
INTRODUCTION
 Digital images prone to error when transmitted over wireless channel
 Tamper to image data could change the decision
 Content based authentication is efficient which used where content does not
change
 Server database stores a set of images and a symmetric key through
advanced encryption standard (AES)
 Each image chooses an image as password from database
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 2
INTRODUCTION (contd..)
► Encrypted data transmitted via AWGN
► At receiver, extracts the features and encrypts with each user keys
► Authenticates the user with closest match
► Effectively authenticate user even under high noise and attack
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 3
OBJECTIVE
 Developing the secured wireless transmission of image content by providing
high authenticity
 Comparing the level of authentication graph between conventional text
password and image feature
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 4
PROPOSED METHOD
 Authentication mainly uses convolution method to recover from noisy
channels
 Uses semi-fragile signature method and image signing procedure in encryption
domain
 It concerns with verifying authenticity of received image with some allowable
and acceptable manipulations
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 5
PROPOSED METHOD (contd..)
 Two problems are involved
 Generated signature size is proportional to size of content
 Correlation between features and bit by bit comparison causes security
problem
 To avoid this a content dependent key used,ie. hashing is done
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 6
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 7
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 8
PROGRAM ALGORITHM METHODS
1. 16 byte key for each user is generated and stored in database
2. Once registered ,user’s select transmission process by selecting user and
image from the stored in database
3. Extraction of wavelet feature from image I done like mean and standard
deviation using haar wavelet transform and encryption uses data key
4. 14 valued extracted features are encrypted using symmetric encryption
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 9
PROGRAM ALGORITHM METHODS
(contd.)
5. Encrypted values converted to binary and transmitted over channel
6. Baseband modulation is used and technique of bipolar coding to convert data
7. Noise is added with specific signal to noise ratio to make signal amplitude
fluctuating
8. Some bits are changed as per user choice which is called tampering where
actual data is made to change
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 10
PROGRAM ALGORITHM METHODS
(contd.)
9. At receiver ,selects images from database and extract the wavelet features
of it
10. No public key available, only data key is used
11. Encrypts the features with keys available and compare with stored database
feature
12. Distance between received image feature and other features extracted from
database is calculated as Euclidean distance
13. Smallest distance is assumed to be authenticated
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 11
GRAPHS AND DISCUSSIONS
Rate of authentication
achieved is better than
conventional method i.e.
text based authentication
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 12
GRAPHS AND DISCUSSIONS (contd..)
Rate of authentication
achieved is better even
under tampering effects.
The accuracy decreases as
number of tampering
bytes are increased
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 13
CONCLUSION
 Modified scheme of authentication for image content is proposed
 No computational complexity and suitable for wireless communication
and other real time applications
 Image based content authentication is more robust and secure than
text based password
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 14
REFERENCES
 Mohammad Ziaullah, Prakash Shetty, Shoaib Kamal :’ Image Feature Based
Authentication and Digital Signature for Wireless Data Transmission’ ; 2016
International Conference on Computer Communication and Informatics (Ieeel
-20 16), Jan. 07 - 09, 2016, Coimbatore, INDIA
 Lou D.C., Liu J.L., Li C.T.: 'Digital Signature-Based Image Authentication', in
LU C.S. (EDS.): 'Multimedia security: steganography and digital water marking
techniques for protection of intellectual property' (Idea Group Inc., 2003.
 Schneider M., Chang S.-F.: ‘Content based digital signature for image
authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp.
227-230.
 Lu C.S.: 'On the security of structural information extraction/embedding
for image authentication'. Proc. IEEE ISCAS'04, 2004,pp.169-172.
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 15
10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 16

More Related Content

What's hot

Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
Multifactor Authentication on the Blockchain
Multifactor Authentication on the BlockchainMultifactor Authentication on the Blockchain
Multifactor Authentication on the BlockchainReza Ismail
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project listVision Solutions
 
A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...finalsemprojects
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...Nexgen Technology
 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14MSR PROJECTS
 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final listManju Nath
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects listManju Nath
 
Pantech ns2 projects 2016-17
Pantech   ns2 projects 2016-17Pantech   ns2 projects 2016-17
Pantech ns2 projects 2016-17Java Team
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyIDES Editor
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17praba123456
 
2015 application projects
2015 application projects2015 application projects
2015 application projectsHari Krishnan
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17Java Team
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project listMSR PROJECTS
 
Latest mca projects in chennai
Latest mca projects in chennaiLatest mca projects in chennai
Latest mca projects in chennaiexcellertechnoly
 

What's hot (19)

Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
Multifactor Authentication on the Blockchain
Multifactor Authentication on the BlockchainMultifactor Authentication on the Blockchain
Multifactor Authentication on the Blockchain
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projects
 
A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...
 
Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14
 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final list
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects list
 
Pantech ns2 projects 2016-17
Pantech   ns2 projects 2016-17Pantech   ns2 projects 2016-17
Pantech ns2 projects 2016-17
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17
 
2015 application projects
2015 application projects2015 application projects
2015 application projects
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17
 
Java ieee titles2016 student
Java ieee titles2016  studentJava ieee titles2016  student
Java ieee titles2016 student
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
 
Latest mca projects in chennai
Latest mca projects in chennaiLatest mca projects in chennai
Latest mca projects in chennai
 

Viewers also liked

Laporan resmi suspensi ibuprofen
Laporan resmi suspensi ibuprofenLaporan resmi suspensi ibuprofen
Laporan resmi suspensi ibuprofenKezia Hani Novita
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13ravik09783
 
E tutorial-filing correction
E tutorial-filing correctionE tutorial-filing correction
E tutorial-filing correctionPSPCL
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signaturePSPCL
 

Viewers also liked (9)

Conclusion
ConclusionConclusion
Conclusion
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Laporan resmi suspensi ibuprofen
Laporan resmi suspensi ibuprofenLaporan resmi suspensi ibuprofen
Laporan resmi suspensi ibuprofen
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
E tutorial-filing correction
E tutorial-filing correctionE tutorial-filing correction
E tutorial-filing correction
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 

Similar to IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsVijay Karan
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsVijay Karan
 
Muhammad's Presentation.pptx
Muhammad's Presentation.pptxMuhammad's Presentation.pptx
Muhammad's Presentation.pptxMunirAli6
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...IRJET Journal
 
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...Asma Swapna
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Peace Asukwo
 
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionIEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionmadhucharis
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Privacy and quality preserving multimedia data
Privacy and quality preserving multimedia dataPrivacy and quality preserving multimedia data
Privacy and quality preserving multimedia datajpstudcorner
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart ConnectivityReza Rahimi
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructuresAdtran
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 

Similar to IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION (20)

ITIMP35.pptx
ITIMP35.pptxITIMP35.pptx
ITIMP35.pptx
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
Muhammad's Presentation.pptx
Muhammad's Presentation.pptxMuhammad's Presentation.pptx
Muhammad's Presentation.pptx
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
 
Arup
ArupArup
Arup
 
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)
 
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detectionIEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
IEEE Connect 2020 Novel TLS signature extraction for Encrypted malware detection
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Privacy and quality preserving multimedia data
Privacy and quality preserving multimedia dataPrivacy and quality preserving multimedia data
Privacy and quality preserving multimedia data
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart Connectivity
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION

  • 1. IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION ARATHI JAYAPRAKASH MTECH 1ST YEAR REG NO : 16304002 2016-2017 PONDICHERRY UNIVERSITY DEPARTMENT OF ELECTRONICS ENGINEERING
  • 2. INTRODUCTION  Digital images prone to error when transmitted over wireless channel  Tamper to image data could change the decision  Content based authentication is efficient which used where content does not change  Server database stores a set of images and a symmetric key through advanced encryption standard (AES)  Each image chooses an image as password from database 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 2
  • 3. INTRODUCTION (contd..) ► Encrypted data transmitted via AWGN ► At receiver, extracts the features and encrypts with each user keys ► Authenticates the user with closest match ► Effectively authenticate user even under high noise and attack 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 3
  • 4. OBJECTIVE  Developing the secured wireless transmission of image content by providing high authenticity  Comparing the level of authentication graph between conventional text password and image feature 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 4
  • 5. PROPOSED METHOD  Authentication mainly uses convolution method to recover from noisy channels  Uses semi-fragile signature method and image signing procedure in encryption domain  It concerns with verifying authenticity of received image with some allowable and acceptable manipulations 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 5
  • 6. PROPOSED METHOD (contd..)  Two problems are involved  Generated signature size is proportional to size of content  Correlation between features and bit by bit comparison causes security problem  To avoid this a content dependent key used,ie. hashing is done 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 6
  • 7. 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 7
  • 8. 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 8
  • 9. PROGRAM ALGORITHM METHODS 1. 16 byte key for each user is generated and stored in database 2. Once registered ,user’s select transmission process by selecting user and image from the stored in database 3. Extraction of wavelet feature from image I done like mean and standard deviation using haar wavelet transform and encryption uses data key 4. 14 valued extracted features are encrypted using symmetric encryption 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 9
  • 10. PROGRAM ALGORITHM METHODS (contd.) 5. Encrypted values converted to binary and transmitted over channel 6. Baseband modulation is used and technique of bipolar coding to convert data 7. Noise is added with specific signal to noise ratio to make signal amplitude fluctuating 8. Some bits are changed as per user choice which is called tampering where actual data is made to change 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 10
  • 11. PROGRAM ALGORITHM METHODS (contd.) 9. At receiver ,selects images from database and extract the wavelet features of it 10. No public key available, only data key is used 11. Encrypts the features with keys available and compare with stored database feature 12. Distance between received image feature and other features extracted from database is calculated as Euclidean distance 13. Smallest distance is assumed to be authenticated 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 11
  • 12. GRAPHS AND DISCUSSIONS Rate of authentication achieved is better than conventional method i.e. text based authentication 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 12
  • 13. GRAPHS AND DISCUSSIONS (contd..) Rate of authentication achieved is better even under tampering effects. The accuracy decreases as number of tampering bytes are increased 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 13
  • 14. CONCLUSION  Modified scheme of authentication for image content is proposed  No computational complexity and suitable for wireless communication and other real time applications  Image based content authentication is more robust and secure than text based password 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 14
  • 15. REFERENCES  Mohammad Ziaullah, Prakash Shetty, Shoaib Kamal :’ Image Feature Based Authentication and Digital Signature for Wireless Data Transmission’ ; 2016 International Conference on Computer Communication and Informatics (Ieeel -20 16), Jan. 07 - 09, 2016, Coimbatore, INDIA  Lou D.C., Liu J.L., Li C.T.: 'Digital Signature-Based Image Authentication', in LU C.S. (EDS.): 'Multimedia security: steganography and digital water marking techniques for protection of intellectual property' (Idea Group Inc., 2003.  Schneider M., Chang S.-F.: ‘Content based digital signature for image authentication'. Proc. IEEE Int. Conf. Image Processing (ICIP'96), 1996, pp. 227-230.  Lu C.S.: 'On the security of structural information extraction/embedding for image authentication'. Proc. IEEE ISCAS'04, 2004,pp.169-172. 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 15
  • 16. 10/24/2016IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TRANSMISION 16