2011 | OriginalPaper | Chapter
An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
Authors : Amitava Nag, Debasish Biswas, Soumadip Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar
Published in: Advances in Computing, Communication and Control
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
The demand of security is getting higher in these days due to the development of computers and Internet. In this paper, we proposed a novel image authentication scheme in frequency domain using SHA-1 that allows two parties to exchange images while guaranteeing image authentication, integrity and nonrepudiation from the image sender, over an unsecured channel. The main idea is that at sender end, an image hash of the authenticating image of size 160 bits is generated using SHA-1 and this 160 bits then encrypted by sender’s public key to produce a signature. Then the signature is embedded into cover image in frequency domain along with the authenticating image and creates stego-image with a minimum amount of perceivable degradation to the “cover” media.