Reference Hub1
Digital Image Protection using Keyed Hash Function

Digital Image Protection using Keyed Hash Function

Siva Charan Muraharirao, Manik Lal Das
Copyright: © 2012 |Volume: 2 |Issue: 2 |Pages: 12
ISSN: 2155-6997|EISSN: 2155-6989|EISBN13: 9781466611269|DOI: 10.4018/ijcvip.2012040103
Cite Article Cite Article

MLA

Muraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." IJCVIP vol.2, no.2 2012: pp.36-47. http://doi.org/10.4018/ijcvip.2012040103

APA

Muraharirao, S. C. & Das, M. L. (2012). Digital Image Protection using Keyed Hash Function. International Journal of Computer Vision and Image Processing (IJCVIP), 2(2), 36-47. http://doi.org/10.4018/ijcvip.2012040103

Chicago

Muraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function," International Journal of Computer Vision and Image Processing (IJCVIP) 2, no.2: 36-47. http://doi.org/10.4018/ijcvip.2012040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.