Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/9644
Title: SOFT IMAGE AUTHENTICATION • USING IM AC
Authors: M., Radhika
Keywords: ELECTRONICS AND COMPUTER ENGINEERING;SOFT IMAGE AUTHENTICATION;IMAC;APPROXIMATE MESSAGE AUTHENTICATION CODE
Issue Date: 2003
Abstract: Soft image authentication codes tolerate errors in the message to some extent, but their underlying checksums are constructed such that tampering and forgery are easy to detect. These codes are probabilistic in nature and have the property that they change slowly as the Hamming distance between the original and modified data increases. When IMAC is applied to images it is possible to detect and locate tampering. Techniques such as block averaging, parallel approximate message authentication code (AMAC) computation and image histogram enhancement are used in the construction of the approximate IMAC. Controlled Permutations are used to improve the security of code. The performance of IMAC in two image modification scenarios, namely, JPEG compression, deliberate image tampered is studied and compared. The code is written in JAVA under Windows environment
URI: http://hdl.handle.net/123456789/9644
Other Identifiers: M.Tech
Research Supervisor/ Guide: Mittal, R. C.
metadata.dc.type: M.Tech Dessertation
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG11114.pdf4.13 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.