Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/9644
Full metadata record
DC FieldValueLanguage
dc.contributor.authorM., Radhika-
dc.date.accessioned2014-11-20T04:11:21Z-
dc.date.available2014-11-20T04:11:21Z-
dc.date.issued2003-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/9644-
dc.guideMittal, R. C.-
dc.description.abstractSoft image authentication codes tolerate errors in the message to some extent, but their underlying checksums are constructed such that tampering and forgery are easy to detect. These codes are probabilistic in nature and have the property that they change slowly as the Hamming distance between the original and modified data increases. When IMAC is applied to images it is possible to detect and locate tampering. Techniques such as block averaging, parallel approximate message authentication code (AMAC) computation and image histogram enhancement are used in the construction of the approximate IMAC. Controlled Permutations are used to improve the security of code. The performance of IMAC in two image modification scenarios, namely, JPEG compression, deliberate image tampered is studied and compared. The code is written in JAVA under Windows environmenten_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectSOFT IMAGE AUTHENTICATIONen_US
dc.subjectIMACen_US
dc.subjectAPPROXIMATE MESSAGE AUTHENTICATION CODEen_US
dc.titleSOFT IMAGE AUTHENTICATION • USING IM ACen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG11114en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG11114.pdf4.13 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.