Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication

Authors

  • Saikat Bose Research Scholar, Department of Computer science and Engineering, Bhabha University, Bhopal, Madhya Pradesh, India
  • Mohit Gangwar Dean (R&D), SIRT, SAGE/SIRT Group of Institutions, Bhopal, Madhya Pradesh, India
  • Tripti Arjariya Professor, Department of Computer Science and Software Engineering, Bhabha University, Bhopal, Madhya Pradesh, India

Keywords:

E-stamp, Dynamic Authentication, Variable Signature Marking, Variable Secret Bit Coding, Region Based Multiple Watermarking

Abstract

The work emphasizing dynamic authentications for transmitted e-documents like e-stamp paper under wireless environments through variable circular concealment of multiple invisible signature images governed by the encryption of secret key and the session random number. Additionally region wise separate bit casting strategy and dynamical bit sequencing concepts for multiple signatures ensuring greater security and robustness. Additional multi-copy signature marking on all non-overlapping areas of the document cover image, along with noticeably varied bit encoding strategies on each modified pixel byte coefficient for the cover image sub blocks, essentially improve protection and signature recovery from attacks. The reverse transformed bit coded pixel byte components for the sub blocks within the spatial domain ranges are maintained while the threshold range driven bit creation notion operates admirably under attacks. Finally, since all the secret information and the random number are likewise provided to the receiver, the securely marked signature bits may then be recognized there in the appropriate relevant ordering from the corresponding forward transformed sub block pixel byte elements. Significantly improved performance of our system in contrast to earlier efforts has been proven by significant experimental results, which also highlight solid trusted authentication and confidentiality scenarios as the key security issues.

Downloads

Download data is not yet available.

References

T.K.Tsui, Waterloo, Xhio-ping Zhang, Androutsos D,”Color Image Watermarking using Multidimensional Fourier Transform”,IEEE Trans. ON Info Forensics and Sec.,vol.3,no.1,pp.16-28,Mar 2008.

Nasir, Y. Weng, J.Jiang and S. Ipson, “Multiple spatial watermarking technique in color images,” Springer-Verlag London Limited, 2010 ,SIViP (2010) 4:145-154.

S.Behnia,M.Teshnehlab,P.Ayubi,”Multiple-watermarking scheme based on improved chaotic maps”, Elsevier B.V,2010,Common Nonlinear Sci Simulat 15(2010),pp.2469-2478.

N.Ghosal, J.K. Mondal,”Discrete Fourier Transformation based Multimedia Colour Image Authentication for Wireless Communication”, 2nd IEEE Intl Conf. Wireless VIATE 2011, Chennai, Feb.28 2011-March 3 2011,pp.1-5,ISBN:978-1-4577-0787-2.

N. Mohananthini, G.Yamuna, R.Vivek, “Comparison of Successive and Segmented Watermarking Techniques for Colour images”, NCETICT 2013, IJCA (0975-8887), 2013, pp.13–16.

G.Bhatnagar and Q,M,Jonathan Wu, “A New robust and efficient multiple watermarking scheme,” ,Springer Science + Business Media New York,2013,DOI 10.1007/s11042-013-1681-8.

N.Mohananthini and G.Yamuna, “Performance Comparison of Single and Multiple Watermarking Techniques”, vol-6, IJCNIS,DOI:10.5815/ijcnis.2014.07.04, 2014, pp. 28–34.

M.Babaei,K.W.Ng,H.Babaei,H.G.Niknajeh, ”A Robust Multiwatermarking Scheme for Multiple Digital Input Images in DWT Domain”,vol-3,2014,IJCIT,ISSN:2279-0764,pp.834-840.

R.M.Thanki,K.R.Borisagar,”Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection”, vol,IJIGSP,DOI:10.5815.2015.01.07,2015, pp.53-60.

N.Mohananthini,G.Yamuna,”Comparison of multiple watermarking techniques using genetic algorithms” ,Elsevier B.V,JESIT-70,2016.

URLhttp://sipi.usc.edu/services/database/Database.html

M. Kutter, F. A. P. Petitcolas, A Fair Benchmark For Image Watermarking Systems. Electronic Imaging 99, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 1-14, Sans Jose, CA, USA, 25-27 January 1999, The Int. Society for Optical Engg.

Mohananthini, N. & Yamuna, G., Image Fusion Process for Multiple Watermarking Schemes against Attacks. Journal of Network Communications and Emerging Technologies (JNCET), Volume 1, Issue 2, April (2015), ISSN: 2395-5317.

Natarajan, M., Govindarajan, Y.: Performance comparison of single and multiple water-marking techniques. International Journal of Computer Network and Information Security. 7, 28-34 (2014). doi: 10.5815/ ijcnis.2014. 07. 04.

Mohananthini, N., Yamuna, G.: Comparison of multiple watermarking techniques using genetic algorithms. Journal of Electrical Systems & Information Technology. 3, 68-80 (2016) .doi: 10.1016/j.jesit.2015.11.009

Matlab:http://in.mathworks.com/help/Images/index.htm (2016).

Saikat Bose, Tripti Arjariya, Anirban Goswami, Soumit Chowdhury Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.5, September 2022DOI: 10.5121/ijcnc.2022.14506

Chowdhury, S., Mukherjee, R., Ghoshal, N. : Dynamic authentication protocol using multiple signatures. Wireless Personal Communications. 93(3), 1-32 (2017). doi: 10.1007/11277-017-4066-x.

Alias, N., Ernawan, F.: Multiple watermarking techniques using optimal threshold. Indonesian Journal of Electrical Engineering and Computer Science. 18(1), 368- 376 (2020). ISSN: 2502-4752, DOI: 10.11591/ijeecs.v18.i1.pp368-376

Liu, J., Li J., Ma, J., Sadiq, N., Bhatti, U. A., Ai, Y.: A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map. Applied Sciences. 9, 700, 1- 23 (2019). doi:10.3390/app9040700.

M. Gangwar, R. S. Yadav and R. B. Mishra, "Semantic Web Services for medical health planning," 2012 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 2012, pp. 614-618, doi: 10.1109/RAIT.2012.6194599.

Gangwar, M., Mishra, R. B., Yadav, R. S., & Pandey, B. (2013). Intelligent computing methods for the interpretation of neuropsychiatric diseases based on Rbr-Cbr-Ann integration. International Journal of Computers & Technology, 11(5), 2490-2511.

Gangwar, M., Singh, A. P., Ojha, B. K., Shukla, H. K., Srivastava, R., & Goyal, N. (2020). Intelligent Computing Model For Psychiatric Disorder. Journal of Critical Reviews, 7(7), 600-603.

Patil, R. S., Arjariya, T., & Gangwar, M. (2023). Detection of Cardiac Abnormalities and Heart Disease Using Machine Learning Techniques. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 598-605.

Downloads

Published

25.12.2023

How to Cite

Bose, S. ., Gangwar , M. ., & Arjariya, T. . (2023). Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication . International Journal of Intelligent Systems and Applications in Engineering, 12(2), 29–41. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4217

Issue

Section

Research Article