Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication
Keywords:
E-stamp, Dynamic Authentication, Variable Signature Marking, Variable Secret Bit Coding, Region Based Multiple WatermarkingAbstract
The work emphasizing dynamic authentications for transmitted e-documents like e-stamp paper under wireless environments through variable circular concealment of multiple invisible signature images governed by the encryption of secret key and the session random number. Additionally region wise separate bit casting strategy and dynamical bit sequencing concepts for multiple signatures ensuring greater security and robustness. Additional multi-copy signature marking on all non-overlapping areas of the document cover image, along with noticeably varied bit encoding strategies on each modified pixel byte coefficient for the cover image sub blocks, essentially improve protection and signature recovery from attacks. The reverse transformed bit coded pixel byte components for the sub blocks within the spatial domain ranges are maintained while the threshold range driven bit creation notion operates admirably under attacks. Finally, since all the secret information and the random number are likewise provided to the receiver, the securely marked signature bits may then be recognized there in the appropriate relevant ordering from the corresponding forward transformed sub block pixel byte elements. Significantly improved performance of our system in contrast to earlier efforts has been proven by significant experimental results, which also highlight solid trusted authentication and confidentiality scenarios as the key security issues.
Downloads
References
T.K.Tsui, Waterloo, Xhio-ping Zhang, Androutsos D,”Color Image Watermarking using Multidimensional Fourier Transform”,IEEE Trans. ON Info Forensics and Sec.,vol.3,no.1,pp.16-28,Mar 2008.
Nasir, Y. Weng, J.Jiang and S. Ipson, “Multiple spatial watermarking technique in color images,” Springer-Verlag London Limited, 2010 ,SIViP (2010) 4:145-154.
S.Behnia,M.Teshnehlab,P.Ayubi,”Multiple-watermarking scheme based on improved chaotic maps”, Elsevier B.V,2010,Common Nonlinear Sci Simulat 15(2010),pp.2469-2478.
N.Ghosal, J.K. Mondal,”Discrete Fourier Transformation based Multimedia Colour Image Authentication for Wireless Communication”, 2nd IEEE Intl Conf. Wireless VIATE 2011, Chennai, Feb.28 2011-March 3 2011,pp.1-5,ISBN:978-1-4577-0787-2.
N. Mohananthini, G.Yamuna, R.Vivek, “Comparison of Successive and Segmented Watermarking Techniques for Colour images”, NCETICT 2013, IJCA (0975-8887), 2013, pp.13–16.
G.Bhatnagar and Q,M,Jonathan Wu, “A New robust and efficient multiple watermarking scheme,” ,Springer Science + Business Media New York,2013,DOI 10.1007/s11042-013-1681-8.
N.Mohananthini and G.Yamuna, “Performance Comparison of Single and Multiple Watermarking Techniques”, vol-6, IJCNIS,DOI:10.5815/ijcnis.2014.07.04, 2014, pp. 28–34.
M.Babaei,K.W.Ng,H.Babaei,H.G.Niknajeh, ”A Robust Multiwatermarking Scheme for Multiple Digital Input Images in DWT Domain”,vol-3,2014,IJCIT,ISSN:2279-0764,pp.834-840.
R.M.Thanki,K.R.Borisagar,”Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection”, vol,IJIGSP,DOI:10.5815.2015.01.07,2015, pp.53-60.
N.Mohananthini,G.Yamuna,”Comparison of multiple watermarking techniques using genetic algorithms” ,Elsevier B.V,JESIT-70,2016.
URLhttp://sipi.usc.edu/services/database/Database.html
M. Kutter, F. A. P. Petitcolas, A Fair Benchmark For Image Watermarking Systems. Electronic Imaging 99, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 1-14, Sans Jose, CA, USA, 25-27 January 1999, The Int. Society for Optical Engg.
Mohananthini, N. & Yamuna, G., Image Fusion Process for Multiple Watermarking Schemes against Attacks. Journal of Network Communications and Emerging Technologies (JNCET), Volume 1, Issue 2, April (2015), ISSN: 2395-5317.
Natarajan, M., Govindarajan, Y.: Performance comparison of single and multiple water-marking techniques. International Journal of Computer Network and Information Security. 7, 28-34 (2014). doi: 10.5815/ ijcnis.2014. 07. 04.
Mohananthini, N., Yamuna, G.: Comparison of multiple watermarking techniques using genetic algorithms. Journal of Electrical Systems & Information Technology. 3, 68-80 (2016) .doi: 10.1016/j.jesit.2015.11.009
Matlab:http://in.mathworks.com/help/Images/index.htm (2016).
Saikat Bose, Tripti Arjariya, Anirban Goswami, Soumit Chowdhury Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.5, September 2022DOI: 10.5121/ijcnc.2022.14506
Chowdhury, S., Mukherjee, R., Ghoshal, N. : Dynamic authentication protocol using multiple signatures. Wireless Personal Communications. 93(3), 1-32 (2017). doi: 10.1007/11277-017-4066-x.
Alias, N., Ernawan, F.: Multiple watermarking techniques using optimal threshold. Indonesian Journal of Electrical Engineering and Computer Science. 18(1), 368- 376 (2020). ISSN: 2502-4752, DOI: 10.11591/ijeecs.v18.i1.pp368-376
Liu, J., Li J., Ma, J., Sadiq, N., Bhatti, U. A., Ai, Y.: A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map. Applied Sciences. 9, 700, 1- 23 (2019). doi:10.3390/app9040700.
M. Gangwar, R. S. Yadav and R. B. Mishra, "Semantic Web Services for medical health planning," 2012 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 2012, pp. 614-618, doi: 10.1109/RAIT.2012.6194599.
Gangwar, M., Mishra, R. B., Yadav, R. S., & Pandey, B. (2013). Intelligent computing methods for the interpretation of neuropsychiatric diseases based on Rbr-Cbr-Ann integration. International Journal of Computers & Technology, 11(5), 2490-2511.
Gangwar, M., Singh, A. P., Ojha, B. K., Shukla, H. K., Srivastava, R., & Goyal, N. (2020). Intelligent Computing Model For Psychiatric Disorder. Journal of Critical Reviews, 7(7), 600-603.
Patil, R. S., Arjariya, T., & Gangwar, M. (2023). Detection of Cardiac Abnormalities and Heart Disease Using Machine Learning Techniques. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 598-605.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.