A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Authentication is basically a way by which sender and recipient must prove their identities to each other. Image authentication verifies the originality of an image by detecting malicious manipulations. Reliable image authentication technology must be able to protect an image from time it was first produced until the final stage of use. In this paper we describe an effective technique for image authentication which can prevent malicious manipulations by using RSA and Baker's map. Chaos refersdoi:10.5120/20835-3399 fatcat:cjwqay2v6rh6jklelddeoedc2e