Image Authentication using RSA and Chaotic Map

Chitra Solanki, Madhu Sharma
2015 International Journal of Computer Applications  
Authentication is basically a way by which sender and recipient must prove their identities to each other. Image authentication verifies the originality of an image by detecting malicious manipulations. Reliable image authentication technology must be able to protect an image from time it was first produced until the final stage of use. In this paper we describe an effective technique for image authentication which can prevent malicious manipulations by using RSA and Baker's map. Chaos refers
more » ... a type of complex dynamical behavior that possesses some special features such as being extremely sensitive to small variations in initial conditions. Moreover this is certificateless-based scheme and allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority to store and manage user's certificates. In 2014, Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang has given a similar designed certificateless-based signature scheme based on RSA operations; however, their scheme is modified and improved by using it on image rather than text [2]. General Terms Chaotic map, RSA, Digital Signature, Random number, MD5. SHA-1.
doi:10.5120/20835-3399 fatcat:cjwqay2v6rh6jklelddeoedc2e