International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 118 - Number 17 |
Year of Publication: 2015 |
Authors: Chitra Solanki, Madhu Sharma |
10.5120/20835-3399 |
Chitra Solanki, Madhu Sharma . Image Authentication using RSA and Chaotic Map. International Journal of Computer Applications. 118, 17 ( May 2015), 7-12. DOI=10.5120/20835-3399
Authentication is basically a way by which sender and recipient must prove their identities to each other. Image authentication verifies the originality of an image by detecting malicious manipulations. Reliable image authentication technology must be able to protect an image from time it was first produced until the final stage of use. In this paper we describe an effective technique for image authentication which can prevent malicious manipulations by using RSA and Baker's map. Chaos refers to a type of complex dynamical behavior that possesses some special features such as being extremely sensitive to small variations in initial conditions. Moreover this is certificateless-based scheme and allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority to store and manage user's certificates. In 2014, Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang has given a similar designed certificateless-based signature scheme based on RSA operations; however, their scheme is modified and improved by using it on image rather than text [2].