Digital Secure Signature Using Image Edge Energy

Abstract

Digital signature is very important to support electronic business. Hundreds of procedures were proposed regarding digital signatures. One of the most successful procedures is to use digital images to carry secret signature. In this work, a novel digital signature procedure is submitted. It depends on choosing the image color layer with the maximum edge energy to host the digital signature. The results of the experiments prove the success of this procedure and the superiority of it in comparison with several older procedures.

Country : Jordan

1 Abdallah Altahan Alnuaimi

  1. Faculty of Information Technology, Isra University, Jordan

IRJIET, Volume 6, Issue 5, May 2022 pp. 29-33

doi.org/10.47001/IRJIET/2022.605003

References

  1. M. Kutter, F. Jordan, and F. Bossen, “Digital signature of color images using amplitude modulation,” Storage and Retrieval for Image and Video SPIE 3022, vol. 518, pp. 518-526, January 1997.
  2. S. Burgett, E. Koch, and J. Zhao, “A novel method for copyright labeling digitized image data”, IEEE Transactions on Communications, September 2004.
  3. W.Bender,D. Gruhl, and N. Mormoto, “Techniques for data hiding,” in SPIE, vol. 2420, February 1995.
  4. I.Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” Technical Report 95-10, NEC Research Institute, 1995.
  5. K. Matsui, and K. Tanaka, “Video-steganography: how to secretly embed a signature in a picture,” Journal of the Interactive Multimedia Association Intellectual Property Project, 1(1): 187-206, January 1994.
  6. R. Van Schyndel, A. Torkel, and C. Osborne. “A digital watermark,” in IEEE International Conference on Image Processing, vol. 2, 86-90, 1994.
  7. J. Hernandez, M. Amado, and F. Perez-gonzalez, “DCT-domain watermarking techniques for still images, detector, performance analysis and a new structure”, IEEE Transactions on Image Processing, vol. 9, 55-68, 2000.
  8. X. Xia, C. Bancelet, and G. Arce, “Multi-resolution watermarking based on wavelet transform for digital images”. Proc. International Conference on Image Processing, vol. 3, 26-29, 1997.
  9. A.Al-Tahan Al-Nu’aimi, “Digital secure signature using digital colored images as a communication carrier”, International Journal of Information Technology and Web Engineering, Dubai, 2015.
  10. A.Latif, A. Nachsh-nilchi, “Digital image watermarking based on parameters amelioration of parametric Slant-Hadamard transform using genetic algorithm”, International Journal of Innovative Computing, Information and Control, vol. 8 (2), 1205-1220, 2012.
  11. A.Mohammad, A. Alhaj, S. Shaltaf, “An improved SVD-based watermarking scheme for protecting rightful ownership”, signal processing, Elsevier, vol. 88, 2158-2180, 2008.
  12. C. Lu, and H. Liao, “Multipurpose watermarking for image authentication and protection”. (IEEE) Transaction on Image Processing, vol. 10, 1579-1592, 2001.
  13. C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, and M. Miller, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
  14. W. Zeng,and B. Lio, “A statistical watermark detection technique without using original images for resolving rightful ownership of digital images”, Transaction on Image Processing, IEEE, vol. 8. 1534-1548. 1999.
  15. M. Celik, G. Sharma, E. Saber, and A. Teklap, “Hierarchical watermarking for secure image authentication with localization”, IEEE Transaction on Image Processing, vol. 11, no. 6, 585-595. 2004.
  16. A.Al-tahan Al-nu’aimi, and R. Qahwaji, “An adaptive watermarking technique for digital colored images”, IEEE 2nd International Conference on Information & Communications Technologies: From Theory to Applications, vol. 1, 729-732, 2006.
  17. A.Al-tahan Al-nu’aimi, R. Qahwaji, “Digital colored images watermarking using YIQ color format in discrete transform domain”, The Fourth Saudi Technical Conference and Exhibition, 383-388. Riyadh. 2006.