Please use this identifier to cite or link to this item:
http://localhost:8080/jspui/handle/123456789/798| Title: | A Novel Cholesky Decomposition-based Scheme for Strict Image Authentication |
| Authors: | Belferdi, Wassila Behloul, Ali Noui, Lemnouar |
| Keywords: | Image authentication robust watermarking Cholesky decomposition |
| Issue Date: | 9-Nov-2016 |
| Publisher: | 2nd international Conference on Pattern Analysis and Intelligent Systems proceeding |
| Abstract: | With the increasing image falsification due to the easy access and use of image manipulation tools, image authentication techniques have seen considerable interest in protecting multimedia documents integrity and authenticity, it has been demonstrated to be a very powerful solution for ensuring the security of multimedia documents. The aim of this paper is to present a Cholesky decomposition based scheme for strict image authentication. To ensure the requirement of strict authentication where no changes are tolerated to the host image, the Cholesky decomposition properties are used beside the use of cryptographic hash function and public key cryptosystem. For the purpose of reducing the authentication data size, the diagonal of the Cholesky decomposition matrix is used instead of using the entire matrix. The experimental results demonstrate that our technique is able to identify image tampering despite the minor modifications. In addition, the proposed scheme demonstrates its effectiveness in sensitive information systems. We review an application example in medical information security to ensure both integrity and authenticity. Our scheme can find a niche role in healthcare systems as an instrument for secure sharing and control of medical images. |
| URI: | http://dspace.cu-barika.dz/jspui/handle/123456789/798 |
| Appears in Collections: | Department of Informatics - قسم اﻹعلام اﻵلي |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Wassila Belferdi-article2.pdf | A Novel Cholesky Decomposition-based Scheme for Strict Image Authentication | 214.37 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.