The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Digital Signature Protocol for Visual Authentication Anirban Goswami1, Ritesh Mukherjee2, Soumit Chowdhury3, and Nabin Ghoshal4 1Department of Information Technology, Techno India, India 2Department of Advanced Signal Processing, Centre for Development of Advanced Computing, India 3Department of Computer Science and Engineering, Government College of Engineering and Ceramic

Information security in digital domain is all about assurance of Confidentiality, Integrity, Availability (CIA) extending authenticity and non-repudiation issues. Major concerns towards implementation of information security are computational overhead, implementation complexity and robustness of the protocol. In this paper, we proposed a solution to achieve the target in line with state of the art information security protocol. The computational overhead is significantly reduced without compromising the uncertainty in key pair generation like existing digital signature schemes. The first section deals with collection of digitized signature from an authentic user, generation of shares from the signature, conversion of a cover image to quantized frequency form and casting of a share in appropriate coefficients. In the second section, share detection is done effectively and the data security is confirmed by overlapping the detected share with the other share. Specific constraints are fitted appropriately to recreate a clean digitized signature, reform the cover image using Discrete Cosine Transform (DCT) and quantization method, select frequency coefficients for share casting and manipulate the casting intensity. Impressive effort is made to ensure resistance to some of the common image processing attacks. The undesired white noise is reduced considerably by choosing a suitable threshold value. The selection of pseudorandom hiding position also helps to increase the robustness and the experimental results supports the efficacy of the algorithm.


[1] Barni M., Bartolini F., Cappellini V., and Piva A., “A DCT Domain System For Robust Image Watermarking,” Signal Processing, vol. 66, no. 3, pp. 357-372, 1998.

[2] Barni M., Bartolini F., and Furon T., “A General Framework For Robust Watermarking Security,” Signal Processing, vol. 83, no. 10, pp. 2069- 2084, 2003.

[3] Bender W., Gruhl D., Morimoto N., and Lu A., “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.

[4] Chaturvedi R., Sharma A., Hemrajani N., and Goyal D., “Analysis of Robust Watermarking Technique Using Mid Band DCT Domain for Different Image Formats,” International Journal of Scientific and Research Publications, vol. 2, no. 3, pp. 1-4, 2012.

[5] Cox I., Kilian J., Leighton T., and Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transaction on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.

[6] Diffie W. and Hellman M., “New Directions in Cryptography,” IEEE Transactions in Information Theory, vol. 22, no. 6, pp. 644-654, 1976.

[7] Gao X., An L., Li X., Tao D., Deng C., and Li J., “Robust Reversible Watermarking Via Clustering and Enhanced Pixel-Wise Masking,” IEEE Transactions on Image Processing, vol. 21, no. 8, pp. 3598-3611, 2012.

[8] Hsu C. and Wu J., “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, 1999.

[9] Koch E. and Zhao J., “Towards Robust and Hidden Image Copyright Labelling,” in Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, pp. 452-455, 1995.

[10] Langelaar G., Setyawan I., and Lagendijk R., “Watermarking Digital Image and Video Data,” 718 The International Arab Journal of Information Technology, Vol. 16, No. 4, July 2019 IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000.

[11] Lee I. and Tsai W., “A New Approach to Covert Communication Via PDF Files,” Signal Processing, vol. 90, no. 2, pp. 557-565, 2009.

[12] Lee C. and Tsai W., “A Secret-Sharing-Based Method for Authentication of Grayscale Document Images Via the Use of the PNG Image with A Data Repair Capability,” IEEE Transactions on Image Processing, vol. 21, no. 1, pp. 207-218, 2012.

[13] Lin S., Shie S., and Guo J., “Improving the Robustness of DCT Based Image Watermarking Against JPEG Compression,” Computer Standards and Interfaces, vol. 32, no. 1-2, pp. 54-60, 2010.

[14] Liu T. and Tsai W., “A New Steganographic Method for Data Hiding in Microsoft Word Documents by A Change Tracking Technique,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 24-30, 2007.

[15] Lu C. and Liao H., “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, 2001.

[16] Meerwald P. and Uhl A., “A Survey of Wavelet- Domain Watermarking Algorithm,” in Proceedings of Electronic Imaging, Security and Watermarking of Multimedia Contents III, San Jose, pp. 505-515, 2001.

[17] Nikolaidis N. and Pitas I., “Robust Image Watermarking in the Spatial Domain,” Signal Processing, vol. 66, no. 3, pp. 385-403, 1998.

[18] Ruanaidh J. and Pun T., “Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking,” Signal Process, vol. 66, no. 3, pp. 303-317, 1998.

[19] Saini M., Venkata K., and Kalra G., “Comparative Analysis of Digital Image Watermarking Techniques in Frequency Domain using MATLAB SIMULINK,” International Journal of Engineering Research and Applications, vol. 2, no. 4, pp. 1136-1141, 2012.

[20] Shamir A., “How to Share A Secret,” Communication of the ACM, vol. 22, no. 11, pp. 612-613, 1979.

[21] Solachidis V. and Pitas I., “Circularly Symm- etric Watermark Embedding in 2-D DFT Domain,” IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001.

[22] Suhail Mohamed A. and Obaidat S., “Digital Watermarking-Based DCT and JPEG Model,” IEEE Transactions on Instrumentation and Measurement, vol. 52, no. 5, pp. 1640-1647, 2003.

[23] Tedmori S. and Al-Najdawi N., “Lossless Image Cryptography Algorithm based on Discrete Cosine Transform,” The International Arab Journal of Information Technology, vol. 9, no. 5, pp. 471-477, 2012.

[24] Yu G., Lu C., and Liao H., “Mean Quantization- Based Fragile Water-Marking for Image Authentication,” Optical Engineering, vol. 40, no. 7, pp. 1396-1408, 2001.

[25] Yue T. and Chiag S., “A Neural Network Approach for Visual Cryptography,” IEEE- INNS-ENNS International Joint Conference on Neural Networks, Como, pp. 494-499, 2000. Digital Signature Protocol for Visual Authentication 719 Anirban Goswami is currently working as Asst. Professor and Asst. Registrar in Techno India (An Engineering College under Maulana Abul Kalam Azad University of Technology), Kolkata, West Bengal, India. He has more than 17 years of teaching experience He had contributed in more than 6 graduate level projects, and has 9 international conference and 5 international journal publications. He is currently pursuing his research work on data security in Kalyani University. Ritesh Mukherjee is associated with C-DAC (Centre for Development of Advanced Computing), Kolkata, India as Joint Director. He has 17 years of experience in software solution development in the area of large database, data warehousing, Web technologies, Mobile Computing etc. He had contributed in more than 12 projects, release of 6 solutions and 2 products. He has 4 research papers in various journals and conferences, 3 copyrights, 1 Indian and 1 US patents. Soumit Chowdhury is presently working in the position of Assistant Professor of the dept. of Computer Science & Engineering, Govt. College of Engineering & Ceramic Technology, Kolkata, India. He has more than 12 years of teaching experience in different engineering colleges and has published 12 research papers in different National, International Journals and Conferences. He has also successfully supervised one UGC funded research project as a Principal Investigator and his current research area includes Steganography/ Watermarking, Cryptography and Coding theory. Nabin Ghoshal is attached with the Department of Engineering and Techn-ological Studies, University of Kalyani, West Bengal, India. He received his Ph.D. degree in Computer Science and Engineering from University of Kalyani in 2011. Dr. Ghoshal has 50 research papers in various international journals, national and international conferences. He is the author of the book titled ‘‘Steganographic Techniques and Application in Document Authentication: An Algorithmic Approach’’.