Academic Journals Database
Disseminating quality controlled scientific knowledge

Data Authentication Using Cryptography

Author(s): Sagar Chouksey | Rashi Agrawal | Dushyant Verma | Tarun Metta

Journal: International Journal of Advanced Computer Research
ISSN 2249-7277

Volume: 3;
Issue: 10;
Start page: 183;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Image Authentication | Encryption | Decryption | Cryptography

We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions