Information Security and Sender’s Rights Protection through Embedded Public Key Signature
نویسنده
چکیده
Information security is not just to provide an authenticity and integrity to the data, but there is also a need to seek identity, rights of use and origin of information, which may require some degree of process re-engineering. Rarely security technologies like digital signatures can be simply “plugged in” without streamlining the process. In this paper we address the problem of information security and protecting the rights of originator of the structured document from ill-intentioned recipient who can modify the received decrypted information. At sender end, a public key signature is generated using SHA-1 or SHA-2. Signature is embedded into raster image of the document using non-invertible robust public key watermarking technique based on orthogonal signals concepts. The document is then encrypted with public key of the receiver using RSA algorithm to achieve confidentiality and authorization. The proposed scheme uses correlation analysis to detect embedded signature to authenticate message. This scheme also uses Gauss-Jordan method to derive the signature from the watermarked image to verify ownership. The study is corroborated with result and application of the proposed technique to prevent forgery and alteration in e-cheque document.
منابع مشابه
Easing PAIN with Digital Signatures
Different forms of encryption techniques are being used to ensure privacy of data transmitted over Internet. Digital signature which uses Public Key Encryption (PKE) ensures privacy of conversation, integrity of data, authenticity of sender and non-repudiation of sender. Several applications on desktops, mobiles and other devices use it to secure data of various applications, services and acces...
متن کاملSecurity needs in embedded systems
The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security require...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملSecure Authentication for Vehicular Ad Hoc Network
Security is an important issue in ad hoc networks, especially fo r security sensitive applicat ions. This paper main ly focus the authentication based on the group signature for providing the security and privacy in vehicular ad hoc networks (VANET). In VANETs, g roup signature is widely used for vehicles to achieve unauthenticated vehicles. A group signature scheme allows members of a group to...
متن کاملGeneration of the Secret Encryption Key Using the Signature of the Embedded System
Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the signature of the embedded system. We explore t...
متن کامل