International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 3, Issue - 10, June 2013
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Data Authentication Using Cryptography

Sagar Chouksey, Rashi Agrawal, Dushyant Verma,Tarun Metta

Abstract

We present a novel approach using cryptography for data authentication. The key idea is to provide a encoded quantized data projection as authentication data. This can be correctly decoded with the help of an authentic data using as side information. Cryptography source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. Additional adjustments might not change the meaning of the content, but could be misclassified as tampering. Users might also be interested in localizing tampered regions. Distinguishing legitimate encodings with possible adjustments from tampering and localizing tampering are the challenges addressed in this paper. We apply cryptography source coding and statistical methods to solve the data authentication problem. Experimental results have been presented for data authentication.

Keyword

Image Authentication, Encryption, Decryption, Cryptography.

Cite this article

Refference