• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Server Authentication of Images

پدید آورنده
Onyima, Chika Francisca

موضوع
Computer science,Electrical engineering

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

NATIONAL BIBLIOGRAPHY NUMBER

Number
TLpq2378926391

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Server Authentication of Images
General Material Designation
[Thesis]
First Statement of Responsibility
Onyima, Chika Francisca
Subsequent Statement of Responsibility
Aurangzeb, Muhammad

.PUBLICATION, DISTRIBUTION, ETC

Name of Publisher, Distributor, etc.
Texas A&M University - Kingsville
Date of Publication, Distribution, etc.
2019

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
56

DISSERTATION (THESIS) NOTE

Dissertation or thesis details and type of degree
M.S.
Body granting the degree
Texas A&M University - Kingsville
Text preceding or following the note
2019

SUMMARY OR ABSTRACT

Text of Note
There has been tremendous advancement in multimedia in recent time. There are cameras everywhere around us, and the Internet is overwhelmed with all sorts of images. Mostly there are certain claims about the location and contents associated with images. Whenever an image shows up with associated claims on a media platform, there is always a question about the reliability of these claims associated with the image. There are numerous techniques to address these questions about the reliability of these claims. These include localization, signature usage, hide in an image or watermark images in order to prevent, reduce and detect any form of manipulation or modification. These techniques offer a limited level of reliability these images and associated claims, since the images can still be altered. Even a novice can make use of a sophisticated online tool and remove a watermark; a well scripted code can extract and replace a hidden image as well as alter the metadata of the original image. Thus, there is a need for an image authentication framework that can accurately detect any form of tampering or modification in an image. This research presents a framework to authenticate the image and the claim associated with it. The framework is based on server-client model. The server has the repository of all the authenticated images and associated claims, while the client consists of a web browser plugin. Once an image which is originated from the server is shared over the Internet reaches an Internet surfer, the surfer may want to verify the associated claim of the image. This is where the plugin kicks in. The plugin establishes a connection with the server and communicates the identity of the image already embedded into the image through some steganography technique. The front-end plugin and the server communicate further to authenticate the image and related claim. Primarily the server asks the client to send a random transversal profile of the image. Upon getting the response from the plugin the server takes the correlation of the profile and gets a correlation of the correlation of the same profile of the image from its repository. Once there is a correlation the image is verified, and the associated claims are sent to the plugin which displays the claims to the surfer. The significance of using the correlation is that the correlation depicts the harmonic variations in the image which are greatly preserved even when the resolution of the image has changed. The technique is even effective if the image is cropped. Moreover, the framework is immune to known attacks on the existing authentication techniques.

TOPICAL NAME USED AS SUBJECT

Computer science
Electrical engineering

PERSONAL NAME - PRIMARY RESPONSIBILITY

Aurangzeb, Muhammad
Onyima, Chika Francisca

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

p

[Thesis]
276903

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival