Security

Information Security and Sender's Rights Protection Through Embedded Public Key Signature

Download Now Free registration required

Executive Summary

Information security is not just to provide an authenticity and integrity to the data, but there is also a need to seek identity, rights of use and origin of information, which may require some degree of process re-engineering. Rarely security technologies like digital signatures can be simply "Plugged in" without streamlining the process. In this paper the authors address the problem of information security and protecting the rights of originator of the structured document from ill-intentioned recipient who can modify the received decrypted information. At sender end, a public key signature is generated using SHA-1 or SHA-2. Signature is embedded into raster image of the document using non-invertible robust public key watermarking technique based on orthogonal signals concepts.

  • Format: PDF
  • Size: 180.81 KB