Subscribe Now Subscribe Today
Research Article
 

Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database System



Min-Shiang Hwang and Wel-Pang Yangz
 
ABSTRACT

It is important to protect digital pictures and detect tampered image locations in digital Cyberspace. In this study, we propose an image authentication scheme based on digital signature. The proposed scheme is capable of detecting if certain blocks of an image have been altered. The block can be as small as 86 image pixels.

Services
Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

 
  How to cite this article:

Min-Shiang Hwang and Wel-Pang Yangz , 2002. Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database System . Journal of Applied Sciences, 2: 553-557.

DOI: 10.3923/jas.2002.553.557

URL: https://scialert.net/abstract/?doi=jas.2002.553.557

REFERENCES
Atkins, D., M. Graff, A.K. Lenstra and P.C. Leyland, 1994. The magic words are squeamish ossifrage. Adv. Cryptol. Asiacrypt, 94: 263-277.

Chan, C.C. and M.S. Hwang, 1996. Parallel computation of the generating keys for RSA cryptosystems. IEE Elect. Lett., 32: 1365-1366.
Direct Link  |  

Chang, C.C., K.F. Hwang and M.S. Hwang, 2000. A digital watermarking scheme using human visual effects. Imformatica, 24: 505-511.
Direct Link  |  

Chang, C.C., M.S. Hwang and T.S. Chen, 2001. A new encryption algorithm for image cryptosystems. J. Syst. Software, 58: 83-91.
Direct Link  |  

Chen, T.S., C.C. Chang and M.S. Hwang, 1998. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 7: 1485-1488.
CrossRef  |  Direct Link  |  

Friedman, G.L., 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Consumer Elect., 39: 905-910.
CrossRef  |  Direct Link  |  

Hwang, M.S., C.C. Chang and K.F. Hwang, 1999. A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Elect., 45: 286-294.
CrossRef  |  Direct Link  |  

Hwang, M.S., C.C. Chang and K.F. Hwang, 2000. Digital watermarking of images using neural networks. J. Elect. Imaging, 9: 548-555.
CrossRef  |  Direct Link  |  

Rivest, R.L., 1992. The MD5 Message Digest Algorithm. Rashtriya Chemicals and Fertilizers Ltd., USA.

Rivest, R.L., A. Shamir and L. Adleman, 1978. A methods for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21: 120-126.
Direct Link  |  

Schneier, B., 1996. Applied Crytography. John Willey and Sons, New York.

Wu, M. and B. Liu, 1998. Watermarking for image authentication. Proc. IEEE Int. Conf. Image Process., 1: 455-459.

©  2019 Science Alert. All Rights Reserved