Secure Message Authentication
Jyoti R. Rajput1, Kalyankar Pravin P.2
1Jyoti R Rajput, Department Computer Science and Engineering, BAMU, COE Osmanabad, Country India.
2Kalyankar Pravin P., Department Computer Science and Engineering, BAMU, COE Osmanabad, Country India.
Manuscript received on November 22, 2012. | Revised Manuscript received on December 03, 2012. | Manuscript published on December 30, 2012. | PP: 235-238 | Volume-2, Issue-2, December 2012.  | Retrieval Number: B0918112212 /2012©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Digital watermarks have recently been proposed for authentication of both video data and still images and for integrity verification of visual multimedia. In such applications, the watermark has to depend on the original image. It is important that the dependence on the key be sensitive, while the dependence on the image be continuous (robust). The proposed system basically uses authentication and encryption mechanism that are two intertwined technologies that help to insure that your data remains secure. Authentication is the process of insuring that both ends of the connection are in fact who they say they are. This applies not only to the entity trying to access a service (such as an end user) but to the entity providing the service, as well (such as a file server or Web site). Encryption helps to insure that the information within a session is not compromised. This includes not only reading the information within a data stream, but altering it, as well. While authentication and encryption each has its own responsibilities in securing a communication session, maximum protection can only be achieved when the two are combined. For this reason, many security protocols contain both authentication and encryption specifications.
Keywords: Encryption, Authentication, DCT cryptographic security, Hash Function.