Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

Image Authentication Using Digital Certificate

In the modern world, art is the creative world?s response to the perspective of new lives and ideas. In today?s digital world art is not only circumscribed to something created using paints and canvas, instead everything from clicking the scenery from a mountain?s top or to capture the shimmering ci

Project Title

Image Authentication Using Digital Certificate

Project Area of Specialization

Cyber Security

Project Summary

In the modern world, art is the creative world’s response to the perspective of new lives and ideas. In today’s digital world art is not only circumscribed to something created using paints and canvas, instead everything from clicking the scenery from a mountain’s top or to capture the shimmering cities under the twilight to going beyond the stars ,is considered as art! And so, with emerging technologies in hand, art is advanced and created as Digital images. Although it has now been made easy for people to benefit from this digitized art and to get many creative ideas without the need for going to art galleries, but its also very crucial to provide security for these digital assets.  
As we all know, pictures are copied and distributed illegally countless times each day. These pictures are stolen from their creators who are put at a great financial disadvantage because of their property being used without copyright permission or proper license and credit. 
So that is why there needs to be in place a fair platform for publishers, photographers and image agencies which should be able to authenticate the intellectual property on the internet.
Such a platform will be able to distinguish between an original image and its perfect copy using encryption algorithms and will authenticate the copyright using a digital certificate. This will work by comparing the image that is uploaded, to the the images present in the systems database. And if the uploaded image matches any image from the database the system will not authenticate the image. And if the image does not match any image it will authenticate the image using digital certificate and add the image to the database.
This technology will lessen, if not mitigate, the theft of online intellectual property.

Project Objectives

The degree of credibility will surely be diminished if altered photos are widely employed in the state media, scientific innovation, and sometimes even forensic evidence, having a negative influence on different parts of society. so our system aims to mitigate the risk of image forgery and to detect any possible changes to the original image.

Project Implementation Method

We picked the Agile implementation technique since it is a widely utilised project management methodology that emphasises rapid and continuous improvement. Agile methodology's usage of sprints makes it easier for us to follow. Sprints' flexibility allows for last-minute alterations, which can lead to a higher-quality product.  

Benefits of the Project

It enables the identification of the multimedia data's author and the determination as to whether an actual multimedia data's content has been altered in any way after its recording. the system is able to preserve confidentiality, integrity and and authentication of an image.

Technical Details of Final Deliverable

encryption techniques have been presented in order to make familiar with the image which has been transferred over the network. Perceptual hashing is used to hash the digital image. AES is used to encrypt the hash of the original image. The image is saved with a MAC on the server’s database. This method reduces the likelihood of a meticulous invader attack. Encryption protects data in transit, whereas hashing ensures that a file or piece of data hasn't been tampered with.

Perceptual image hashing is an algorithm that can very accurately identify copies of similar images and their legitimately modified versions, their effectiveness in detecting content-changing manipulations has not been thoroughly investigated [3]. It generate perceptual features of image to generate their hashes. The primary goal is to generate hashes that remain unchanged or only slightly change when content-preserving changes are made to the image. There are three steps in perceptual hashing which are image pre-processing, perceptual feature extraction, and quantization to generate the final string.

Final Deliverable of the Project

Software System

Core Industry

IT

Other Industries

Core Technology

Others

Other Technologies

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Printing and Stationary Miscellaneous 100033000
image processing tool Equipment180008000
matlab license Equipment16000060000
Total in (Rs) 71000
If you need this project, please contact me on contact@adikhanofficial.com
IOT based Smart Wearable labour kit

Our project title is Smart Wearable Kit.Our project is based on IOT technology which...

1675638330.png
Adil Khan
9 months ago
Smart Irrigation System

Crops can be watered in many ways either through proper canal channels we can use ground w...

1675638330.png
Adil Khan
9 months ago
Fog Detection and Visibility Distance Estimation System

Project will provide software as well as hardware to vehicle manufacturers and individual...

1675638330.png
Adil Khan
9 months ago
IoT based Smart Drink Dispenser

The IoT-based Smart Drink Dispenser (iSDD) is a system that can be used for dispensing wat...

1675638330.png
Adil Khan
9 months ago
On Road Vehicle Breakdown Help Assistance

This is the project that have been developed for those who face sometimes vehicle breakdow...

1675638330.png
Adil Khan
9 months ago