Downloads: 137 | Views: 267
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013 | Popularity: 6.9 / 10
Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing
P. Sujitha, G. Murali
Abstract: A new authentication method based on the secret sharing technique along with a data repairing capability for gray scale document images via the use of PNG (portable network graphics) is proposed. An authentication signal is generated for every and each block of a gray-scale document image, which, in conjunction with the binarized block content, is remodeled into many shares exploitation the Shamir secret sharing theme. The concerned parameters are cautiously chosen in order that as several shares as potential are generated and embedded into an alpha channel plane. To form a PNG image the alpha channel plane is combined with the original gray scale image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. While the method of image authentication, an image block is spotted as tampered, if the authentication signal computed from the present block content doesn't match with the worth or value extracted from the shares embedded inside the alpha channel plane. For each tampered block, data repairing is applied by using reverse Shamir scheme after collecting two shares from unmarked blocks. Some security measures for protecting the security of the data hidden in the alpha channel are also proposed. For real time applications, good experimental results prove the effectiveness of the proposed method.
Keywords: Data repair, secret sharing, grayscale document image, Portable Network Graphics PNG image
Edition: Volume 2 Issue 11, November 2013
Pages: 173 - 176
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 104
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2433 - 2435Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image
Priya K. Rahangdale, A. N. Jaiswal
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra