Authentication of Grayscale Images and Data Repairing Using Secret Sharing Method

نویسنده

  • Pradnya Kadam
چکیده

Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. Therefore in this paper a new efficient authentication method is proposed for grayscale document images using the Portable Network Graphics (PNG) image with data repair capability. In this concept an authentication signal is generated by each block of a grayscale document image and then, using Shamir secret sharing scheme, authentication signal and binarized block content is combined and transformed into number of shares and then combined into an alpha channel plane forming the PNG image. This layer together forms a stego image. This stego image is sent to the receiver for authentication. If the grayscale image is tampered at the receiving end we can then make use of reverse Shamir's secret method and repair the tampered image. Keywords—data repair, grayscale document image, Portable Network Graphics (PNG) image, secret sharing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing

A new authentication method based on the secret sharing technique along with a data repairing capability for gray scale document images via the use of PNG (portable network graphics) is proposed. An authentication signal is generated for every and each block of a gray-scale document image, which, in conjunction with the binarized block content, is remodeled into many shares exploitation the Sha...

متن کامل

An Authentication and Recovery method for color Images

With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharin...

متن کامل

Authentication of Grayscale Document Images by using PNG Image with a Data Repair Capability

Digital image is a form for preserving vital information. However, with available digital technologies, one can easily make the visually undetectable modifications to the contents of digital images. Hence ensuring the robustness of a digital image is thus a challenge. This paper proposes an approach for secret sharing of information Shamir scheme is used while sharing a document image and at th...

متن کامل

Ideal Contrast Secret Sharing Scheme through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n)-VCS

Visual Cryptography Scheme (VCS) is an encryption method that works on human visual system. It encrypts a secret image into n shares and decryption can be done only by stacking k or more share images without any computation. A new secret sharing scheme with meaningful shares using (k,n)-threshold visual cryptography and digital watermarking for grayscale images based on bit plane encoding is pr...

متن کامل

Visual Secret Sharing Scheme using Grayscale Images

Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for black and white (binary) secret images. This paper presents a probabilistic (2, 3)-VSS scheme for gray scale images. Its pixel expansion is larger in size but the quality of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015