An Authentication and Recovery method for color Images
نویسندگان
چکیده
With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharing Method. The Proposed Method Is An Authentication And Recovery Technique For Color Images Based On A Shamir Secret Sharing Technique. An Alpha Channel Signal Which Is Used For Authentication Is Generated For Each Block Of A Color Document Image, Which, Together With The Binaries Block Content, Is Transformed Into Several Shares Using The Shamir Secret Sharing Scheme. Care Should Be Taken While Selecting The Parameter So That As Many Shares As Possible Are Generated And Embedded Into An Alpha Channel Plane. The Alpha Channel Plane Is Then Combined With The Original Image To Form A PNG Image. During Process Of Image Authentication, An Image Block Is Marked As Tampered If The Authentication Signal Computed From The Current Block Content Does Not Match That Extracted From The Shares Embedded In The Alpha Channel Plane. Data Repairing Is Then Applied To Each Tampered Block By A Reverse Shamir Scheme After Collecting Two Shares From Unmarked Blocks. By Considering The Lager Database For Images As Well Scan Documents Images With Good Experimental Results Prove The Effectiveness Of The Proposed Method For Real Applications. KeywordsData hiding, data repair, color documents image authentication, Portable Network Graphics (PNG) image, secret sharing
منابع مشابه
Color scene transform between images using Rosenfeld-Kak histogram matching method
In digital color imaging, it is of interest to transform the color scene of an image to the other. Some attempts have been done in this case using, for example, lαβ color space, principal component analysis and recently histogram rescaling method. In this research, a novel method is proposed based on the Resenfeld and Kak histogram matching algorithm. It is suggested that to transform the color...
متن کاملColor Iris Authentication using Color Models
Iris authentication is a popular method where persons are accurately authenticated. During authentication phase the features are extracted which are unique. Iris authentication uses IR images for authentication. This proposed work uses color iris images for authentication. Experiments are performed using ten different color models. This paper is focused on performance evaluation of color models...
متن کاملA Fragile Watermarking Scheme for Color Image Authentication
In this paper, a fragile watermarking scheme is proposed for color image specified object’s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-over...
متن کاملEmbedded Semi-Fragile Signature Based Scheme for Ownership Identification and Color Image Authentication with Recovery
In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Dep...
متن کاملEmbedded Semi - Fragile Signature Based Scheme for Ownership Identification & Color Image Authentication with Recovery
Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014