Authentication of grayscale document images using shamir secret sharing scheme.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.

Authors and Affiliations

Mrs. G. Niranjana , Ms. K. Siva Shalini

Keywords

Related Articles

 A survey on context aware system & intelligent Middleware’s

 Context aware system or Sentient system is the most profound concept in the ubiquitous computing. In the cloud system or in distributed computing building a context aware system is difficult task and programmer...

Moment Features Weighting for Image Retrieval

Abstract: Feature selection is an effective tool to improve the performance of content based image retrieval systems. This paper presents an effective moment weighting method according to image reconstruction and retriev...

A Parameter free Clustering of Density Based Algortihm

Clustering is a kind of unsupervised learning process in data mining and pattern recognition, most of the clustering algorithms are sensitive to their input parameters. So it is necessary to evaluate results of the clust...

 Performance Evaluation of a Distributed System Based UponFault Tree Analysis

 Abstract: Distributed Systems is the study of geographically distant processors, connected to one anotherthrough intermediate devices such as routers and/or switches. Simulation provides an insight into the behavio...

 Digital Image Forgery Detection by Contrast Enhancement

 Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...

Download PDF file
  • EP ID EP110524
  • DOI 10.9790/0661-16277579
  • Views 107
  • Downloads 0

How To Cite

Mrs. G. Niranjana, Ms. K. Siva Shalini (2014).  Authentication of grayscale document images using shamir secret sharing scheme.. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 75-79. https://europub.co.uk./articles/-A-110524