Authentication of grayscale document images using shamir secret sharing scheme.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.

Authors and Affiliations

Mrs. G. Niranjana , Ms. K. Siva Shalini

Keywords

Related Articles

FEQRP: a Fuzzy based Energy-efficient and QoS Routing Protocol over WSNs

Abstract: In this paper, an energy efficient and QoS routing protocol; named Fuzzy based Energy-efficient and QoS Routing protocol (FEQRP) for wireless sensor networks; is proposed to extend the life time of the network....

 Intrusion Detection Techniques In Mobile Networks

 The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no  o...

 Automatic Determination Number of Cluster for NMKFC-MeansAlgorithms on Image Segmentation

 Abstract: Image segmentation plays an important role in image analysis. Image segmentation is useful in manyapplications like medical, face recognition, crop disease detection, and geographical object detection in...

 Review of Mobile Ad Hoc Network Protocols

 bstract: Mobile Ad-hoc Network is one of the types of Wireless Ad-Hoc Networks which has distinguishedcharacteristics. It is a self-configuring, decentralized and infrastructure less wireless network where mobileno...

Download PDF file
  • EP ID EP110524
  • DOI 10.9790/0661-16277579
  • Views 116
  • Downloads 0

How To Cite

Mrs. G. Niranjana, Ms. K. Siva Shalini (2014).  Authentication of grayscale document images using shamir secret sharing scheme.. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 75-79. https://europub.co.uk./articles/-A-110524