Authentication of grayscale document images using shamir secret sharing scheme.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.
Authors and Affiliations
Mrs. G. Niranjana , Ms. K. Siva Shalini
A survey on context aware system & intelligent Middleware’s
Context aware system or Sentient system is the most profound concept in the ubiquitous computing. In the cloud system or in distributed computing building a context aware system is difficult task and programmer...
Moment Features Weighting for Image Retrieval
Abstract: Feature selection is an effective tool to improve the performance of content based image retrieval systems. This paper presents an effective moment weighting method according to image reconstruction and retriev...
A Parameter free Clustering of Density Based Algortihm
Clustering is a kind of unsupervised learning process in data mining and pattern recognition, most of the clustering algorithms are sensitive to their input parameters. So it is necessary to evaluate results of the clust...
Performance Evaluation of a Distributed System Based UponFault Tree Analysis
Abstract: Distributed Systems is the study of geographically distant processors, connected to one anotherthrough intermediate devices such as routers and/or switches. Simulation provides an insight into the behavio...
Digital Image Forgery Detection by Contrast Enhancement
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...