A REVIEW PAPER ON IMAGE AUTHENTICATION SCHEME
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 1
Abstract
Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics (PNG) format. This stego image is transmitted over the network. The authentication process is applied on the stego image on the receiver side. In the authentication process the data extracted from this stego image is compared with the data computed from the binary version of the stego image. If the data is matched the image is considered to be authentic. Else the tampered blocks are marked and the image is self-repaired using inverse secret sharing scheme.but in other methods they cannot resist the selfsubstitution attack, the same-position-substitution attack, or the cut- off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. We proposed security enhanced authentication scheme. Our proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above.
Authors and Affiliations
ANUSHRI SHINDE, PRITAL SALUNKHE, PRAJAKTA MANE AND ARJUN NICHAL
DESIGN OF SLAB OF RESIDENTIAL BUILDING FOR WIND LOADING G+10 STOREYS
Wind loads are randomly applied dynamic loads. The intensity of the wind pressure on the surface of a structure depends on wind velocity, air density, orientation of the structure, area of contact surface, and shape of...
ENERGY EFFICIENT DIRECTION BASED ROUTING PROTOCOL FOR WSN
Energy consumption is one of the limitations in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, net...
SEASONAL AND PERIODIC AUTOREGRESSIVE TIME SERIES MODELS USED FOR FORECASTING ANALYSIS OF RAINFALL DATA
The amount of rainfall received over an area is an important factor in assessing availability of water to meet various demands for agriculture, industry, irrigation, generation of hydroelectricity and other human activ...
BLUETOOTH BASED OFFICE AUTOMATION AND SECURITY SYSTEM USING RASPBERRY PI AND ANDROID APPLICATION
An office receptionist is an employee who provides administrative support in the office. The position even though is of much importance, it hinders the use of man power for a much higher productive and useful purpose i...
CRITICAL MANUFACTURING PROCESS IN TYRE MANUFACTURING INDUSTRY: A CASE STUDY OF THE INDIAN SSES
Indian tyre industry is adopting new technologies for improving its products to sustain in the global competition. The main focus is to develop efficient and durable tyres at affordable price by finding the most critic...