A REVIEW PAPER ON IMAGE AUTHENTICATION SCHEME

Abstract

Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics (PNG) format. This stego image is transmitted over the network. The authentication process is applied on the stego image on the receiver side. In the authentication process the data extracted from this stego image is compared with the data computed from the binary version of the stego image. If the data is matched the image is considered to be authentic. Else the tampered blocks are marked and the image is self-repaired using inverse secret sharing scheme.but in other methods they cannot resist the selfsubstitution attack, the same-position-substitution attack, or the cut- off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. We proposed security enhanced authentication scheme. Our proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above.

Authors and Affiliations

ANUSHRI SHINDE, PRITAL SALUNKHE, PRAJAKTA MANE AND ARJUN NICHAL

Keywords

Related Articles

DESIGN OF SLAB OF RESIDENTIAL BUILDING FOR WIND LOADING G+10 STOREYS

Wind loads are randomly applied dynamic loads. The intensity of the wind pressure on the surface of a structure depends on wind velocity, air density, orientation of the structure, area of contact surface, and shape of...

ENERGY EFFICIENT DIRECTION BASED ROUTING PROTOCOL FOR WSN

Energy consumption is one of the limitations in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, net...

SEASONAL AND PERIODIC AUTOREGRESSIVE TIME SERIES MODELS USED FOR FORECASTING ANALYSIS OF RAINFALL DATA

The amount of rainfall received over an area is an important factor in assessing availability of water to meet various demands for agriculture, industry, irrigation, generation of hydroelectricity and other human activ...

BLUETOOTH BASED OFFICE AUTOMATION AND SECURITY SYSTEM USING RASPBERRY PI AND ANDROID APPLICATION

An office receptionist is an employee who provides administrative support in the office. The position even though is of much importance, it hinders the use of man power for a much higher productive and useful purpose i...

CRITICAL MANUFACTURING PROCESS IN TYRE MANUFACTURING INDUSTRY: A CASE STUDY OF THE INDIAN SSES

Indian tyre industry is adopting new technologies for improving its products to sustain in the global competition. The main focus is to develop efficient and durable tyres at affordable price by finding the most critic...

Download PDF file
  • EP ID EP46240
  • DOI 10.34218/IJARET.10.1.2019.002
  • Views 278
  • Downloads 0

How To Cite

ANUSHRI SHINDE, PRITAL SALUNKHE, PRAJAKTA MANE AND ARJUN NICHAL (2019). A REVIEW PAPER ON IMAGE AUTHENTICATION SCHEME. International Journal of Advanced Research in Engineering and Technology, 10(1), -. https://europub.co.uk/articles/-A-46240