A REVIEW PAPER ON IMAGE AUTHENTICATION SCHEME
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 1
Abstract
Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics (PNG) format. This stego image is transmitted over the network. The authentication process is applied on the stego image on the receiver side. In the authentication process the data extracted from this stego image is compared with the data computed from the binary version of the stego image. If the data is matched the image is considered to be authentic. Else the tampered blocks are marked and the image is self-repaired using inverse secret sharing scheme.but in other methods they cannot resist the selfsubstitution attack, the same-position-substitution attack, or the cut- off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. We proposed security enhanced authentication scheme. Our proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above.
Authors and Affiliations
ANUSHRI SHINDE, PRITAL SALUNKHE, PRAJAKTA MANE AND ARJUN NICHAL
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allego...
OPTIMIZATION OF HEURISTIC ALGORITHMS FOR IMPROVING BER OF ADAPTIVE TURBO CODES
The third component introduced in the turbo codes improved the code performance by providing very low error rates for a very wide range of block lengths and coding rates. But this increased the complexity and the param...
A STUDY OF DIGITAL INITIATIVE: SCOPE, CHALLENGES AND PERSPECTIVE OF DIGITAL ADAPTABILITY, DIGITAL TRANSPARENCY (AN EXPERIMENTAL STUDY)
Digital may be a campaign launched by the government of India to make sure the Government's services area unit created obtainable to voters electronically by improved on-line infrastructure and by increasing web connec...
AN INTRUSION DETECTION AND AVOIDANCE MECHANISM TO SECURE MANETS
Maximum of research study in securing mobile adhoc networks (MANETs) has motivated on suggestions which detect and inhibit a particular kind of attack such as sleep deprivation, blackhole, greyhole and rushing attacks....
MODELING TIME SERIES FORECASTING USING EVOLUTIONARY TECHNIQUES
In recent years, usage of time series forecasting has been increasing day by day for prediction like, share market, weather forecasting and data analysis. Forecasting of Mackey Glass chaotic time series has been carrie...