CRYPTOGRAPHIC METHOD FOR DIGITAL DOCUMENT
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
Due to the recent development of computers and computer networks, huge amount of digital data can easily be transmitted or stored. However, transmitted data in networks or stored data in computers may easily substitute by enemies Therefore; security is one of the most important technologies in computerized society. Hence, an authentication method based on secret sharing scheme via PNG image and bin mapping is proposed to authenticate the digital document images. In these proposed method, an authentication data is created for each block of document image which is transformed into several secret shares using Shamir’s secret sharing scheme and then embedded into the alpha channel plane. Then the alpha channel plane is combined with the original cover image to form a PNG image. In verifying the integrity of the image the authentication signals are computed from the current block which is then compared with the extracted shares from the alpha channel plane for the respective block. If the authentication data are not match then that block is marked as tampered block and repaired by reverse secret sharing scheme.
Authors and Affiliations
V. ARUNA
Techniques of Software Fault Tolerance
Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. We should accept that, relying on software techniques for obtaining dependability means accepting some...
Secondary Structure Prediction Using ANN Learning
This paper presents two methods for predicting the secondary structure of proteins based on artificial neural network learning. Two variations of NN learning rule are employed using feedforward backpropogation architectu...
Automated Feedback System for Multimedia in Multiprocessors
In spite of many real times scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in multiprocessors. There are certain “open loop” algorithm...
Handling Highly Frequent Network Updates For K Nearest Neighbor Query On Road Networks
Outsourcing spatial databases to the cloud has provided the spatial query integrity which means that the third party service provider is Untrustworthy, therefore query integrity verifies the correctness and completeness...
AN ANALYSIS OF EXISTING ARTIFICIAL STOCK MARKET MODELS FOR REPRESENTING BOMBAY STOCK EXCHANGE (BSE)
The goal of agent-based modeling of stock markets is to enrich our understanding of fundamental processes that appear in a market. Artificial stock markets are models of financial markets used to study and understand mar...