Authentication of grayscale document images using shamir secret sharing scheme.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.

Authors and Affiliations

Mrs. G. Niranjana , Ms. K. Siva Shalini

Keywords

Related Articles

A Multi-Agent System to Support ICT based Distance Learningthrough Modeling of Learner Needs: The Caseof Bachelor of Education at the University of Nairobi

Abstract:In distant learning environments, most learners need feedback from their lecturers and administration. The feedback supports them to achieve their learning objectives. However, the feedback that the most distant...

An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-transmission

Abstract: With the next-generation cellular networks making a transition toward smaller cells, two-hop orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory component in t...

 Human Being Character Analysis from Their Social Networking Profiles

In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...

 A Fast & Memory Efficient Technique for Mining Frequent Item Sets from a Data Set

 Abstract: Frequent/Periodic item set mining is a extensively used data mining method for market based analysis,privacy preserving and it is also a heart favourite theme for the resarchers. A substantial work has be...

 A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing

 Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime...

Download PDF file
  • EP ID EP110524
  • DOI 10.9790/0661-16277579
  • Views 126
  • Downloads 0

How To Cite

Mrs. G. Niranjana, Ms. K. Siva Shalini (2014).  Authentication of grayscale document images using shamir secret sharing scheme.. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 75-79. https://europub.co.uk/articles/-A-110524