Authentication of grayscale document images using shamir secret sharing scheme.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.
Authors and Affiliations
Mrs. G. Niranjana , Ms. K. Siva Shalini
Feature Based Semantic Polarity Analysis Through Ontology
Abstract: Opinion mining, a trending research area where customers feels that opinions of others are alwaysimportant for making decisions while purchasing the products. Here the problem is to collect those opinions...
Detecting and tracking the hand to create an augmented reality system
To facilitate the access to computer systems, computer scientists choose to design interactive mechanisms which are more adapted than traditionally used devices such as keyboard or mouse. The use of gestures mo...
Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security
Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...
Malwise-Malware Classification and Variant Extraction
Malware, short for malicious software, means a variety of forms of intrusive, hostile or annoying program code or software. Malware is a pervasive problem in distributed computer and network systems. Malwar...
Automatic Text Extraction System for Complex Images
Abstract : The Intelligent text extraction system automatically identifies and extracts the text present in different types of images. The growth of digital world Detection and Extraction of text regions in an image are...