Authentication of grayscale document images using shamir secret sharing scheme.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.
Authors and Affiliations
Mrs. G. Niranjana , Ms. K. Siva Shalini
A Multi-Agent System to Support ICT based Distance Learningthrough Modeling of Learner Needs: The Caseof Bachelor of Education at the University of Nairobi
Abstract:In distant learning environments, most learners need feedback from their lecturers and administration. The feedback supports them to achieve their learning objectives. However, the feedback that the most distant...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-transmission
Abstract: With the next-generation cellular networks making a transition toward smaller cells, two-hop orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory component in t...
Human Being Character Analysis from Their Social Networking Profiles
In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...
A Fast & Memory Efficient Technique for Mining Frequent Item Sets from a Data Set
Abstract: Frequent/Periodic item set mining is a extensively used data mining method for market based analysis,privacy preserving and it is also a heart favourite theme for the resarchers. A substantial work has be...
A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime...