Authentication of grayscale document images using shamir secret sharing scheme.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in which a secret message is transformed in to shares for keeping by participants, and when some of the shares, not necessarily all of them, are collected, the secret message can be lossless recovered.. This secret sharing scheme is useful for reducing the risk of incidental partial data loss. In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks. For tampered block data repairing is applied by reverse Shamir scheme. It also presents the security issues and discuss on keeping high quality visual effect.

Authors and Affiliations

Mrs. G. Niranjana , Ms. K. Siva Shalini

Keywords

Related Articles

 Optimization Techniques Incorporating Evolutionary Model inWireless Sensor Network: A Survey

Abstract: Wireless Sensor Network has several issues and challenges that are to be taken care while designing the techniques and algorithms to increase the Network lifetime of WSN. Network optimization is a critical comp...

 Use of Data Mining in Various Field: A Survey Paper

 Abstract: Data mining is extracts the knowledge/ information from a large amount of data which stores in multiple heterogeneous data base. Knowledge /information are conveying the message through direct or indirect...

Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors

Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...

 Dimensionality Reduction Evolution and Validation

Abstract: In this paper, proposing visualized and quantitative evaluation methods for validation dimensionalityreduction techniques performance. Four well known techniques for dimensionality reduction evaluated, verifyth...

 Clustering Engine for Desktop Usability

 Although search and information retrieval techniques are already widely used in the Internet, its application inpersonal computers is still incipient. The management of information is relatively difficult when it c...

Download PDF file
  • EP ID EP110524
  • DOI 10.9790/0661-16277579
  • Views 96
  • Downloads 0

How To Cite

Mrs. G. Niranjana, Ms. K. Siva Shalini (2014).  Authentication of grayscale document images using shamir secret sharing scheme.. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 75-79. https://europub.co.uk/articles/-A-110524