Research Article | Open Access | Download PDF
Volume 5 | Number 1 | Year 2013 | Article Id. IJCTT-V5N1P108 | DOI : https://doi.org/10.14445/22312803/IJCTT-V5N1P108
Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image
Nagababu Manne , K.J.Silva Lorraine
Citation :
Nagababu Manne , K.J.Silva Lorraine, "Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image," International Journal of Computer Trends and Technology (IJCTT), vol. 5, no. 1, pp. 37-43, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V5N1P108
Abstract
Generally digital images are mostly used to preserve confidential & important information. But the problem is providing authentication and integrity to these digital images is a very challenging task. Therefore using this paper a new efficient authentication method is proposed to provide for grayscale document images using the Portable Network Graphics (PNG) image with data repair capability. In this concept an authentication signal generated by each block of a grayscale document image and then using Shamir secret sharing scheme grayscale document image authentication signal and binarized block content is combined and transformed into several shares. These several binarized block content shares are then combined into an alpha channel plane then the PNG image is built from combining the grayscale image with alpha channel plan. In this process the authentication for image is achieved as follows; if the authentication signal measured from the current block content does not match that extracted from the shares embedded in the alpha channel plane then that image block is tampered. Then using reverse Shamir scheme, two shares from unmarked blocks are collected and then data repairing is applied. Finally simulation results are provided to prove the concept of proposed method.
Keywords
Evolving fuzzy systems, fuzzy-rule-based (FRB) classifiers, user modeling.
References
[1] M. U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Processing, vol.11, no.6, pp.585-595, june.2002.
[2] C Yu, X Zhang “Watermark embedding in binary images for authentication”, IEEE Trans. Signal Processing, vol.01, no.07, pp.865-868, September. 2004.
[3] A. Shamir, “How to share a secret,” Commun.ACM, vol.22, no.11, pp.612-613, Nov, 1979.
[4] P.Jhansi Rani, S. DurgaBhavani1𝑠𝑡Int’1Conf on Recent Advances in Information Technology RAIT-2012.
[5] Chih-HsuanTzeng and Wen-Hsiang Tsai, “A new approach to authentication of Binary image for multimedia communication with distortion reduction and security enhancement. IEEE communication letters VOL.7.NO.9 2003
[6] H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier,” IEEE Signal Processing Letters, vol. 13.
[7] M. Wu and B. Liu, “Data hiding in binary images for authentication and annotation,” IEEE Trans.on Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
[8] Che- Wei Lee and Wen-Hsiang Tsai “A secret-sharingbased method for authentication of grayscale document images via the use of the png image with data repair capability” IEEE Trans. Image Processing., vol.21, no.1, january.2012. [9] Niladri B. Puhan, Anthony T. S. Ho “Binary Document Image Watermarking for Secure Authentication Using Perceptual Modeling” IEEE International Symposium on Signal Processing and Information Technology2005.
[10] W.H. Tsai, “Moment-Preserving thresholding: a new approach.” Computer Vision, Graphics, and Image Processing, vol. 29, no.3, pp.377-393, 1985.