Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-1                           
Year of Publication : 2013
Authors :Nagababu Manne , K.J.Silva Lorraine.

MLA

Nagababu Manne , K.J.Silva Lorraine."Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image"International Journal of Computer Trends and Technology (IJCTT),V5(1):37-43 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Generally digital images are mostly used to preserve confidential & important information. But the problem is providing authentication and integrity to these digital images is a very challenging task. Therefore using this paper a new efficient authentication method is proposed to provide for grayscale document images using the Portable Network Graphics (PNG) image with data repair capability. In this concept an authentication signal generated by each block of a grayscale document image and then using Shamir secret sharing scheme grayscale document image authentication signal and binarized block content is combined and transformed into several shares. These several binarized block content shares are then combined into an alpha channel plane then the PNG image is built from combining the grayscale image with alpha channel plan. In this process the authentication for image is achieved as follows; if the authentication signal measured from the current block content does not match that extracted from the shares embedded in the alpha channel plane then that image block is tampered. Then using reverse Shamir scheme, two shares from unmarked blocks are collected and then data repairing is applied. Finally simulation results are provided to prove the concept of proposed method.

 

References -

[1] M. U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Processing, vol.11, no.6, pp.585-595, june.2002.
[2] C Yu, X Zhang “Watermark embedding in binary images for authentication”, IEEE Trans. Signal Processing, vol.01, no.07, pp.865-868, September. 2004.
[3] A. Shamir, “How to share a secret,” Commun.ACM, vol.22, no.11, pp.612-613, Nov, 1979.
[4] P.Jhansi Rani, S. DurgaBhavani1Advances in Information Technology RAIT-2012.
[5] Chih-HsuanTzeng and Wen-Hsiang Tsai, “A new approach to authentication of Binary image for multimedia communication with distortion reduction and security enhancement. IEEE communication letters VOL.7.NO.9 2003
[6] H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier,” IEEE Signal Processing Letters, vol. 13.
[7] M. Wu and B. Liu, “Data hiding in binary images for authentication and annotation,” IEEE Trans.on Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
[8] Che- Wei Lee and Wen-Hsiang Tsai “A secret-sharing-based method for authentication of grayscale document images via the use of the png image with data repair capability” IEEE Trans. Image Processing., vol.21, no.1, january.2012.
[9] Niladri B. Puhan, Anthony T. S. Ho “Binary Document Image Watermarking for Secure Authentication Using Perceptual Modeling” IEEE International Symposium on Signal Processing and Information Technology2005.
[10] W.H. Tsai, “Moment-Preserving thresholding: a new approach.” Computer Vision, Graphics, and Image Processing, vol. 29, no.3, pp.377-393, 1985.

Keywords :— Evolving fuzzy systems, fuzzy-rule-based (FRB) classifiers, user modeling.