International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 118

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte


Abstract: This is a blind authentication method for Gray Scale image that is in PNG (Portable Network Graphics) Format. This method is based on SSS (Shamirs Secret Sharing) technique. This technique used to reduce risk of data loss. Authentication is done for Gray Scale Image by generating secrets for each block of gray image. Block content are in binary forms. That shares are embedded in to Alpha channel Plane. Then alpha channel plane is combined with the original Gray scale image to form a PNG image. When image authentication is done image blocks are marked as tampered the shares embedded in the alpha channel plane are match with current image block shares by applying reverse Shamir secret sharing technique repaired tampered block contents.


Keywords: SSS Shamirs Secret Sharing technique, PNG Portable Network Graphics, Data repair, Authentication, Data Hiding


Edition: Volume 3 Issue 5, May 2014,


Pages: 1320 - 1325


How to Cite this Article?

Vandana Navale, Archana Lomte, "Gray Scale Image Authentication Using SSS Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20132038, Volume 3 Issue 5, May 2014, 1320 - 1325

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Data repair'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1805 - 1807

A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System

Pranjali A. Pali, N. D. Kale

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Data Hiding'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Similar Articles with Keyword 'SSS'

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 798 - 802

A Survey on Different Types of Image Formats and Compression Techniques

Vrinda Shivashetty, G.G Rajput

Share this Article

Similar Articles with Keyword 'Shamirs'

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 597 - 601

A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs

G. Anandhi, S. K. Srivatsa

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 382 - 385

Mechanism for Secure Fault Tolerant Data Access in Disruption-Tolerant Networks

Subhashini P, Ashwin Kumar M

Share this Article

Similar Articles with Keyword 'Secret'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Sharing'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Similar Articles with Keyword 'technique'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Similar Articles with Keyword 'PNG'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 198 - 201

Comparison of PNG & JPEG Format for LSB Steganography

Bharat Sinha

Share this Article

Similar Articles with Keyword 'Portable'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 846 - 851

Energy Efficient QRS Detection Method for Portable and Personal Analysis of ECG Signal Obtained from Wearable Wireless ECG Body Sensors

Prineeta Sahni, Khushneet Kaur

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3268 - 3272

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Bhagyashri Thakre, Archana Raut

Share this Article

Similar Articles with Keyword 'Network'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 87 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Graphics'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 627 - 632

LoG Feature Extraction Based Photographic Detection

Sujitha B Cherkottu, Smija Das

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 523 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Similar Articles with Keyword 'repair'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article
Top