Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014
Gray Scale Image Authentication Using SSS Technique
Vandana Navale, Archana Lomte
This is a blind authentication method for Gray Scale image that is in PNG (Portable Network Graphics) Format. This method is based on SSS (Shamirs Secret Sharing) technique. This technique used to reduce risk of data loss. Authentication is done for Gray Scale Image by generating secrets for each block of gray image. Block content are in binary forms. That shares are embedded in to Alpha channel Plane.Then alpha channel plane is combined with the original Gray scale image to form a PNG image. When image authentication is done image blocks are marked as tampered the shares embedded in the alpha channel plane are match with current image block shares by applying reverse Shamir secret sharing technique repaired tampered block contents.
Keywords: SSS Shamirs Secret Sharing technique, PNG Portable Network Graphics, Data repair, Authentication, Data Hiding
Edition: Volume 3 Issue 5, May 2014
Pages: 1320 - 1325
How to Cite this Article?
Vandana Navale, Archana Lomte, "Gray Scale Image Authentication Using SSS Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132038, Volume 3 Issue 5, May 2014, 1320 - 1325
104 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'Data repair'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1689 - 1691Authentication of Colored Document Image with Data Repair Capability
Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1805 - 1807A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System
Pranjali A. Pali, N. D. Kale
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1320 - 1325Gray Scale Image Authentication Using SSS Technique
Vandana Navale, Archana Lomte
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013
Pages: 173 - 176Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing
P. Sujitha, G. Murali
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
Similar Articles with Keyword 'Data Hiding'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2352 - 2357RS and OFDM Methods Over Encrypted and Data Embedded Video Streams
Jithya J. Prakash, Hemand E. P.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2325 - 2330Secure Text/Image Data Hiding in Images with Efficient Key Management
Anjaly Mohanachandran, Mary Linda P.A.