International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

This is a blind authentication method for Gray Scale image that is in PNG (Portable Network Graphics) Format. This method is based on SSS (Shamirs Secret Sharing) technique. This technique used to reduce risk of data loss. Authentication is done for Gray Scale Image by generating secrets for each block of gray image. Block content are in binary forms. That shares are embedded in to Alpha channel Plane.Then alpha channel plane is combined with the original Gray scale image to form a PNG image. When image authentication is done image blocks are marked as tampered the shares embedded in the alpha channel plane are match with current image block shares by applying reverse Shamir secret sharing technique repaired tampered block contents.

Keywords: SSS Shamirs Secret Sharing technique, PNG Portable Network Graphics, Data repair, Authentication, Data Hiding

Edition: Volume 3 Issue 5, May 2014

Pages: 1320 - 1325


How to Cite this Article?

Vandana Navale, Archana Lomte, "Gray Scale Image Authentication Using SSS Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132038, Volume 3 Issue 5, May 2014, 1320 - 1325

21 PDF Views | 18 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data repair'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1805 - 1807

A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System

Pranjali A. Pali, N. D. Kale

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 173 - 176

Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing

P. Sujitha, G. Murali

Share this article

Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1293 - 1296

Security Measures on Mobile Technology Using Software as a Service (SaaS)

Apoorva P, Akshay S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1373 - 1377

Symbolic Representation of Speech for Text Independent Speaker Recognition

Akshay S, Apoorva P

Share this article

Similar Articles with Keyword 'Data Hiding'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this article

Top