Abstract of Authentication of Colored Document Image with Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

In this paper we proposed a new authentication method based on secret sharing technique with data repair capability for colored document image with use of Portable Network Graphics (PNG) image. An authentication signal is generated for each block of colored document image. This block is transformed into several shares using the Shamir secret sharing scheme. Many shares are generated and embedded into alpha channel plane. The alpha channel plane is combined with the original colored image to form PNG image. This PNG image is encrypted by using the chaotic logistic map and forms the stego image. Stego image is received in receiver side and checks for the authentication. If the authentication is fails, then use the reverse shamir secret algorithm. This algorithm having the data repair capability.

Keywords: Image authentication, Secret sharing, Data repair, PNG, Encryption, Logistic map

Edition: Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Share this Article

How to Cite this Article?

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav, "Authentication of Colored Document Image with Data Repair Capability", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14807, Volume 3 Issue 12, December 2014, 1689 - 1691

Enter Your Email Address


Similar Articles with Keyword 'Image authentication'

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2228 - 2235

SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication

Derroll David, Divya B, Pournami

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1271 - 1274

Digital Image Forgery Detection with Motion Blur as Cue: A Survey

Pornima M. Birajdar, N.G. Dharashive

Share this Article

Similar Articles with Keyword 'Secret sharing'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Similar Articles with Keyword 'Data repair'

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1805 - 1807

A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System

Pranjali A. Pali, N. D. Kale

Share this Article

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this Article

Similar Articles with Keyword 'PNG'

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 198 - 201

Comparison of PNG & JPEG Format for LSB Steganography

Bharat Sinha

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Logistic map'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Similar Articles with Keyword 'Image'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Secret'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'sharing'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 510 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'repair'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article
Top