Authentication of Colored Document Image with Data Repair Capability
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

In this paper we proposed a new authentication method based on secret sharing technique with data repair capability for colored document image with use of Portable Network Graphics (PNG) image. An authentication signal is generated for each block of colored document image. This block is transformed into several shares using the Shamir secret sharing scheme. Many shares are generated and embedded into alpha channel plane. The alpha channel plane is combined with the original colored image to form PNG image. This PNG image is encrypted by using the chaotic logistic map and forms the stego image.Stego image is received in receiver side and checks for the authentication. If the authentication is fails, then use the reverse shamir secret algorithm. This algorithm having the data repair capability.

Keywords: Image authentication, Secret sharing, Data repair, PNG, Encryption, Logistic map

Edition: Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Share this Article

How to Cite this Article?

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav, "Authentication of Colored Document Image with Data Repair Capability", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14807, Volume 3 Issue 12, December 2014, 1689 - 1691

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Image authentication'

Downloads: 106 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2228 - 2235

SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication

Derroll David, Divya B, Pournami

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1271 - 1274

Digital Image Forgery Detection with Motion Blur as Cue: A Survey

Pornima M. Birajdar, N.G. Dharashive

Share this Article

Downloads: 108 | Weekly Hits: ⮙6 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1641 - 1646

Discrete Z Transformation based Copyright Protection on Digital Image Using Genetic Algorithm

Prashant C. Harne, Rajesh K. Nigam

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this Article

Similar Articles with Keyword 'Secret sharing'

Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 103 | Weekly Hits: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2433 - 2435

Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image

Priya K. Rahangdale, A. N. Jaiswal

Share this Article

Downloads: 106 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Downloads: 106 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Similar Articles with Keyword 'Data repair'

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 113 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1805 - 1807

A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System

Pranjali A. Pali, N. D. Kale

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this Article

Downloads: 137 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 173 - 176

Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing

P. Sujitha, G. Murali

Share this Article

Similar Articles with Keyword 'PNG'

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this Article

Downloads: 119 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 198 - 201

Comparison of PNG & JPEG Format for LSB Steganography

Bharat Sinha

Share this Article

Downloads: 137 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 173 - 176

Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing

P. Sujitha, G. Murali

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Logistic map'

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 121 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Downloads: 128 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article



Top