scispace - formally typeset
Open Access

Secure Image Authentication of a Grayscale Document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capability

TLDR
A new authentication method which is based on secret sharing technique and logistic map with repairing capability of data, via the use of the Portable Network Graphics image is proposed.
Abstract
 Abstract—In this paper we proposes a new authentication method which is based on secret sharing technique and logistic map with repairing capability of data, via the use of the Portable Network Graphics image. In this approach each block of a grayscale document image generate an authentication signal, which combine with binarized block content, is transformed into several shares using Shamir secret sharing scheme. The shares generated from the binarized block contents are then embedded into an alpha channel plane. The original grayscale image combine with alpha channel plane to form a PNG image; this PNG image encrypted by using chaotic logistic map to form a stego image. Stego image received in the receiver side is decrypt and checks the authentication. If the authentication process fails then repairing is done in each tampered block, after collecting two shares from unmarked block using reverse Shamir scheme. Security of data provided by sharing of data in the alpha channel and encrypting the stego image.

read more

Citations
More filters
Journal Article

Secret Sharing Scheme Based Technique for Authentication of Documents Images

TL;DR: This paper presents a document image authentication scheme based on using secret sharing that can be used to claim ownership of a digital document image.

A harmonic secret sharing and permutation based document image authentication

TL;DR: In this article, a blind authentication method based on harmonic secret sharing technique and permutation with data repair capability and error localization for document image and verification of its owner, with the use of the PNG image.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Moment-preserving thresolding: A new approach

TL;DR: Experimental results show that the new approach to automatic threshold selection using the moment-preserving principle can be employed to threshold a given picture into meaningful gray-level classes.
Journal ArticleDOI

Data hiding in binary image for authentication and annotation

TL;DR: The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents, and presents analysis and discussions on robustness and security issues.
Journal ArticleDOI

Hierarchical watermarking for secure image authentication with localization

TL;DR: In this paper, the authors propose a hierarchical watermarking scheme that divides the image into blocks in a multilevel hierarchy and calculates block signatures in this hierarchy. But the method is vulnerable to VQ counterfeiting attacks.
Journal ArticleDOI

Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier

TL;DR: This letter proposes a novel two-layer blind binary image authentication scheme, in which the first layer is targeted at the overall authentication and the second layer is aimed at identifying the tampering locations.
Related Papers (5)