SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 266
GREYSCALE IMAGE AUTHENTICATION AND REPAIRING
Jyoti Rao1
, Sarika Jankar2
1, 2
Department of Computer Engineering DYPIET, Pune University
jyoti.aswale@gmail.com, sarikajaankar@gmail.com
Abstract
It is very necessary to design effective methods to solve image authentication problem, particularly for images whose security must be
protected. In digital documents it is necessary to provide data authentication and repairing of tampered data e.g. important
documents such as certificates, scanned cheques, drawings, circuit diagrams, signed documents, design draft etc. In this paper, a
technique for authentication of images with self-repair capability for fixing tampered image data is explained. The input image is
assumed to be a binary-type greyscale image with 2 main gray values. Alpha channel is combined in the greyscale image .Using the
binary image, authentication signal is calculated which is then embedded in the alpha channel to create an authentic image. After
embedding the authentication signal, image is encrypted. If still Content modifications of the stego-image is detected, then data is
repaired at the pixel level using reverse secrete sharing scheme. In case if the alpha channel is completely removed from the stego-
image, the integral resulting image is regarded as unauthentic, meaning that the integrity check of the image fails. The proposed
method is based on the generation of (k, n)-threshold secret sharing scheme proposed by Shamir. In this method a secret message is
converted into n shares which is used as authentication signal for keeping by n participants; and when k of the n shares are collected,
the secret image can be recovered without any loss[8]. This type of secret sharing scheme is helpful for reducing the risk of incidental
partial data loss.
Keywords:-Alpha Channel, Secrete sharing scheme, Data repair, Encryption, greyscale image
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
The open availability of powerful digital image processing
tools allows open access, changes to original data and reuse of
visual materials. In fact, nowadays many people could easily
create illegal copies and change images in such a way that
may lead to big economic or human lives losses. These
problems can be well understood with an example. A patient
with a serious ill health, discovered from medical diagnostic
images, may ultimately get better due to medical treatments.
The medical summary of that patient involves the analysis of
historic images to evaluate the succession of the sickness in
time. A likely false diagnosis can put at risk the patient’s life,
if the stored image undergoes malicious manipulations,
compression or storage errors, such that the resultant
distortions cannot be detected by the doctor. This is a case
where modifications are not tolerated. It is necessary to ensure
the integrity and authenticity of a digital image. It is very
essential to design effectual methods to solve this type of
image authentication problem. Secret image sharing scheme
has been offered to solve this problem. Secret image sharing
method generates several shares which are then shared in the
protected image, and the protected image is reconstructed by
enough different shared shares. If part of an image is verified
to be distorted illegally, the destructed content can be repaired.
This type of image content authentication and self-repair
capabilities are of use for security protection of digital
documents or images for important certificates, signed
documents, scanned cheques, circuit diagrams, art drawings,
design drafts, last will and testaments, etc. In this paper, a
technique for authentication of images with extra self-repair
capability for fixing tampered image data is explained. The
input image is assumed to be a binary-like greyscale image
with 2 main gray values. After this, the cover image is
transformed into a stego-image by combining it with alpha
channel for transmission on networks. This image is then
encrypted for security purpose. At receiver side the stego
image is decrypted and then verified by the given technique
for its authenticity. Content modifications of the stego-image
can be detected and repaired at the pixel level. In case if the
alpha channel is completely removed from the stego-image,
the integral resulting image is regarded as unauthentic,
meaning that the integrity check of the image fails. The given
method is based on the (k, n)- threshold secret sharing scheme
proposed by Shamir. In this method a secret message is
converted into n shares i.e authentication signal for
embedding it in the image; and when k of the n shares, are
collected, the secret message can be recovered without any
loss. This type of secret sharing scheme is helpful for reducing
the risk of incidental partial data loss.
In the proposed method the binary image authentication with
repair capability is designed. Using secrete sharing scheme the
shares are generated which are distributed randomly in the
image block. For this authentication signal is generated and
used to calculate the shares. Alpha channel used for
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 267
transparency which is transferred to PNG format and then
shares are mapped with PNG format [2,4].
2. PROPOSED METHOD
The proposed method is based on the (2,6) secrete sharing
scheme in which random sequence of decision are made for
calculation of pixel positions for embedding the shares. The
alpha channel space can be utilized to embed the extra
information in the image. The alpha channel embedded in the
PNG image is used for creating required transparency for the
image. In the proposed system the resulting alpha channel
values are mapped into a range of 142 to 255. The
authentication signal is generated using the optimal block size
of 2 by 3 or 4 by 3 as per the size of the image (small or large
size). Then these authentication signals are mapped as shares
in the image. This is an image authentication method, not a
secrete sharing method. These embedded shares are then used
for checking the integrity of the image at receiver side. For
this system, input will be any type of image and output will be
the Secured image/ original image without any tampering. If
tampered, the system should recover it. For better performance
encryption and decryption is provided. For security purpose
image encryption is performed which can’t be decrypted
without a key
The given approach to secret image sharing is based on the (k,
n)-threshold secret sharing method proposed by Shamir
(1979). For a group of n secret sharing participants n shares
are generated from a secret integer value y for the threshold k.
In next part the algorithm for image authentication and
repairing are explained with results.
2.1 Image Authentication and Data Repairing
2.1.1 Generating Stego-Image
This algorithm describes how the stego image is generated and
stored in the PNG format.
Algorithm: Generation of a stego-image in PNG format from
a given greyscale image.
Input: An image in greyscale S with two major gray values,
and a secret key K.
Output: A stego-image S in the PNG format with relevant
information embedded, including the authentication signals
and the data for repairing
Step A: Generation of authentication signals
(i) (Converting the Input image to Binary form)
S is converted to obtain two representative gray values g1 and
g2, compute T = (g1 + g2)/2; T is used as a threshold to
convert S into binary form, such that the binary version Sb
with 0 indicative of g1 and 1 indicative of g2.
(ii) (Conversion of the cover image into the PNG format)
Convert S into a PNG image with additional alpha channel
plane S by creating a new image layer.
(iii) A 2 by 3 block Bb of Sb is scanned in raster scan with
pixels p1,p2... p6.
Step B: Design and Embedding of Shares
(v) (Creating data for secret sharing) p1 through p6 is
concatenated to form an 6-bit string, divide the string into two
4-bit segments, and convert the segments into 2 decimal
numbers m1 and m2, respectively.
(vi) (Generation of Partial Share) For secrete sharing scheme
explained above values are set as follows
(a) d = m1=0p1p2p3,c1 = m2=0p4p5p6
(b) x1 to x6 = Random generator is used for random values of
X in the range of 0 less than xi less than 17 [1];
(d) following equation is executed as a (2, 6)-threshold secret
sharing scheme [8] to generate six partial shares q1 through q6
qi=F(xi)=(d+c1xi+c2xi
2
+…+ck-1 xi
k-1
) ………….(1)
Where i = 1, 2..... 6.
(vii) (Map the partial shares) Adding 142 to each of q1
through q6, resulting in the new values of qd1 , through qd6 ,
respectively, which fall in the nearly transparency range of
142 through 254 in the alpha channel plane Sα.
qdi = qi +142;
(viii) (Embedding of shares at random pixels)
Use the key K to choose randomly 6 pixels in but outside the
current block , which are not selected so far in this step and in
the raster scan order change the six pixels values by the six
partial shares qd1 through qd6 generated above.
Fig. 1 Stego image from greyscale image & binary image
(ix) If there exists any unprocessed block in Sb , then go to
(iii), if not, take the final S in the PNG format as the preferred
stego-image Sα. After execution of (vii) the above algorithm,
they become q1 through q6 , respectively, which all fall into
an interval of integers ranging from 142 to 254.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 268
Consequent embedding of q1 to q6 in such a narrow distance
into the alpha channel plane means very alike values will
appear everywhere in the image block, resulting in a almost
consistent transparency effect, which will not stimulate notice
from an attacker.
Figure 2: Embedding of 6 shares generated for a given block, shares are embedded in randomly selected pixels outside the block.
Figure 3: Stego image Authentication process including verification and Self-repairing
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 269
2.1.2. STEGO-IMAGE AUTHENTICATION
A complete algorithm describing the stego-image
authentication process, including both verification and self
repairing of the original image content, is described in Fig.3
Algorithm: Authentication of a stego-image.
Input: A stego-image S , the representative gray values g1
and g2, and the secret key K.
Output: Marked tampered image Sr, and data repaired if
possible.
Part 1: Drawing out the embedded two representative gray
values.
Step 1: (Stego-image to Binary form conversion)
Compute T = (g1 + g2)/2 and use it as a threshold to convert S
into Binary Form, yielding the binary version Sb of S with ”0”
representing g1 and ”1” representing g2.
Part 2: Stego-image authentication.
Step 2: (Start looping) Take in a raster-scan order an
unprocessed block Bb from Sb with pixel values p1 through p6,
and. find the 6 pixel values qd1, through qd6 of the
corresponding block Bb′ in the alpha channel plane Sα′ of S′.
Step 3: (Extraction of the secreted authentication signal) to
extract the six bits hidden as authentication signal qd from B
follow the steps:
(1) Subtract 142 from each of the untampered qdi and qdj
partial shares of Bb . With the shares (xi, qi) and (xj, qj) as
input, solve the k i.e 2 equations by Lagrange’s interpolation
[8] to obtain the 2 values d and c1 (the secret and the
coefficient value, respectively).
(2) Now convert this d and c1 into two 4-bit binary values,
and then an 8-bit string is formed by concatenating these
binary values.[8]
Step 4: (Matching the secreted and computed authentication
signals and marking of tampered blocks)
Calculate the q1 to q6 values for 2 by 3 block of Sb. Match the
new calculated q1 to q6 with old embedded (in alpha channel)
q1 to q6 and if any variance occurs, mark Bb , the
corresponding block B in S , and all the partial shares
embedded in B as tampered.
Step 5: (Repairing of the tampered part)
If possible using the binary values of d & c1 find pixels p1
through p6.
Check the tampered pixels then try to repair the values using
the extracted binary b & c1.
Put g1 if pixel value is 1 & g2 if pixel value is 1 in received S
image. If sufficient i.e. 2 untampered authentication signal (qi ,
qj) is available then only repairing is possible. If all the signals
are tampered, repairing is not possible.
Step 6: (Exit loop)
If there is any unprocessed block in Sb , then go to Step 2;
otherwise, go on.
3. RESULTS AND DISCUSSION
The security of the information embedded in the stego image
can be improved by using the randomization of the constant
values of x1 to x6 used in step 6 of algorithm 2.1.1. If the
values of x1 to x6 is used from 1 to 6, (1,q1) and (2,q2) can be
forged[2]. So it is possible to generate a counterfeit
authentication signal. In proposed system random values
within the range of 0 to 17 are used. So the possibility of
correctly guessing all these values for all the m × n / 6
blocks in a stego- image can be approximately
1/ [( 17 × 16 ×15 × 14 × 13 × 12)] m × n /6.
The following diagram explains the original image output &
the changed image output. In right part image is changed /
deleted which is repaired at the receiver side. Though it is not
possible to repair the image successfully it detects the
tampering correctly. But if someone changes the bits within
the range of mid then it is not possible to detect the tampering
CONCLUSIONS
An image authentication method along with a data repair
capability for binary-like greyscale images i.e. black and white
based on secret sharing is explained. Both the generated
authentication signal and the content of a block are
transformed into partial shares by the Shamir method, which
are then distributed into an alpha channel plane to create a
stego-image in the PNG format. Here to avoid the security
constraint random values of X1 through X6 are used. For self-
repairing the content of a tampered block, the reverse Shamir
scheme is used to calculate the original form of the block from
any 2 untampered shares. It may possible that embedded alpha
channel gets tampered , so to avoid this the encryption and
decryption of stego-image is provided. A measure for
enhancing the protection of the data embedded in the alpha
channel plane is also specified.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 270
Figure 4: a] original image b] image changed with Photoshop c] changed image with original Authentication signal d] Repaired
image of fig.c
REFERENCES
[1] Shyamalendu Kandar, Bibhas Chandra Dhara , “K-n
Secrete Sharing Visual Cryptography scheme on color image
using Random Sequence”,IJCA(0975-8887)Volume 25-No.11
July 2011.
[2] Secret-Sharing-Based Method For Authentication Of
Grayscale Document Images Via the Use Of The PNG Image
With A Data Repair Capability By Che-Wei Lee, And Wen-
Hsiang Tsai, At IEEE Transactions on Image Processing, Vol.
21, No. 1, January 2012.
[3] A Grayscale Image Authentication Method with a Pixel-
level Self-Recovering Capability against Image Tampering”
by Che Wei Lee, Wen Hsiang Tsai MVA2011 IAPR
Conference on Machine Vision Applications, June 13-15,
2011, Nara, JAPAN.
[4] H. Yang And A. C. Kot, ”Binary Image Authentication
With Tampering Localization by Embedding Cryptographic
Signature And Block Identifier,”IEEE Signal Processing
Letters, Vol.13, No. 12,Pp. 741-744, Dec. 2006.
[5] Secret Image Sharing With Steganography And
Authentication Chang-Chou Lin, Wen- Hsiang Tsai,
Department Of Computer And Information Science, National
Chiao Tung University, Hsinchu 300,Taiwan,;Accepted 20
July 2003.
[6] Improvements Of Image Sharing With Steganography And
Authentication Ching-Nung Yang , Tse- Shih Chen, Kun
Hsuan Yu, Chung-Chun Wang Department Of Computer
Science And Information Engineering, National Dong Hwa
University, Sec. 2, Da Hsueh Rd., Hualien, Taiwan Received
22 October 2005;
[7] W. H. Tsai, ”Moment-Preserving Thresholding: A New
Approach,” Comput. Vis. Graph. Image Process. Vol. 29, No.
3, Pp. 377-393, Mar.1985.
[8] Shamir, ”How To Share A Secret,” Commun.
ACM,Vol.22, No.11,Pp.612-13,Nov. 1979.
[9] H. Yang And A. C. Kot, ”Pattern-Based Data Hiding For
Binary Images Authentication by Connectivity- Preserving,”
IEEE Trans. On Multimedia, Vol. 9, No. 3, Pp. 475-486, April
2007
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 271
[10] Younho LEE , Junbeom HUR, Heeyoul KIM,
Nonmembers , Yongsu PARK and Hyunsoo YOON Members
” A NEW BINARY IMAGE AUTHENTICATION SCHEME
WITH SMALL DISTORTION AND LOW FALSE
NEGATIVE RATES” IEICE Transaction on communication ,
VOL E90-B No.11 Nov 2007

More Related Content

What's hot

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONcsandit
 
Visual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingVisual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingIRJET Journal
 
An improved hdr image processing using fast global
An improved hdr image processing using fast globalAn improved hdr image processing using fast global
An improved hdr image processing using fast globaleSAT Publishing House
 
An improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mappingAn improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mappingeSAT Journals
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
An approach to hide data in video using steganography
An approach to hide data in video using steganographyAn approach to hide data in video using steganography
An approach to hide data in video using steganographyeSAT Publishing House
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Securityrahulmonikasharma
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography IRJET Journal
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Publishing House
 

What's hot (17)

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
Visual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingVisual Cryptography using Image Thresholding
Visual Cryptography using Image Thresholding
 
An improved hdr image processing using fast global
An improved hdr image processing using fast globalAn improved hdr image processing using fast global
An improved hdr image processing using fast global
 
An improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mappingAn improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mapping
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
An approach to hide data in video using steganography
An approach to hide data in video using steganographyAn approach to hide data in video using steganography
An approach to hide data in video using steganography
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
K42016368
K42016368K42016368
K42016368
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 

Viewers also liked

Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmeSAT Journals
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image queryeSAT Journals
 
Management of the building site
Management of the building siteManagement of the building site
Management of the building siteeSAT Journals
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile deviceseSAT Journals
 
Routing of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation systemRouting of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation systemeSAT Journals
 
Modeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technologyModeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technologyeSAT Journals
 
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...eSAT Journals
 
Mathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrotMathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carroteSAT Journals
 
Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...eSAT Journals
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneeSAT Journals
 
Self compacting concrete for slip form paving
Self compacting concrete for slip form pavingSelf compacting concrete for slip form paving
Self compacting concrete for slip form pavingeSAT Journals
 
Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...eSAT Journals
 
Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...eSAT Journals
 
Reliability based selection of standard steel beams
Reliability based selection of standard steel beamsReliability based selection of standard steel beams
Reliability based selection of standard steel beamseSAT Journals
 
Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...eSAT Journals
 
Review on blended concretes
Review on blended concretesReview on blended concretes
Review on blended concreteseSAT Journals
 
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...eSAT Journals
 
Study of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connectorStudy of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connectoreSAT Journals
 
Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...eSAT Journals
 

Viewers also liked (19)

Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
 
Management of the building site
Management of the building siteManagement of the building site
Management of the building site
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile devices
 
Routing of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation systemRouting of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation system
 
Modeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technologyModeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technology
 
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
 
Mathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrotMathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrot
 
Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backbone
 
Self compacting concrete for slip form paving
Self compacting concrete for slip form pavingSelf compacting concrete for slip form paving
Self compacting concrete for slip form paving
 
Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...
 
Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...
 
Reliability based selection of standard steel beams
Reliability based selection of standard steel beamsReliability based selection of standard steel beams
Reliability based selection of standard steel beams
 
Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...
 
Review on blended concretes
Review on blended concretesReview on blended concretes
Review on blended concretes
 
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
 
Study of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connectorStudy of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connector
 
Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...
 

Similar to Greyscale image authentication and repairing

IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingImproving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingIRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
Reversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansionReversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansionnooriasukmaningtyas
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyIRJET Journal
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewIRJET Journal
 

Similar to Greyscale image authentication and repairing (20)

IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
R044068186
R044068186R044068186
R044068186
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingImproving AI surveillance using Edge Computing
Improving AI surveillance using Edge Computing
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
F42022628
F42022628F42022628
F42022628
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Reversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansionReversible image authentication scheme based on prediction error expansion
Reversible image authentication scheme based on prediction error expansion
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image Steganography
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

Greyscale image authentication and repairing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 266 GREYSCALE IMAGE AUTHENTICATION AND REPAIRING Jyoti Rao1 , Sarika Jankar2 1, 2 Department of Computer Engineering DYPIET, Pune University jyoti.aswale@gmail.com, sarikajaankar@gmail.com Abstract It is very necessary to design effective methods to solve image authentication problem, particularly for images whose security must be protected. In digital documents it is necessary to provide data authentication and repairing of tampered data e.g. important documents such as certificates, scanned cheques, drawings, circuit diagrams, signed documents, design draft etc. In this paper, a technique for authentication of images with self-repair capability for fixing tampered image data is explained. The input image is assumed to be a binary-type greyscale image with 2 main gray values. Alpha channel is combined in the greyscale image .Using the binary image, authentication signal is calculated which is then embedded in the alpha channel to create an authentic image. After embedding the authentication signal, image is encrypted. If still Content modifications of the stego-image is detected, then data is repaired at the pixel level using reverse secrete sharing scheme. In case if the alpha channel is completely removed from the stego- image, the integral resulting image is regarded as unauthentic, meaning that the integrity check of the image fails. The proposed method is based on the generation of (k, n)-threshold secret sharing scheme proposed by Shamir. In this method a secret message is converted into n shares which is used as authentication signal for keeping by n participants; and when k of the n shares are collected, the secret image can be recovered without any loss[8]. This type of secret sharing scheme is helpful for reducing the risk of incidental partial data loss. Keywords:-Alpha Channel, Secrete sharing scheme, Data repair, Encryption, greyscale image -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION The open availability of powerful digital image processing tools allows open access, changes to original data and reuse of visual materials. In fact, nowadays many people could easily create illegal copies and change images in such a way that may lead to big economic or human lives losses. These problems can be well understood with an example. A patient with a serious ill health, discovered from medical diagnostic images, may ultimately get better due to medical treatments. The medical summary of that patient involves the analysis of historic images to evaluate the succession of the sickness in time. A likely false diagnosis can put at risk the patient’s life, if the stored image undergoes malicious manipulations, compression or storage errors, such that the resultant distortions cannot be detected by the doctor. This is a case where modifications are not tolerated. It is necessary to ensure the integrity and authenticity of a digital image. It is very essential to design effectual methods to solve this type of image authentication problem. Secret image sharing scheme has been offered to solve this problem. Secret image sharing method generates several shares which are then shared in the protected image, and the protected image is reconstructed by enough different shared shares. If part of an image is verified to be distorted illegally, the destructed content can be repaired. This type of image content authentication and self-repair capabilities are of use for security protection of digital documents or images for important certificates, signed documents, scanned cheques, circuit diagrams, art drawings, design drafts, last will and testaments, etc. In this paper, a technique for authentication of images with extra self-repair capability for fixing tampered image data is explained. The input image is assumed to be a binary-like greyscale image with 2 main gray values. After this, the cover image is transformed into a stego-image by combining it with alpha channel for transmission on networks. This image is then encrypted for security purpose. At receiver side the stego image is decrypted and then verified by the given technique for its authenticity. Content modifications of the stego-image can be detected and repaired at the pixel level. In case if the alpha channel is completely removed from the stego-image, the integral resulting image is regarded as unauthentic, meaning that the integrity check of the image fails. The given method is based on the (k, n)- threshold secret sharing scheme proposed by Shamir. In this method a secret message is converted into n shares i.e authentication signal for embedding it in the image; and when k of the n shares, are collected, the secret message can be recovered without any loss. This type of secret sharing scheme is helpful for reducing the risk of incidental partial data loss. In the proposed method the binary image authentication with repair capability is designed. Using secrete sharing scheme the shares are generated which are distributed randomly in the image block. For this authentication signal is generated and used to calculate the shares. Alpha channel used for
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 267 transparency which is transferred to PNG format and then shares are mapped with PNG format [2,4]. 2. PROPOSED METHOD The proposed method is based on the (2,6) secrete sharing scheme in which random sequence of decision are made for calculation of pixel positions for embedding the shares. The alpha channel space can be utilized to embed the extra information in the image. The alpha channel embedded in the PNG image is used for creating required transparency for the image. In the proposed system the resulting alpha channel values are mapped into a range of 142 to 255. The authentication signal is generated using the optimal block size of 2 by 3 or 4 by 3 as per the size of the image (small or large size). Then these authentication signals are mapped as shares in the image. This is an image authentication method, not a secrete sharing method. These embedded shares are then used for checking the integrity of the image at receiver side. For this system, input will be any type of image and output will be the Secured image/ original image without any tampering. If tampered, the system should recover it. For better performance encryption and decryption is provided. For security purpose image encryption is performed which can’t be decrypted without a key The given approach to secret image sharing is based on the (k, n)-threshold secret sharing method proposed by Shamir (1979). For a group of n secret sharing participants n shares are generated from a secret integer value y for the threshold k. In next part the algorithm for image authentication and repairing are explained with results. 2.1 Image Authentication and Data Repairing 2.1.1 Generating Stego-Image This algorithm describes how the stego image is generated and stored in the PNG format. Algorithm: Generation of a stego-image in PNG format from a given greyscale image. Input: An image in greyscale S with two major gray values, and a secret key K. Output: A stego-image S in the PNG format with relevant information embedded, including the authentication signals and the data for repairing Step A: Generation of authentication signals (i) (Converting the Input image to Binary form) S is converted to obtain two representative gray values g1 and g2, compute T = (g1 + g2)/2; T is used as a threshold to convert S into binary form, such that the binary version Sb with 0 indicative of g1 and 1 indicative of g2. (ii) (Conversion of the cover image into the PNG format) Convert S into a PNG image with additional alpha channel plane S by creating a new image layer. (iii) A 2 by 3 block Bb of Sb is scanned in raster scan with pixels p1,p2... p6. Step B: Design and Embedding of Shares (v) (Creating data for secret sharing) p1 through p6 is concatenated to form an 6-bit string, divide the string into two 4-bit segments, and convert the segments into 2 decimal numbers m1 and m2, respectively. (vi) (Generation of Partial Share) For secrete sharing scheme explained above values are set as follows (a) d = m1=0p1p2p3,c1 = m2=0p4p5p6 (b) x1 to x6 = Random generator is used for random values of X in the range of 0 less than xi less than 17 [1]; (d) following equation is executed as a (2, 6)-threshold secret sharing scheme [8] to generate six partial shares q1 through q6 qi=F(xi)=(d+c1xi+c2xi 2 +…+ck-1 xi k-1 ) ………….(1) Where i = 1, 2..... 6. (vii) (Map the partial shares) Adding 142 to each of q1 through q6, resulting in the new values of qd1 , through qd6 , respectively, which fall in the nearly transparency range of 142 through 254 in the alpha channel plane Sα. qdi = qi +142; (viii) (Embedding of shares at random pixels) Use the key K to choose randomly 6 pixels in but outside the current block , which are not selected so far in this step and in the raster scan order change the six pixels values by the six partial shares qd1 through qd6 generated above. Fig. 1 Stego image from greyscale image & binary image (ix) If there exists any unprocessed block in Sb , then go to (iii), if not, take the final S in the PNG format as the preferred stego-image Sα. After execution of (vii) the above algorithm, they become q1 through q6 , respectively, which all fall into an interval of integers ranging from 142 to 254.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 268 Consequent embedding of q1 to q6 in such a narrow distance into the alpha channel plane means very alike values will appear everywhere in the image block, resulting in a almost consistent transparency effect, which will not stimulate notice from an attacker. Figure 2: Embedding of 6 shares generated for a given block, shares are embedded in randomly selected pixels outside the block. Figure 3: Stego image Authentication process including verification and Self-repairing
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 269 2.1.2. STEGO-IMAGE AUTHENTICATION A complete algorithm describing the stego-image authentication process, including both verification and self repairing of the original image content, is described in Fig.3 Algorithm: Authentication of a stego-image. Input: A stego-image S , the representative gray values g1 and g2, and the secret key K. Output: Marked tampered image Sr, and data repaired if possible. Part 1: Drawing out the embedded two representative gray values. Step 1: (Stego-image to Binary form conversion) Compute T = (g1 + g2)/2 and use it as a threshold to convert S into Binary Form, yielding the binary version Sb of S with ”0” representing g1 and ”1” representing g2. Part 2: Stego-image authentication. Step 2: (Start looping) Take in a raster-scan order an unprocessed block Bb from Sb with pixel values p1 through p6, and. find the 6 pixel values qd1, through qd6 of the corresponding block Bb′ in the alpha channel plane Sα′ of S′. Step 3: (Extraction of the secreted authentication signal) to extract the six bits hidden as authentication signal qd from B follow the steps: (1) Subtract 142 from each of the untampered qdi and qdj partial shares of Bb . With the shares (xi, qi) and (xj, qj) as input, solve the k i.e 2 equations by Lagrange’s interpolation [8] to obtain the 2 values d and c1 (the secret and the coefficient value, respectively). (2) Now convert this d and c1 into two 4-bit binary values, and then an 8-bit string is formed by concatenating these binary values.[8] Step 4: (Matching the secreted and computed authentication signals and marking of tampered blocks) Calculate the q1 to q6 values for 2 by 3 block of Sb. Match the new calculated q1 to q6 with old embedded (in alpha channel) q1 to q6 and if any variance occurs, mark Bb , the corresponding block B in S , and all the partial shares embedded in B as tampered. Step 5: (Repairing of the tampered part) If possible using the binary values of d & c1 find pixels p1 through p6. Check the tampered pixels then try to repair the values using the extracted binary b & c1. Put g1 if pixel value is 1 & g2 if pixel value is 1 in received S image. If sufficient i.e. 2 untampered authentication signal (qi , qj) is available then only repairing is possible. If all the signals are tampered, repairing is not possible. Step 6: (Exit loop) If there is any unprocessed block in Sb , then go to Step 2; otherwise, go on. 3. RESULTS AND DISCUSSION The security of the information embedded in the stego image can be improved by using the randomization of the constant values of x1 to x6 used in step 6 of algorithm 2.1.1. If the values of x1 to x6 is used from 1 to 6, (1,q1) and (2,q2) can be forged[2]. So it is possible to generate a counterfeit authentication signal. In proposed system random values within the range of 0 to 17 are used. So the possibility of correctly guessing all these values for all the m × n / 6 blocks in a stego- image can be approximately 1/ [( 17 × 16 ×15 × 14 × 13 × 12)] m × n /6. The following diagram explains the original image output & the changed image output. In right part image is changed / deleted which is repaired at the receiver side. Though it is not possible to repair the image successfully it detects the tampering correctly. But if someone changes the bits within the range of mid then it is not possible to detect the tampering CONCLUSIONS An image authentication method along with a data repair capability for binary-like greyscale images i.e. black and white based on secret sharing is explained. Both the generated authentication signal and the content of a block are transformed into partial shares by the Shamir method, which are then distributed into an alpha channel plane to create a stego-image in the PNG format. Here to avoid the security constraint random values of X1 through X6 are used. For self- repairing the content of a tampered block, the reverse Shamir scheme is used to calculate the original form of the block from any 2 untampered shares. It may possible that embedded alpha channel gets tampered , so to avoid this the encryption and decryption of stego-image is provided. A measure for enhancing the protection of the data embedded in the alpha channel plane is also specified.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 270 Figure 4: a] original image b] image changed with Photoshop c] changed image with original Authentication signal d] Repaired image of fig.c REFERENCES [1] Shyamalendu Kandar, Bibhas Chandra Dhara , “K-n Secrete Sharing Visual Cryptography scheme on color image using Random Sequence”,IJCA(0975-8887)Volume 25-No.11 July 2011. [2] Secret-Sharing-Based Method For Authentication Of Grayscale Document Images Via the Use Of The PNG Image With A Data Repair Capability By Che-Wei Lee, And Wen- Hsiang Tsai, At IEEE Transactions on Image Processing, Vol. 21, No. 1, January 2012. [3] A Grayscale Image Authentication Method with a Pixel- level Self-Recovering Capability against Image Tampering” by Che Wei Lee, Wen Hsiang Tsai MVA2011 IAPR Conference on Machine Vision Applications, June 13-15, 2011, Nara, JAPAN. [4] H. Yang And A. C. Kot, ”Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature And Block Identifier,”IEEE Signal Processing Letters, Vol.13, No. 12,Pp. 741-744, Dec. 2006. [5] Secret Image Sharing With Steganography And Authentication Chang-Chou Lin, Wen- Hsiang Tsai, Department Of Computer And Information Science, National Chiao Tung University, Hsinchu 300,Taiwan,;Accepted 20 July 2003. [6] Improvements Of Image Sharing With Steganography And Authentication Ching-Nung Yang , Tse- Shih Chen, Kun Hsuan Yu, Chung-Chun Wang Department Of Computer Science And Information Engineering, National Dong Hwa University, Sec. 2, Da Hsueh Rd., Hualien, Taiwan Received 22 October 2005; [7] W. H. Tsai, ”Moment-Preserving Thresholding: A New Approach,” Comput. Vis. Graph. Image Process. Vol. 29, No. 3, Pp. 377-393, Mar.1985. [8] Shamir, ”How To Share A Secret,” Commun. ACM,Vol.22, No.11,Pp.612-13,Nov. 1979. [9] H. Yang And A. C. Kot, ”Pattern-Based Data Hiding For Binary Images Authentication by Connectivity- Preserving,” IEEE Trans. On Multimedia, Vol. 9, No. 3, Pp. 475-486, April 2007
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 271 [10] Younho LEE , Junbeom HUR, Heeyoul KIM, Nonmembers , Yongsu PARK and Hyunsoo YOON Members ” A NEW BINARY IMAGE AUTHENTICATION SCHEME WITH SMALL DISTORTION AND LOW FALSE NEGATIVE RATES” IEICE Transaction on communication , VOL E90-B No.11 Nov 2007