SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359      ISSN: 2249-6645

      A Survey on Authentication for Grayscale Images Based On Visual
                        Cryptographic Technique

                                          B. Priyanka1, E. Purushottam, 2
Abstract: A new digital watermarking technique as authentication method based on secret sharing sharing method for color
images was proposed. The image is transformed in to binarized block form in which the watermark is embedded for
authentication purpose and then the image is divided into several shares using shamir secret sharing scheme, which
reconstructs the secret by using reverse Shamir secret sharing scheme and is been proceeded for authentication process i.e
to check the watermark embedded in the image.

Key Words: digital watermarking, secret, Shamir secret sharing, image authentication.

                                                   I. NTRODUCTION
          Digital information is a form of preserving data for which authentication is necessary to overcome the tampering
attacks. In multimedia applications, it is necessary to authenticate the source image which might be subjected to tampering.
So, for such content authentication watermarking technique is used. It is one among the emerging fields that are used for
content authentication. As, the content authentication is being the hottest topics now a days, it is necessary to assure that the
delivering of image to somewhere is delivered as it is. However, with the fast advance of digital technologies it is easy to
make the modifications to the images. Thus integrity of image become a serious concern. To solve those image
authentication problem particularly digitized documents, digital signatures, tables, texts, etc., whose security must be
protected. In this paper we are performing image authentication of grayscale images. Grayscale image has two gray values
i.e foreground and background. Grayscale images look like binary ones. So, we can call a grayscale image as binary like
grayscale image. Binary image consists of two colors black and white. Using binary images can cause some problems. As
the binary images are simple in nature many unpleasant strokes can encounters. So using grayscale images can solve the
problem of visual quality which the binary one cannot does.
          Many conventional methods have been proposed for authentication of grayscale images. In our proposed method,
the image is first watermarked and divided into shares using Shamir secret sharing scheme. Later, those shares are
reconstructed using inverse Shamir secret sharing scheme and watermark has been extracted if the image is authentic. Data
loss during transmission are marked as gray blocks.




                                                      Grayscale cheque image

                                          II. DIGITAL WATERMARKING
         Digital watermarking is a technique for inserting a watermark into an image, which is been later extracted or
detected for identification and authentication purposes. A watermark is a form of text or image that is been embedded in to
the paper for its evidence of authenticity. The extension of this concept is Digital watermarking. Watermarks are of two
kinds: visible and invisible. It is related to steganography but, in watermarking technique the information that is hidden is
usually related to the cover object. It is used for content authentication and copyright protection.
         Digital watermarking is defined as the digital signal that is embedded in audio, video or image with some
information related to those and which cannot be eliminated easily.

                                                           www.ijmer.com                                              354 | Page
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359      ISSN: 2249-6645

The process to embed a watermark is done in three steps:

1. Embedding watermark: In this algorithm it accepts the data to be embedded and produces watermark signal.

2. Attack on image: The watermark signal is transmitted and during transformation the attacker may or may not modify the
image. If there is a modification then it is said to be an attack.

3. Detection of watermark: This algorithm is applied when the attacked signal to extract watermark from it. If the signal
undergoes any modification then the information is also carried in the copy. If suppose, the signal doesn’t undergo any
modification the watermark is present and it can be extracted.
         We first embed the watermark in to the original or cover image and make it a watermarked image and then after
transformation we extract the watermark and check whether it has been undergone any sort of manipulations or attacks.
Finally, we extract the watermark from the image to prove its authenticity. To avoid illegal access to the watermark a secret
key as shown in the figure is used during the embedding process and extraction process of watermark.
         Watermarking techniques are used for copyright protection, broadcast monitoring, authentication, tamper detection
and digital finger printing, content protection, content labeling.

A watermark may be:
 1.Robust: As the names mentioned it is strong and overcomes sevreal processing attacks. For example: filtering,
compression

2.Fragile: It is distorted under slight changes.

3.Semi-fragile: It breaks under the changes performed by the user i.e exceeding specific threshold.




                                                   Block diagram of watermarking

                                         III. SECRET SHARING METHOD
         During decades some scientists (eleven) are working on a secret project. They wish to lock up the documents and
details of the secret project in a cabinet so that the cabinet can be opened if and only if six or more of the scientists are
present. So, What is the smallest number of locks needed to open the documents? What is the smallest number of keys to the
locks each scientist must carry to view the documents?
                                                            www.ijmer.com                                         355 | Page
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359      ISSN: 2249-6645

         The method of secret sharing is sharing a secret among group of participants. It is come to know that previously
there are some eleven scientists who are working on a secret project for which they wanted to lockup their documents
regarding the project with some secret code. So there the problem arises. They want those documents to be enclosed to the
cabinet only if six or more scientists opens it with their individual secret key share. It means cabinet consisting of eleven
members having their own individual unique secret key. But in order to access the documents of project a single secret share
key not sufficient and at the same time it is not necessary to have all eleven secret share keys to open the documents. So for
this Shamir proposed an algorithm named Shamir secret sharing algorithm where a single secret is shared among group of
participants. Here participants are the authorized users who access to the data.
The algorithm goes in the following manner:

1. Divide the data d in to n pieces i.e d1, d2, d3, d4,…………….dn
2. It is distributed among n participants.
3. The secret or data can be reconstruct able only if k pieces are present.
4. Even k-1 pieces are not acceptable.

          So he proposed a scheme called (k,n) threshold scheme. Where k is the minimal number of users or participants to
reconstruct the key and n is the total number of divided pieces of data or secret. For example: a company wants to sign the
checks by the executives in a digitized manner. At the same time company’s signature must be secret, so the if we give the
company’s signature to all the executives then it is pruned to privacy attacks. So in order to solve this problem they are using
(k,n) threshold scheme i.e they are putting a minimal number of key as 3 i.e (3,n) they are given a magnetic card with that.
The company president is given 3 keys, vice president is given 2 keys and the executive is given a single one. So in order to
prune to any attacks the executive must have still 2 keys and the vice president must have still one more key.




                                                     Secret sharing method

                                              IV. PROPOSED METHOD
Original image is authenticated by embedding a watermark which is invisible. Later, the image is divided into shares using
Shamir secret sharing method and the divided shares are transferred and by using inverse Shamir secret sharing method we
form the original image and the watermark is extracted from that image to authenticate.

Embedding watermark: An image A is selected form set of standard images and let it be the base image on which a
watermark is embedded.



                                                           www.ijmer.com                                             356 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359      ISSN: 2249-6645

Algorithm:
Step 1: Let B be a grayscale image to be watermarked.
Step 2: Use a pseudo-random number generator with a known seed to generate a set of non repeating pseudo-random
locations L within the grayscale image B.
Step 3: Clear all pixels of B that belong to L, obtaining B*.
Step 4: Compute the fingerprint H .H(B*).
Step 5: perform exclusive-or H for getting the marked fingerprint H*.
Step 6: Encrypt H* with the secret key or private key thus generating the MAC/DS S.
step 7: Insert S into the set of pixels L, generating the watermarked image B


Diving the shares: We apply (k,n) threshold secret scheme for dividing the watermark image into shares. The following is
the algorithm for dividing the watermark image in to shares.

Algorithm:

Step 1: Take secret d in the form of an integer, number n of participants, and threshold k<=n.
Step 2: Choose a random prime number p larger than d.
Step 3: Select k-1integer values c1,c2,c3,……
….,ck-1 range of 0 through p-1 .
Step 4: Select n distinct real values x1,x2,x3……
…..,xn
Step 5: Use the following (k-1) degree polynomial to compute n function values F(xi ) , called partial shares for i=1,2,….n i.e
                                       𝐹 𝑥 𝑖 = 𝑑 + 𝑐1 𝑥 𝑖 + 𝑐2 𝑥 𝑖 2 + ⋯ 𝑐 𝑘 −1 𝑥 𝑖 𝑘−1 𝑚𝑜𝑑 𝑝
Step 6: Deliver the two-tuple (xi,F(xi )) as a share to the i participant where i=1,2,3,…n .


Reconstructing the shares: We reconstruct the shares by applying inverse Shamir secret sharing scheme. The following is
the algorithm reconstructing the watermarked image.

Algorithm :

Step 1: k shares collected from the n participants and the prime number p with both k and p
Step 2: Use the k shares 𝑥1 , 𝐹 𝑥1 , 𝑥2 , 𝐹 𝑥2 , … , (𝑥 𝑘 , 𝐹 𝑥 𝑘 ) to 𝐹 𝑥𝑗 = 𝑑 + 𝑐1 + 𝑐2 𝑥𝑗 2 + ⋯ + 𝑐 𝑘 −1 𝑥𝑗      𝑘−1
                                                                                                                          𝑚𝑜𝑑 𝑝
where j=1,2,….k

Step 3: Solve the k equations above by Lagrange’s interpolation to obtain d as follows

                                                𝑘 −1
                                                                            𝑥2 𝑥3 … 𝑥 𝑘
                                     𝑑 = −1            [𝐹(𝑥1 )
                                                                 𝑥1 − 𝑥2 ) 𝑥1 − 𝑥3 … (𝑥1 − 𝑥 𝑘 )
                                                            𝑥1 𝑥3 … 𝑥 𝑘
                                        +𝐹 𝑥2                                     +⋯
                                                 (𝑥2 − 𝑥1 ) 𝑥2 − 𝑥3 … (𝑥2 − 𝑥 𝑘 )
                                                           𝑥1 𝑥2 … 𝑥 𝑘−1
                                     +𝐹 𝑥 𝑘                                         ] 𝑚𝑜𝑑 𝑝
                                              (𝑥 𝑘 − 𝑥1 ) 𝑥 𝑘 − 𝑥2 … (𝑥 𝑘 − 𝑥 𝑘−1 )

Step4: Compute c1 through ck-1 by expanding the following equality and comparing the result with Step 2 while regarding
variable x in the equality below to be xj
                                                         𝑥 − 𝑥2 𝑥 − 𝑥3 … (𝑥 − 𝑥 𝑘 )
                                        𝐹 𝑥 = [𝐹(𝑥1 )
                                                      (𝑥1 − 𝑥2 ) 𝑥1 − 𝑥3 … (𝑥1 − 𝑥 𝑘 )

                                                    𝑥 − 𝑥1 𝑥 − 𝑥3 … (𝑥 − 𝑥 𝑘 )
                                        +𝐹 𝑥2                                     +⋯
                                                 (𝑥2 − 𝑥1 ) 𝑥2 − 𝑥3 … (𝑥2 − 𝑥 𝑘 )

                                                  𝑥 − 𝑥1 𝑥 − 𝑥2 … (𝑥 − 𝑥 𝑘−1 )
                                     +𝐹 𝑥 𝑘                                          ] 𝑚𝑜𝑑𝑝
                                              (𝑥 𝑘 − 𝑥1 ) 𝑥 𝑘 − 𝑥2 … (𝑥 𝑘 − 𝑥 𝑘 −1 )




                                                                 www.ijmer.com                                       357 | Page
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359      ISSN: 2249-6645




                                         Process for authentication of grayscale cheque image

Extraction of watermark:

Algorithm:
Step 1: Let X be a watermarked image. Use the same pseudorandom number that has been applied in insertion process to
generate again the same set of non repeating pseudo-random locations L where the watermark has been inserted.
Step 2: Let X* be the image obtained from X by clearing all pixels in L. Using the same hashing function H compute the
fingerprint H .H(X*).
Step 3: Extract the watermark from X by scanning pixels in L and decrypt the result using the secret key and obtain the
decrypted data D.
Step 4: By applying exclusive-or H with D, obtaining the check image C.
Step 5: If C and A are equal, the watermark is verified. Otherwise, the image X has been modified. The following is the
procedure for authentication.




                                        V. EXPERIMENTAL RESULTS
        The following are the experimental results performed on grayscale cheque image. A cover image is taken and
performed the authentication process. Firstly, embed a water in to the image by using algorithm 1.




                                                           (a)



                                                       www.ijmer.com                                          358 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359      ISSN: 2249-6645




                                                             (b)

          Experimental results for cheque image (a) cover image or original image (b) embedded watermark image
         Later, the image is divided in to shares using Shamir secret sharing method. The shares are reconstructed using
inverse Shamir secret sharing scheme and form a original or cover image. Then, check for the watermark embedded in the
image. The image is said to be authentic if watermark is present. Extract the watermark. There occurs, a loss of data during
the transmission process, which is marked as gray blocks as shown in the figure. If there is no data loss during transmission
the original image is recovered.
         The following are the figures related to the image with tampering i.e the tampering is shown in the form of gray
blocks and without tampering i.e original or cover image.




                                                             (c)




                                                             (d)

         (c) Image with tampering shown in the form of gray blocks (d) original or cover image without tampering.

                                                 VI. CONCLUSION
         In, this paper a new image authentication using secret sharing method is proposed. The grayscale cheque image is
watermarked first and that watermark is divided in to shares using Shamir secret sharing method. Later, the shares are
reconstructed using inverse Shamir secret sharing scheme and the watermark is extracted. Data loss during the transmission
is shown in the form of gray blocks. This can be performed for color images also.




                                                         www.ijmer.com                                            359 | Page

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...IDES Editor
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phoneseSAT Publishing House
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
3d pass words
3d pass words3d pass words
3d pass wordsmkanth
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107IJRAT
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacywaseem ahmad
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 

What's hot (19)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
3d passwords
3d passwords 3d passwords
3d passwords
 
280 284
280 284280 284
280 284
 
3d
3d3d
3d
 
Vivek
VivekVivek
Vivek
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phones
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3d pass words
3d pass words3d pass words
3d pass words
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
 
Kaur2013
Kaur2013Kaur2013
Kaur2013
 
3d password
3d password3d password
3d password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 

Viewers also liked

Analysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir FilterAnalysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir FilterIJMER
 
Cm31381385
Cm31381385Cm31381385
Cm31381385IJMER
 
Df31490496
Df31490496Df31490496
Df31490496IJMER
 
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionContact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionIJMER
 
Experimental Investigation of Vertical Downward Flow Boiling Heat Transfer i...
Experimental Investigation of Vertical Downward Flow Boiling  Heat Transfer i...Experimental Investigation of Vertical Downward Flow Boiling  Heat Transfer i...
Experimental Investigation of Vertical Downward Flow Boiling Heat Transfer i...IJMER
 
Effect of SC5D Additive on the Performance and Emission Characteristics of CI...
Effect of SC5D Additive on the Performance and Emission Characteristics of CI...Effect of SC5D Additive on the Performance and Emission Characteristics of CI...
Effect of SC5D Additive on the Performance and Emission Characteristics of CI...IJMER
 
Compensation for Inverter Nonlinearity Using Trapezoidal Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal  VoltageCompensation for Inverter Nonlinearity Using Trapezoidal  Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal VoltageIJMER
 
Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...
Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...
Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...IJMER
 
A Note on a Three Variables Analogue of Bessel Polynomials
A Note on a Three Variables Analogue of Bessel PolynomialsA Note on a Three Variables Analogue of Bessel Polynomials
A Note on a Three Variables Analogue of Bessel PolynomialsIJMER
 
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...IJMER
 
Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...
Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...
Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...IJMER
 
Cg32955961
Cg32955961Cg32955961
Cg32955961IJMER
 
Advanced Micro-Grids
Advanced Micro-Grids Advanced Micro-Grids
Advanced Micro-Grids IJMER
 
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...IJMER
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsAn Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsIJMER
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
 
Dm3211501156
Dm3211501156Dm3211501156
Dm3211501156IJMER
 
A Detailed Modelingof a Five Parameters Model for Photovoltaic Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic  ModulesA Detailed Modelingof a Five Parameters Model for Photovoltaic  Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic ModulesIJMER
 
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...IJMER
 

Viewers also liked (20)

Analysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir FilterAnalysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir Filter
 
Cm31381385
Cm31381385Cm31381385
Cm31381385
 
Df31490496
Df31490496Df31490496
Df31490496
 
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading ConditionContact Pressure Validation of Steam Turbine Casing for Static Loading Condition
Contact Pressure Validation of Steam Turbine Casing for Static Loading Condition
 
Experimental Investigation of Vertical Downward Flow Boiling Heat Transfer i...
Experimental Investigation of Vertical Downward Flow Boiling  Heat Transfer i...Experimental Investigation of Vertical Downward Flow Boiling  Heat Transfer i...
Experimental Investigation of Vertical Downward Flow Boiling Heat Transfer i...
 
Effect of SC5D Additive on the Performance and Emission Characteristics of CI...
Effect of SC5D Additive on the Performance and Emission Characteristics of CI...Effect of SC5D Additive on the Performance and Emission Characteristics of CI...
Effect of SC5D Additive on the Performance and Emission Characteristics of CI...
 
Compensation for Inverter Nonlinearity Using Trapezoidal Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal  VoltageCompensation for Inverter Nonlinearity Using Trapezoidal  Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal Voltage
 
Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...
Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...
Alternatives for Cellulase Production in Submerged Fermentation with Agroindu...
 
A Note on a Three Variables Analogue of Bessel Polynomials
A Note on a Three Variables Analogue of Bessel PolynomialsA Note on a Three Variables Analogue of Bessel Polynomials
A Note on a Three Variables Analogue of Bessel Polynomials
 
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
 
Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...
Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...
Numerical Analysis of Rotating Mixing of Fluids in Container Induced by Contr...
 
Cg32955961
Cg32955961Cg32955961
Cg32955961
 
Advanced Micro-Grids
Advanced Micro-Grids Advanced Micro-Grids
Advanced Micro-Grids
 
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsAn Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
 
Dm3211501156
Dm3211501156Dm3211501156
Dm3211501156
 
A Detailed Modelingof a Five Parameters Model for Photovoltaic Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic  ModulesA Detailed Modelingof a Five Parameters Model for Photovoltaic  Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic Modules
 
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...Adsorption Studies of an Acid Dye From Aqueous Solution Using  Lagerstroemia ...
Adsorption Studies of an Acid Dye From Aqueous Solution Using Lagerstroemia ...
 

Similar to Ch31354359

Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...sipij
 
Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...sipij
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 

Similar to Ch31354359 (20)

[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
50120130406038
5012013040603850120130406038
50120130406038
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...
 
Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...Digital Signature and Watermark Methods for Image Authentication Using Crypto...
Digital Signature and Watermark Methods for Image Authentication Using Crypto...
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Ch31354359

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359 ISSN: 2249-6645 A Survey on Authentication for Grayscale Images Based On Visual Cryptographic Technique B. Priyanka1, E. Purushottam, 2 Abstract: A new digital watermarking technique as authentication method based on secret sharing sharing method for color images was proposed. The image is transformed in to binarized block form in which the watermark is embedded for authentication purpose and then the image is divided into several shares using shamir secret sharing scheme, which reconstructs the secret by using reverse Shamir secret sharing scheme and is been proceeded for authentication process i.e to check the watermark embedded in the image. Key Words: digital watermarking, secret, Shamir secret sharing, image authentication. I. NTRODUCTION Digital information is a form of preserving data for which authentication is necessary to overcome the tampering attacks. In multimedia applications, it is necessary to authenticate the source image which might be subjected to tampering. So, for such content authentication watermarking technique is used. It is one among the emerging fields that are used for content authentication. As, the content authentication is being the hottest topics now a days, it is necessary to assure that the delivering of image to somewhere is delivered as it is. However, with the fast advance of digital technologies it is easy to make the modifications to the images. Thus integrity of image become a serious concern. To solve those image authentication problem particularly digitized documents, digital signatures, tables, texts, etc., whose security must be protected. In this paper we are performing image authentication of grayscale images. Grayscale image has two gray values i.e foreground and background. Grayscale images look like binary ones. So, we can call a grayscale image as binary like grayscale image. Binary image consists of two colors black and white. Using binary images can cause some problems. As the binary images are simple in nature many unpleasant strokes can encounters. So using grayscale images can solve the problem of visual quality which the binary one cannot does. Many conventional methods have been proposed for authentication of grayscale images. In our proposed method, the image is first watermarked and divided into shares using Shamir secret sharing scheme. Later, those shares are reconstructed using inverse Shamir secret sharing scheme and watermark has been extracted if the image is authentic. Data loss during transmission are marked as gray blocks. Grayscale cheque image II. DIGITAL WATERMARKING Digital watermarking is a technique for inserting a watermark into an image, which is been later extracted or detected for identification and authentication purposes. A watermark is a form of text or image that is been embedded in to the paper for its evidence of authenticity. The extension of this concept is Digital watermarking. Watermarks are of two kinds: visible and invisible. It is related to steganography but, in watermarking technique the information that is hidden is usually related to the cover object. It is used for content authentication and copyright protection. Digital watermarking is defined as the digital signal that is embedded in audio, video or image with some information related to those and which cannot be eliminated easily. www.ijmer.com 354 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359 ISSN: 2249-6645 The process to embed a watermark is done in three steps: 1. Embedding watermark: In this algorithm it accepts the data to be embedded and produces watermark signal. 2. Attack on image: The watermark signal is transmitted and during transformation the attacker may or may not modify the image. If there is a modification then it is said to be an attack. 3. Detection of watermark: This algorithm is applied when the attacked signal to extract watermark from it. If the signal undergoes any modification then the information is also carried in the copy. If suppose, the signal doesn’t undergo any modification the watermark is present and it can be extracted. We first embed the watermark in to the original or cover image and make it a watermarked image and then after transformation we extract the watermark and check whether it has been undergone any sort of manipulations or attacks. Finally, we extract the watermark from the image to prove its authenticity. To avoid illegal access to the watermark a secret key as shown in the figure is used during the embedding process and extraction process of watermark. Watermarking techniques are used for copyright protection, broadcast monitoring, authentication, tamper detection and digital finger printing, content protection, content labeling. A watermark may be: 1.Robust: As the names mentioned it is strong and overcomes sevreal processing attacks. For example: filtering, compression 2.Fragile: It is distorted under slight changes. 3.Semi-fragile: It breaks under the changes performed by the user i.e exceeding specific threshold. Block diagram of watermarking III. SECRET SHARING METHOD During decades some scientists (eleven) are working on a secret project. They wish to lock up the documents and details of the secret project in a cabinet so that the cabinet can be opened if and only if six or more of the scientists are present. So, What is the smallest number of locks needed to open the documents? What is the smallest number of keys to the locks each scientist must carry to view the documents? www.ijmer.com 355 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359 ISSN: 2249-6645 The method of secret sharing is sharing a secret among group of participants. It is come to know that previously there are some eleven scientists who are working on a secret project for which they wanted to lockup their documents regarding the project with some secret code. So there the problem arises. They want those documents to be enclosed to the cabinet only if six or more scientists opens it with their individual secret key share. It means cabinet consisting of eleven members having their own individual unique secret key. But in order to access the documents of project a single secret share key not sufficient and at the same time it is not necessary to have all eleven secret share keys to open the documents. So for this Shamir proposed an algorithm named Shamir secret sharing algorithm where a single secret is shared among group of participants. Here participants are the authorized users who access to the data. The algorithm goes in the following manner: 1. Divide the data d in to n pieces i.e d1, d2, d3, d4,…………….dn 2. It is distributed among n participants. 3. The secret or data can be reconstruct able only if k pieces are present. 4. Even k-1 pieces are not acceptable. So he proposed a scheme called (k,n) threshold scheme. Where k is the minimal number of users or participants to reconstruct the key and n is the total number of divided pieces of data or secret. For example: a company wants to sign the checks by the executives in a digitized manner. At the same time company’s signature must be secret, so the if we give the company’s signature to all the executives then it is pruned to privacy attacks. So in order to solve this problem they are using (k,n) threshold scheme i.e they are putting a minimal number of key as 3 i.e (3,n) they are given a magnetic card with that. The company president is given 3 keys, vice president is given 2 keys and the executive is given a single one. So in order to prune to any attacks the executive must have still 2 keys and the vice president must have still one more key. Secret sharing method IV. PROPOSED METHOD Original image is authenticated by embedding a watermark which is invisible. Later, the image is divided into shares using Shamir secret sharing method and the divided shares are transferred and by using inverse Shamir secret sharing method we form the original image and the watermark is extracted from that image to authenticate. Embedding watermark: An image A is selected form set of standard images and let it be the base image on which a watermark is embedded. www.ijmer.com 356 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359 ISSN: 2249-6645 Algorithm: Step 1: Let B be a grayscale image to be watermarked. Step 2: Use a pseudo-random number generator with a known seed to generate a set of non repeating pseudo-random locations L within the grayscale image B. Step 3: Clear all pixels of B that belong to L, obtaining B*. Step 4: Compute the fingerprint H .H(B*). Step 5: perform exclusive-or H for getting the marked fingerprint H*. Step 6: Encrypt H* with the secret key or private key thus generating the MAC/DS S. step 7: Insert S into the set of pixels L, generating the watermarked image B Diving the shares: We apply (k,n) threshold secret scheme for dividing the watermark image into shares. The following is the algorithm for dividing the watermark image in to shares. Algorithm: Step 1: Take secret d in the form of an integer, number n of participants, and threshold k<=n. Step 2: Choose a random prime number p larger than d. Step 3: Select k-1integer values c1,c2,c3,…… ….,ck-1 range of 0 through p-1 . Step 4: Select n distinct real values x1,x2,x3…… …..,xn Step 5: Use the following (k-1) degree polynomial to compute n function values F(xi ) , called partial shares for i=1,2,….n i.e 𝐹 𝑥 𝑖 = 𝑑 + 𝑐1 𝑥 𝑖 + 𝑐2 𝑥 𝑖 2 + ⋯ 𝑐 𝑘 −1 𝑥 𝑖 𝑘−1 𝑚𝑜𝑑 𝑝 Step 6: Deliver the two-tuple (xi,F(xi )) as a share to the i participant where i=1,2,3,…n . Reconstructing the shares: We reconstruct the shares by applying inverse Shamir secret sharing scheme. The following is the algorithm reconstructing the watermarked image. Algorithm : Step 1: k shares collected from the n participants and the prime number p with both k and p Step 2: Use the k shares 𝑥1 , 𝐹 𝑥1 , 𝑥2 , 𝐹 𝑥2 , … , (𝑥 𝑘 , 𝐹 𝑥 𝑘 ) to 𝐹 𝑥𝑗 = 𝑑 + 𝑐1 + 𝑐2 𝑥𝑗 2 + ⋯ + 𝑐 𝑘 −1 𝑥𝑗 𝑘−1 𝑚𝑜𝑑 𝑝 where j=1,2,….k Step 3: Solve the k equations above by Lagrange’s interpolation to obtain d as follows 𝑘 −1 𝑥2 𝑥3 … 𝑥 𝑘 𝑑 = −1 [𝐹(𝑥1 ) 𝑥1 − 𝑥2 ) 𝑥1 − 𝑥3 … (𝑥1 − 𝑥 𝑘 ) 𝑥1 𝑥3 … 𝑥 𝑘 +𝐹 𝑥2 +⋯ (𝑥2 − 𝑥1 ) 𝑥2 − 𝑥3 … (𝑥2 − 𝑥 𝑘 ) 𝑥1 𝑥2 … 𝑥 𝑘−1 +𝐹 𝑥 𝑘 ] 𝑚𝑜𝑑 𝑝 (𝑥 𝑘 − 𝑥1 ) 𝑥 𝑘 − 𝑥2 … (𝑥 𝑘 − 𝑥 𝑘−1 ) Step4: Compute c1 through ck-1 by expanding the following equality and comparing the result with Step 2 while regarding variable x in the equality below to be xj 𝑥 − 𝑥2 𝑥 − 𝑥3 … (𝑥 − 𝑥 𝑘 ) 𝐹 𝑥 = [𝐹(𝑥1 ) (𝑥1 − 𝑥2 ) 𝑥1 − 𝑥3 … (𝑥1 − 𝑥 𝑘 ) 𝑥 − 𝑥1 𝑥 − 𝑥3 … (𝑥 − 𝑥 𝑘 ) +𝐹 𝑥2 +⋯ (𝑥2 − 𝑥1 ) 𝑥2 − 𝑥3 … (𝑥2 − 𝑥 𝑘 ) 𝑥 − 𝑥1 𝑥 − 𝑥2 … (𝑥 − 𝑥 𝑘−1 ) +𝐹 𝑥 𝑘 ] 𝑚𝑜𝑑𝑝 (𝑥 𝑘 − 𝑥1 ) 𝑥 𝑘 − 𝑥2 … (𝑥 𝑘 − 𝑥 𝑘 −1 ) www.ijmer.com 357 | Page
  • 5. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359 ISSN: 2249-6645 Process for authentication of grayscale cheque image Extraction of watermark: Algorithm: Step 1: Let X be a watermarked image. Use the same pseudorandom number that has been applied in insertion process to generate again the same set of non repeating pseudo-random locations L where the watermark has been inserted. Step 2: Let X* be the image obtained from X by clearing all pixels in L. Using the same hashing function H compute the fingerprint H .H(X*). Step 3: Extract the watermark from X by scanning pixels in L and decrypt the result using the secret key and obtain the decrypted data D. Step 4: By applying exclusive-or H with D, obtaining the check image C. Step 5: If C and A are equal, the watermark is verified. Otherwise, the image X has been modified. The following is the procedure for authentication. V. EXPERIMENTAL RESULTS The following are the experimental results performed on grayscale cheque image. A cover image is taken and performed the authentication process. Firstly, embed a water in to the image by using algorithm 1. (a) www.ijmer.com 358 | Page
  • 6. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-354-359 ISSN: 2249-6645 (b) Experimental results for cheque image (a) cover image or original image (b) embedded watermark image Later, the image is divided in to shares using Shamir secret sharing method. The shares are reconstructed using inverse Shamir secret sharing scheme and form a original or cover image. Then, check for the watermark embedded in the image. The image is said to be authentic if watermark is present. Extract the watermark. There occurs, a loss of data during the transmission process, which is marked as gray blocks as shown in the figure. If there is no data loss during transmission the original image is recovered. The following are the figures related to the image with tampering i.e the tampering is shown in the form of gray blocks and without tampering i.e original or cover image. (c) (d) (c) Image with tampering shown in the form of gray blocks (d) original or cover image without tampering. VI. CONCLUSION In, this paper a new image authentication using secret sharing method is proposed. The grayscale cheque image is watermarked first and that watermark is divided in to shares using Shamir secret sharing method. Later, the shares are reconstructed using inverse Shamir secret sharing scheme and the watermark is extracted. Data loss during the transmission is shown in the form of gray blocks. This can be performed for color images also. www.ijmer.com 359 | Page