Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
نویسندگان
چکیده
An authentication scheme that uses rehashing and secret sharing methods to verify the reality of a color image’s content is proposed in this paper. First, the proposed scheme uses Shamir’s secret sharing method to share image features. Second, the proposed scheme innovatively utilizes the rehashing method to overcome easy collisions of the random numbers to enhance the effectiveness against attacks. Third, the proposed method utilizes Portable Network Graphics images to hide authentication messages. Using the rehashing method, the collisions take up little in address space, making the process suitable for processing authentication messages. The experimental results indicated that the proposed scheme had very low false acceptance and rejection ratios and verified that the rehashing method can be used in image authentication applications.
منابع مشابه
An Authentication and Recovery method for color Images
With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharin...
متن کاملA data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding
A new data hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is proposed. The coefficients of the polynomial used by the Shamir’s method are taken as carriers to carry given data. The data to be hidden then are transformed into partial shares and embedded into the alpha-channel plane of a cover PNG image. Undesired white noise created in the resulting stego-i...
متن کاملAuthentication of Grayscale Images and Data Repairing Using Secret Sharing Method
Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...
متن کاملTriple Key Chaotic Encryption And Secret Sharing-Based Method For Authentication Of Color Document Images Via The Use Of The Png Image With A Data Repair Capability
In this paper for improving the security of data transmission we are introducing triple key chaotic encryption technique .In addition to this authentication method based on secret sharing technique with a data repair capability is being introduced. Using Shamir secret sharing scheme shares arebeing created from the authentication signal generated for each block of document image alongwith the b...
متن کاملAuthentication of Grayscale Document Images by using PNG Image with a Data Repair Capability
Digital image is a form for preserving vital information. However, with available digital technologies, one can easily make the visually undetectable modifications to the contents of digital images. Hence ensuring the robustness of a digital image is thus a challenge. This paper proposes an approach for secret sharing of information Shamir scheme is used while sharing a document image and at th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015