NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
JAVA PROJECTS LIST--2013
JAVA 2013 IEEE PAPERS
A Secret-Sharing-Based Method for Authentication of
Grayscale Document Images via the Use of the PNG Image with a Data Repair
Capability
Abstract:
A
new blind authentication method based on the secret sharing technique with a
data repair capability for grayscale document images via the use of the
Portable Network Graphics (PNG) image is proposed. An authentication signal is
generated for each block of a grayscale document image, which, together with
the binarized block content, is transformed into several shares using the
Shamir secret sharing scheme. The involved parameters are carefully chosen so
that as many shares as possible are generated and embedded into an alpha
channel plane. The alpha channel plane is then combined with the original
grayscale image to form a PNG image. During the embedding process, the computed
share values are mapped into a range of alpha channel values near their maximum
value of 255 to yield a transparent stego-image with a disguise effect. In the
process of image authentication, an image block is marked as tampered if the
authentication signal computed from the current block content does not match
that extracted from the shares embedded in the alpha channel plane. Data
repairing is then applied to each tampered block by a reverse Shamir scheme after
collecting two shares from unmarked blocks. Measures for protecting the
security of the data hidden in the alpha channel are also proposed. Good
experimental results prove the effectiveness of the proposed method for real
applications.
Existing System:
In general, the image authentication problem is difficult for a binary
document image because of its simple binary nature that leads to perceptible
changes after authentication signals are embedded in the image pixels. Such
changes will arouse possible suspicions from attackers. A good solution to such
binary image authentication should thus take into account not only the security
issue of preventing image tampering but also the necessity of keeping the
visual quality of the resulting image.
Proposed System:
In this paper, a method for the authentication of document images with an
additional self-repair capability for fixing tampered image data is proposed.
The input cover image is assumed to be a binary-like grayscale image with two
major gray values like the one shown in Fig. 1. After the proposed method is
applied, the cover image is transformed into a stego-image in the Portable
Network Graphics (PNG) format with an additional alpha channel for transmission
on networks or archiving in databases. The stego-image, when received or
retrieved, may be verified by the proposed method for its authenticity.
Integrity modifications of the stego-image can be detected by the method at the
block level and repaired at the pixel level. In case the alpha channel is
totally removed from the stego-image, the entire resulting image is regarded as
inauthentic, meaning that the fidelity check of the image fails.
Software
and Hardware Requirements
Hardware Required:
System : Pentium IV
Hard Disk : 80
GB
RAM : 512 MB
Software Required:
Operating
System : Windows
XP
Language : JAVA
Modules:
·
Access Image
·
Authentication Signal Creation
·
Authentication Signal Verification
·
Pixels Tampering
·
Tampering Pixels Recovery
No comments:
Post a Comment