CFP last date
20 December 2024
Reseach Article

An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities

by Ashwini V. Kurzekar, A. R. Mahajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 19
Year of Publication: 2014
Authors: Ashwini V. Kurzekar, A. R. Mahajan
10.5120/17113-7377

Ashwini V. Kurzekar, A. R. Mahajan . An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities. International Journal of Computer Applications. 97, 19 ( July 2014), 6-13. DOI=10.5120/17113-7377

@article{ 10.5120/17113-7377,
author = { Ashwini V. Kurzekar, A. R. Mahajan },
title = { An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 19 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number19/17113-7377/ },
doi = { 10.5120/17113-7377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:31.570556+05:30
%A Ashwini V. Kurzekar
%A A. R. Mahajan
%T An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 19
%P 6-13
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This is new authentication scheme based on the secret sharing method with a data repair capability for document type color images via the use of portable network graphics (PNG) image. And generate the authentication signals to each block of image, which together with the binarized block content, this authentication signals are transformed into a several shares using the secret sharing Scheme. The characters are carefully chosen from image so that many shares as possible are generated and embedded into an alpha channel plane. The alpha channel is combined with the original cover image to form a PNG image. While shares embedding process, the computed shares values are mapped into a range of alpha channel value near their maximum value of 255 to yield a transparent stego image. In the process of image authentication, the block in an image is marked as a tampered if the authentication signal computed from the current block content of a binary image does not match that extracted from the share embedded in the alpha channel plane. Data repair is applied to each tampered block after collecting two shares from unmarked block.

References
  1. H. Yang and A. C. Kot, "Pattern-based data hiding for binary images authentication by connectivity-preserving," IEEE Trans. Multimedia, vol. 9, no. 3,pp. 475–486, Apr. 2007.
  2. H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," IEEE Signal Process. Lett. vol. 13, no. 12, pp. 741–744, Dec. 2006.
  3. Y. Lee, J. Hur, H. Kim, Y. Park, and H. Yoon,"A new binary image authentication scheme with small distortion and low false negative rates," IEICE Trans. Commun. , vol. E90-B, no. 11, pp. 3259–3262, Nov. 2007.
  4. Meng Guo, Hongbin Zhang, "High capacity data hiding for binary image authentication," International Conference on System Science and Engineering (ICSSE) 2010.
  5. Y. Lee, H. Kim, and Y. Park, "A new data hiding scheme for binary image authentication with small image distortion," Inf. Sci. , vol. 179, no. 22, pp. 3866–3884, Nov. 2009.
  6. Y. Lee, J. Hur, H. Kim, Y. Park, and H. Yoon, "A new binary image authentication scheme with small distortion and low false negative rates," IEICE Trans. Commun. , vol. E90-B, no. 11, pp. 3259–3262, Nov. 2007.
  7. Min Wu, Bede Liu,"Data Hiding in Binary Image for Authentication and Annotation," IEEE TRANSACTIONS ON MULTIMEDIA, Vol. 6, No. 4, August2004.
  8. Min Wu and Bede Liu," Data Hiding in Image and Video: Part II—Designs and Applications," IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 12, No. 6, June 2003
  9. A. Shamir,"How to share a secret,"Commun. ACM, vol. 22, no. 11,pp. 612–613, Nov. 1979.
  10. W. H. Tasai, "Moment preserving thresholding: A new Approach", comput. vis. Graph. Image Proccss, vol. 29, pp. 377-393, Mar1985.
  11. C. C. Lin and W. H. Tsai, "Secret image sharing with steganography and authentication," J. Syst. Softw. , vol. 73, no. 3, pp. 405–414, Dec. 2004.
  12. H. Y. Kim and A. A?f, "Secure authentication watermarking for halftone and binary images," Int. J. Imag. Syst. Technol. , vol. 14, no. 4, pp. 147–152, 2004.
  13. C. H. Tzeng and W. H. Tsai, "A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement," IEEE Commun. Lett. , vol. 7, no. 9, pp. 443–445, Sep. 2003.
  14. W. H. Tasai, "Moment preserving thresholding: A new Approach", comput. vis. Graph, Image Proccssing, vol. 29, pp. 377-393, Mar1985.
  15. Z. M. Lu, D. G. Xu, and S. H. Sun, "Multipurpose image watermarking algorithm based on multistage vector quantization," IEEE Trans. Image Process. , vol. 14, no. 6, pp. 822–831, Jun. 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Image Authentication Data Hiding Secret Sharing Portable Network Graphics Data Repair stego image