Loading

Secure Image Authentication of a Grayscale Document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capability
S. Kavitha Murugesan1, Shanavas K. A2

1Mrs. S.Kavitha Murugesan, Head, Department of Computer Science, Vedavyasa Institute of Technology, Malappuram (Kerala), India.
2Mr. Shanavas K A, M.Tech Student, Department of Computer Science,Vedavyasa Institute of Technology, Malappuram (Kerala), India.
Manuscript received on 10 May 2013 | Revised Manuscript received on 18 May 2013 | Manuscript Published on 30 May 2013 | PP: 232-235 | Volume-2 Issue-6, May 2013 | Retrieval Number: F0847052613/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper we proposes a new authentication method which is based on secret sharing technique and logistic map with repairing capability of data, via the use of the Portable Network Graphics image. In this approach each block of a grayscale document image generate an authentication signal, which combine with binarized block content, is transformed into several shares using Shamir secret sharing scheme. The shares generated from the binarized block contents are then embedded into an alpha channel plane. The original grayscale image combine with alpha channel plane to form a PNG image; this PNG image encrypted by using chaotic logistic map to form a stego image. Stego image received in the receiver side is decrypt and checks the authentication. If the authentication process fails then repairing is done in each tampered block, after collecting two shares from unmarked block using reverse Shamir scheme. Security of data provided by sharing of data in the alpha channel and encrypting the stego image.
Keywords: Image Authentication, Secret Sharing, Data Repair, PNG (Portable Network Graphics), Encryption, Logistic Map.

Scope of the Article: Image analysis and Processing