Akshata M. Joshi, Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, J. Katti
{"title":"Authentication of grayscale forensic image using visual secret sharing","authors":"Akshata M. Joshi, Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, J. Katti","doi":"10.1109/ICEDSS.2016.7587784","DOIUrl":null,"url":null,"abstract":"Digital crime and constantly emerging software technologies is growing at a rate that far surpasses the various defensive measures. Analysis of computer generated content as an evidence, authentication of digital images can provide support for clue analysis. Our proposed method aims at assisting investigators for the authentication of such clues. Such evidence can also not be proven as tampered or false images as the source is authentic. In the proposed method by using VSS we introduce a method of authentication by using a Verification image to determine the share generation. This is a color image, and the image to be protected is in gray scale. This method of bit stacking of RGB components is used to create the cipher bits and make the authentication process simple yet powerful.","PeriodicalId":399107,"journal":{"name":"2016 Conference on Emerging Devices and Smart Systems (ICEDSS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Conference on Emerging Devices and Smart Systems (ICEDSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEDSS.2016.7587784","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Digital crime and constantly emerging software technologies is growing at a rate that far surpasses the various defensive measures. Analysis of computer generated content as an evidence, authentication of digital images can provide support for clue analysis. Our proposed method aims at assisting investigators for the authentication of such clues. Such evidence can also not be proven as tampered or false images as the source is authentic. In the proposed method by using VSS we introduce a method of authentication by using a Verification image to determine the share generation. This is a color image, and the image to be protected is in gray scale. This method of bit stacking of RGB components is used to create the cipher bits and make the authentication process simple yet powerful.