A Color Image Authentication System

2013 ◽  
Vol 380-384 ◽  
pp. 2925-2929
Author(s):  
Yue Rong Lei ◽  
Xu Zhan ◽  
Ling Yan Du ◽  
Hui Ming Zeng ◽  
Jian Ling Chen

Image authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image volatiles the authenticity of image-ownership. In this regard the digital watermarking-based image authentication system is studied. A color image authentication system is proposed. This system converts a color image into a grayscale image, and divides the grayscale image into 8*8 small pieces. Each small piece is made into DCT transform and extracted low frequencies to form the watermark. Then, the original image uses LSB algorithm and hash algorithm in watermark image to form authentication code. The system makes the authentication code as watermark information to embed watermark. The system is made in experiment. The result shows the system has good imperceptibility.

2015 ◽  
Vol 738-739 ◽  
pp. 533-537
Author(s):  
Xu Zhan ◽  
Yue Rong Lei ◽  
Hui Ming Zeng ◽  
Jian Ling Chen

In this paper, we study compressed sensing algorithm and image authentication algorithm, present a grayscale image vulnerability authentication system based on compressed sensing. The system extracts the original grayscale image edge information by prewitt algorithm and observes the edge information by compressed sensing algorithm of OMP to generate the observation matrix . Then, the system scrambles the observation matrix by arnold transform algorithm and embeds it into the original grayscale image by singular value decomposition algorithm. We make experiment in order to test the system. The result is shown that the algorithm has good imperceptibility and can resist copying attack.


Author(s):  
Lei Yuerong ◽  
Zhan Xu ◽  
Du Lingyan ◽  
Zeng Huiming ◽  
Chen Jianling

2013 ◽  
Vol 380-384 ◽  
pp. 2920-2924
Author(s):  
Xu Zhan ◽  
Yue Rong Lei ◽  
Ling Yan Du ◽  
Hui Ming Zeng ◽  
Jian Ling Chen

This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. A grayscale image fragile watermark authentication system in spatial-domain is proposed. First it preprocesses the watermark image and resizes it to a quarter of the size of the original image. Then, it generates a random key matrix K and 128bit message authentication code from the original image. It replaces the 128bit message authentication code for the former 128bit of K to obtain a new key matrix KH. Then, it calculates the embedded position P=KHi xor (b7,b6,b5.b4) i MOD 3. b7,b6,b5,b4 are the high 4 bits of the original images pixel. It embeds the watermark image according to P value to the lower 4 bits of the original images pixel. The system is made in experiment. The result shows the system has good imperceptibility.


2019 ◽  
Vol 2019 (1) ◽  
pp. 95-98
Author(s):  
Hans Jakob Rivertz

In this paper we give a new method to find a grayscale image from a color image. The idea is that the structure tensors of the grayscale image and the color image should be as equal as possible. This is measured by the energy of the tensor differences. We deduce an Euler-Lagrange equation and a second variational inequality. The second variational inequality is remarkably simple in its form. Our equation does not involve several steps, such as finding a gradient first and then integrating it. We show that if a color image is at least two times continuous differentiable, the resulting grayscale image is not necessarily two times continuous differentiable.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Lina Zhang ◽  
Xuan Dang ◽  
Li Feng ◽  
Junhan Yang

Due to the widespread adoption and popularity of digital images in distributed storage, Secret Image Sharing (SIS) has attracted much attention. However, preventing the cheating of shares is an important problem that needs to be solved in the traditional SIS scheme. An adversary without image shares may participate in the restoration phase as a share owner. In this phase, the adversary can obtain real shares or prevent recovering real images by submitting fake shadows. Our schemes are based on the original Thien-Lin’s scheme. In the scheme I, we use some XOR operations to get two authentication codes through all secret pixel values to achieve a lightweight and fast-calculated authentication scheme for cheating prevention. This scheme is suitable for small devices with limited resources. In scheme II, we use a hash algorithm to generate the authentication code. This scheme is suitable for environments with larger storage space and higher security levels. Since all pixel values are involved in the authentication in our proposed schemes, it can prevent fake shadow images from cheating. Meanwhile, the shadow size is almost the same as the original Thien-Lin’s scheme. Experimental results and theoretical analysis show that the proposed schemes are feasible and effective.


Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


In many image processing applications, a wide range of image enhancement techniques are being proposed. Many of these techniques demanda lot of critical and advance steps, but the resultingimage perception is not satisfactory. This paper proposes a novel sharpening method which is being experimented with additional steps. In the first step, the color image is transformed into grayscale image, then edge detection process is applied using Laplacian technique. Then deduct this image from the original image. The resulting image is as expected; After performing the enhancement process,the high quality of the image can be indicated using the Tenengrad criterion. The resulting image manifested the difference in certain areas, the dimension and the depth as well. Histogram equalization technique can also be applied to change the images color.


Sign in / Sign up

Export Citation Format

Share Document