Akshata M. Joshi, Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, J. Katti
{"title":"基于视觉秘密共享的灰度取证图像认证","authors":"Akshata M. Joshi, Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, J. Katti","doi":"10.1109/ICEDSS.2016.7587784","DOIUrl":null,"url":null,"abstract":"Digital crime and constantly emerging software technologies is growing at a rate that far surpasses the various defensive measures. Analysis of computer generated content as an evidence, authentication of digital images can provide support for clue analysis. Our proposed method aims at assisting investigators for the authentication of such clues. Such evidence can also not be proven as tampered or false images as the source is authentic. In the proposed method by using VSS we introduce a method of authentication by using a Verification image to determine the share generation. This is a color image, and the image to be protected is in gray scale. This method of bit stacking of RGB components is used to create the cipher bits and make the authentication process simple yet powerful.","PeriodicalId":399107,"journal":{"name":"2016 Conference on Emerging Devices and Smart Systems (ICEDSS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Authentication of grayscale forensic image using visual secret sharing\",\"authors\":\"Akshata M. Joshi, Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, J. Katti\",\"doi\":\"10.1109/ICEDSS.2016.7587784\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital crime and constantly emerging software technologies is growing at a rate that far surpasses the various defensive measures. Analysis of computer generated content as an evidence, authentication of digital images can provide support for clue analysis. Our proposed method aims at assisting investigators for the authentication of such clues. Such evidence can also not be proven as tampered or false images as the source is authentic. In the proposed method by using VSS we introduce a method of authentication by using a Verification image to determine the share generation. This is a color image, and the image to be protected is in gray scale. This method of bit stacking of RGB components is used to create the cipher bits and make the authentication process simple yet powerful.\",\"PeriodicalId\":399107,\"journal\":{\"name\":\"2016 Conference on Emerging Devices and Smart Systems (ICEDSS)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Conference on Emerging Devices and Smart Systems (ICEDSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEDSS.2016.7587784\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Conference on Emerging Devices and Smart Systems (ICEDSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEDSS.2016.7587784","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication of grayscale forensic image using visual secret sharing
Digital crime and constantly emerging software technologies is growing at a rate that far surpasses the various defensive measures. Analysis of computer generated content as an evidence, authentication of digital images can provide support for clue analysis. Our proposed method aims at assisting investigators for the authentication of such clues. Such evidence can also not be proven as tampered or false images as the source is authentic. In the proposed method by using VSS we introduce a method of authentication by using a Verification image to determine the share generation. This is a color image, and the image to be protected is in gray scale. This method of bit stacking of RGB components is used to create the cipher bits and make the authentication process simple yet powerful.