5 research outputs found
A HARMONIC SECRET SHARING AND PERMUTATION BASED DOCUMENT IMAGE AUTHENTICATION
ABSTRACT In this paper, we are presenting blind authentication method which is based on harmonic secret sharing technique and permutation with data repair capability and error localization for document image and verification of its owner, with the use of the PNG image. We are generating a block based authentication from document image, and transform it into several shares using the Shamir secret sharing scheme, and embedding these shares into an alpha channel plane. The alpha channel plane is permuted with secret key and combined with the original image to form a PNG image. In the process of document image authentication, if the authentication signal computed from the current block content does not match the one extracted from the shares embedded in the alpha channel plane, a document image block localize as tamper block ,then a repairing process is implement else a document image block is authentic. In the repairing process a reverse Shamir technique is implementing for each tampered block after collecting any two or more shares from unmarked blocks. Also, owner verification process is implementing based on the secret key used for the permutation
Alpha Channel Fragile Watermarking for Color Image Integrity Protection
This paper presents a fragile watermarking algorithm`m for the protection of the integrity of color images with alpha channel. The system is able to identify modified areas with very high probability, even with small color or transparency changes. The main characteristic of the algorithm is the embedding of the watermark by modifying the alpha channel, leaving the color channels untouched and introducing a very small error with respect to the host image. As a consequence, the resulting watermarked images have a very high peak signal-to-noise ratio. The security of the algorithm is based on a secret key defining the embedding space in which the watermark is inserted by means of the Karhunen–Loève transform (KLT) and a genetic algorithm (GA). Its high sensitivity to modifications is shown, proving the security of the whole system
User acceptance of systems for archiving and securing degree certificates and related documents.
Doctoral Degree. University of KwaZulu-Natal, Durban.Changing economic circumstances have led to the investigation of alternative solutions to
economic problems. This has had an impact on communities who see academic qualifications
as a solution to securing employment. With the increase in job opportunities requiring suitable
qualifications, an increase in ‘qualification competition’ has occurred. This has resulted in
academic qualifications being seen as a ‘key’ to securing employment. Unfortunately, such a
perception has caused many individuals to pursue opportunities using ‘quick fix’ solutions and
acquiring academic qualifications through breaches of security around these qualifications.
Higher Education is one of the many sectors that is battling with security issues of this type. In
South Africa alone, for the past few years, there has been a considerable increase in cases of
persons who have been found to have faked either their senior certificates or university
degrees, including doctorates. This is becoming a growing concern as it taints the image of the
higher education sector in South Africa, and places at risk international relationshipsin higher
education and beyond that the country has enjoyed over many years.
Many education sectors are based on security systems in which the basic data of a person’s
name and surname, for example, are retained when they graduateand the qualification they
have legitimately received is recorded. This data is used when a re-print of a certificate is
required. Though this method has been working well for some time, it has developed major
flaws, in line with the sophistication of information and communications technology in
general. This applies especially to the ability to edit e-versions of a certificate using image
processing software. Thus, proper verification of the data captured in an e-version or hardcopy
of a certificate (when reprinted, for example), represents an increasing risk, and, in some
cases, results in a breach of security. Furthermore, some individuals have found ways to e-edit
and print their own certificates, which look effectively identical to the authenticated
certificates.
While the emerging trend in various sectors is to store all data using the appropriate technology
tools as a security measure for protecting information, organizations are becoming exposed to
cybercrimes. As a result, data security has increasingly become a cause for concern. What is
most disturbing, is that computer security breaches have increased, and in many cases, shown
to be the result of ‘insider misuse and abuse’ of the information security measures established
by an organization. It is for this reason that the current study and the work reported in this
thesis has been undertaken and involves a focus on understanding what causes users to accept
and follow an organization’s information systems security measures. The study is informed by the Unified Theory of Acceptance and Use of Technology (UTAUT),
as a framework to explore securing and archiving academic transcripts at the University of
KwaZulu-Natal (UKZN). The results showed that the intention of the UKZN staff to use the
system positively, relates to their performance expectancy, effort expectancy, social influence
and facilitating conditions. The use of UTAUT in a mixed methods study within an academic
environment assesses the existing measures of securing and archiving academic transcripts and
identifies various weaknesses in the current system. Based on the findings of the study, the
steganographic method is demonstrated and suggested as an improved method of securing and
archiving academic certificates at UKZN.
The original contribution is an in-depth study at UKZN that answered the user acceptance
research questions and demonstrated the practical application of the steganographic method in
securing and archiving data