Share Email Print
cover

Proceedings Paper

Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem
Author(s): N. Islam; W. Puech; R. Brouzet
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Multiplicative homomorphic properties of a cryptosystem can be used in various applications requiring security, protection and authentication e.g. digital fingerprinting, electronic voting, on line betting etc. Secret sharing between two or more parties exploiting multiplicative homomorphic property of RSA results into erroneous blocks while extracting the message. The generation of these erroneous blocks limits the capabilities of homomorphic properties of RSA to be used in its full extend. This paper provides three different approaches as solutions to the problem of erroneous blocks in image. These solutions are: mean value approach, shortest distance approach and image preprocessing approach. It has been observed that shortest distance approach results into good PSNR but it is computationally expensive. The best approach with high PSNR is image preprocessing approach before sharing process, which results into no erroneous blocks in the extracted image, thus no extra extraction techniques are required.

Paper Details

Date Published: 11 February 2011
PDF: 11 pages
Proc. SPIE 7880, Media Watermarking, Security, and Forensics III, 788004 (11 February 2011); doi: 10.1117/12.873319
Show Author Affiliations
N. Islam, LIRMM Lab., CNRS, Univ. Montpellier II (France)
W. Puech, LIRMM Lab., CNRS, Univ. Montpellier II (France)
R. Brouzet, I3M Lab., CNRS, Univ. Montpellier II (France)


Published in SPIE Proceedings Vol. 7880:
Media Watermarking, Security, and Forensics III
Nasir D. Memon; Jana Dittmann; Adnan M. Alattar; Edward J. Delp, Editor(s)

© SPIE. Terms of Use
Back to Top