CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Slepian-Wolf Coding for Intrusion Identification System of Digital Images

by Megha Jain, Anamika Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 2
Year of Publication: 2014
Authors: Megha Jain, Anamika Jain

Megha Jain, Anamika Jain . Slepian-Wolf Coding for Intrusion Identification System of Digital Images. International Journal of Computer Applications. 107, 2 ( December 2014), 35-39. DOI=10.5120/18725-9958

@article{ 10.5120/18725-9958,
author = { Megha Jain, Anamika Jain },
title = { Slepian-Wolf Coding for Intrusion Identification System of Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 2 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { },
doi = { 10.5120/18725-9958 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:40:01.186446+05:30
%A Megha Jain
%A Anamika Jain
%T Slepian-Wolf Coding for Intrusion Identification System of Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 2
%P 35-39
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

With the rapid growing of the internet technology it has been observed that the use of digital image has become the essential part in many applications. The digital image is used in various field like medical, defense, historical applications etc. While transmitting the image on internet which is such an unsafe communication medium because of the number of unauthenticated users present on the internet the image can be distorted easily with the help of several editing tools and its availability to all the users. Therefore it is essential to authenticate the image before transmitting and on the receiving side check the integrity of the image as well. Several authentication techniques have been used for image authentication. In this work non-regular Low density Parity Check (LDPC) are used for encoding the image and simultaneously encryption is done for authenticating the image on the sender side and check the authenticity of the image on the receiver side as well.

  1. Kostopoulos et al, "Color Image Authentication Based On Self Embedding Technique" IEEE 2002.
  2. Hossein Pishro-Nik, and Faramarz Fekri, "On Decoding of Low-Density Parity-Check Codes Over the Binary Erasure Channel " IEEE, Vol. 50, No. 3, MARCH 2004.
  3. Chi-Shiang Chan, Chin-Chen Chang ,"An efficient image authentication method based on Hamming code" Elsevier Page no. 681 – 690 2007.
  4. Yao-Chung Lin, David Varodayan, and Bernd Girod, "Image Authentication Based On Distributed Source Coding" IEEE Vol 3 2007.
  5. Marco Tagliasacchi , Giuseppe Valenzise, Stefano Tubaro , "Hash-based identification of sparse image tampering" IEEE July 3, 2008.
  6. Yi-Kai Lin, Chih-Lung Chen, Yen-Chin Liao, and Hsie-Chia Chang "Structured LDPC Codes with Low Error Floor Based on PEG Tanner Graphs" IEEE 2008.
  7. Nabin Ghoshal, J. K. Mandal, A. Khamrui "A Framework for Block based Image Authentication (FBIA)" IEEE Page:343 - 348 Dec. 2009.
  8. Piming Ma, Kyung Sup Kwak "UEP-LDPC Codes with High Spectral Efficiency in Image Transmission" IEEE 2009.
  9. Jianrong Wang, Rongke Liu, Hongbo Zhao "Low Complexity DCT-Based Distributed Source Coding with Gray Code for Hyperspectral Image" IEEE 2009.
  10. Arash Habibi Lashkari et. al " A complete comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms" IEEE 2009.
  11. GAO Bao-jian, DU Min "A binary text image authentication algorithm based on short digital signature" IEEE 2010.
  12. M Sreelatha, M Shashi, M Roop Teja, M Rajashekar And K Sasank "Intrusion Prevention by Image Based Authentication Techniques" IEEE 2011.
  13. Jose Antonio Mendoza Noriega, Brian M. Kurkoski, Mariko Nakano Miyatake, and Hector Perez Meana "Image Authentication and Recovery Using BCH Error-Correcting Codes" IJC Issue 1, Volume 5, 2011.
  14. Md. Shaik Sadi "Fingerprint Verification: A Comparison of Three Approaches" IEEE 2011.
  15. Phat Nguyen Huu, Vinh Tran-Quang, and Takumi Miyoshi "Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks" IEEE 2012.
Index Terms

Computer Science
Information Sciences


Distributed Source Coding Linear Block Codes Non Regular LDPC Parity Check Matrix Source Coding.