(3, 3) Visual Cryptography for Online Certificate Authentication (original) (raw)

Secure Authentication Using Visual Cryptography

2015

Visual Cryptography is a cryptographic technique which allows visual information (text, picture, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Visual Cryptography deals with any type of secrets such as printed or pictures, etc. These secrets are delivered into the system in a digital (image) form. The secrets which are in a digital form divided into different parts based on the pixel of the digital secret. These parts are called shares. To visualize the secret, the shares are then overlapped correctly.This paper introduces secure authentication using Visual Cryptography. In any authentication system the major problem is the authenticity of the customer. Due to unavoidable hacking of the database on the internet, it is always difficult to trust the information on the internet. To solve this authentication problem, we are discussing with the two most important topics based on image processing and visual cryptography.

A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY

The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field.

Novel authentication system using visual cryptography

2011 World Congress on Information and Communication Technologies, 2011

An array of encryption techniques has been proposed for providing data security. However, most of the traditional cryptography methods require complex algorithms for encryption and decryption. Visual cryptography is a technique which provides confidentiality without any cryptographic knowledge or complex computations. Visual information (e.g. printed text, handwritten notes, pictures, etc.) is encrypted by decomposing it into several images, called shares, in such a way that decryption can be done by human visual system with stacking of the shares. Some important goals while developing a Visual Cryptography scheme is to have (i)optimum number of shares, (ii)good quality of reconstructed image and (iii)keeping the size of share small. This paper aims to provide a comparative study of various Visual Cryptographic schemes based on pixel expansion, no of shares, size and quality of reconstructed image, etc and some real-life applications of visual cryptography. A new authentication system has been proposed which uses the technique of visual cryptography to improve the security level of existing schemes. The application of the system in financial domain is discussed.

Securing and Secrete Image Sharing Using Visual Cryptography Scheme

s-To verify identity of person his /her physical or behavioural characteristics can be use,this strategy is called as Biometrics. Preservation of privacy of digital biometric data such as iris,face images etc. which stored in central database becomes more essential. This paper introduced the new visual cryptographic technique that allows encryption of visual information such that decryption can perform using human visual system hence cryptography computation does not required any extra hardware and software. In visual cryptography secrete image is encrypted into number of shares which independently can not reveal information about original image. For getting information about original image all sheets must be available simultaneously.

Review of Visual Cryptography

Cryptography is a technique used for secure transformation of information that is secret data in presence of unauthenticated interceptor. Visual Cryptography Scheme is a method that converts secret data like images or written text into binary images and then encodes them into n images, also called as shares of images. For decoding only some of the n shares or all n shares are required which are stacked on each other. The purpose of this review paper is to make clear the idea of visual cryptography schemes and continued work in the area.

A Review on Various Visual Cryptography Schemes

Cryptography is study of transforming information in order to make it secure from unintended recipients or use. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts visual information (picture, printed text, handwritten notes) such that decryption can be performed using human visual system. The idea is to convert this visual information into an image and encypher this image into n different shares (known as sheets). The deciphering only requires selecting some shares out of n shares. The intent of this review paper is to contribute the readers an overview of the basic visual cryptography scheme constructions as well as continued work in the area. In inclusion, we also review some applications that take advantage of such secure system.

Survey on Security Related to Visual Cryptography

The chance of the question paper getting leaked is increasing day by day and a solution is proposed to solve this problem. Elliptic Curve Cryptography (ECC) along with QR code will be a solution to this problem. QR code (Quick Response) is the trademark for a type of matrix (two dimensional) barcode. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary and kanji) to store data efficiently. Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security. ECC technique involves conversion of text to cipher text. The cipher text is then converted to a QR Code. During decryption, the QR code is scanned and the content is decrypted. Only the application can read the original data shared in QR code since the data is encrypted with ECC with the integrity being maintained. An additional feature of linking the student's answer sheet with hall ticket and question paper is also added to avoid paper frauds and making re-evaluation a simpler task. Once the evaluation is done, the examiner can then scan the code and enter the mark in the student database which is maintained by the university.

Visual Cryptography Schemes Using Secrete Sharing: Survey Report

2013

Visual cryptography is a cryptographic technique which encrypt a visual information (e.g. text, handwritten notes and pictures) in such a way that the decryption done by the human visual system. It needs neither cryptography knowledge nor complex computation. For security purposs, it also ensures that hacker cannot obtain any clues about a secret image from individual sharess. Naor and Shamir proposed the basic model of visual cryptography in 1994. Visual cryptography scheme eliminates complex computation problem at the decryption the secret images can be restored by stack operation. The important issue of visual cryptography is quality of relevant image. Performance of visual cryptography scheme depends, such a number of image(single, multiple), types of image(binary, gray, color),share generation(meaningful, meaningless), security, accuracy pixel expansion, complexity,) encrypted by the scheme.

IJERT-Various Visual Secret Sharing Schemes- A Review

International Journal of Engineering Research and Technology (IJERT), 2012

https://www.ijert.org/various-visual-secret-sharing-schemes-a-review https://www.ijert.org/research/various-visual-secret-sharing-schemes-a-review-IJERTV1IS10511.pdf Visual cryptography is a new technique which provides information security by using simple algorithm instead of the complex algorithms. Aim to focuses on the encryption techniques that are used in each scheme. This technique allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system without lot of computational power. This technique encrypts a secret image into shares such that stacking a sufficient number of shares reveals the secret image.

A Survey On Privacy Protection of Secret Image using Visual Cryptography Technique

Visual cryptography was presented as a procedure permitting the visual data to be encrypted such that the decryption can be completed by human visual framework, without the guide of PCs visual cryptography discover applications in different divisions, for instance, E-voting for giving encrypted receipts. The traditional visual cryptography plans utilize pixel extension. In pixel development, each offer is m times the span of the secret image. In this manner, it can prompt the trouble in conveying these offers and utilization of more storage space. Visual cryptography is the scheme utilized for the discharge offer of image in that secret share the first picture is isolated into number of offers and that offer is appropriated to same number of members as each to one. That secret image is recoverable just when member share their secret. Security has turned into an indivisible issue not just in the fields entirely identified with secure communications but fields that have anything to do with storage of data as well.