An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review

نویسندگان

  • Pallavi V Chavan
  • Anjali R Mahajan
چکیده

This paper introduces the idea of hierarchical visual cryptography. Authentication is the important issue over the internet. This paper describes a secured authentication mechanism with the help of visual cryptography. Visual cryptography simply divides secret information in to number of parts called shares. These shares are further transmitted over the network and at the receiving end secrets are revealed by superimposition. Many layers of visual cryptography exist in proposed system hence called hierarchical visual cryptography. Remote voting systems now a day’s widely using visual cryptography for authentication purpose.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IJSRP Feb 2012 Edition, Volume 2, Issue 2

Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. [1] This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. nsecrets equals n/2 levels. This paper also provides secured authentication for...

متن کامل

Secured Biometric Authentication using Visual Cryptography and Transforms

Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is...

متن کامل

A method to Implement the Kerberos User Authentication and the secured Internet Service

This paper proposes a PKINIT_AS Kerberos V5 authentication system to use public key cryptography and a method to implement the gssapi_krb authentication method and secured Internet service using it in IPSec VPN

متن کامل

HMAC Based authentication for VANETS combined with Visual cryptography

VANET is an emerging type of distributed network and it is dynamic in nature which provides variety of services such as detecting oncoming collision and provides warning signal to alert the driver. In military application data security is an imp issues. This paper presents a secured and an efficient way of sending data and image in encrypted form using HMAC based authentication and Visual Crypt...

متن کامل

Secured Authentication Protocol System Using Images

In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011