Image Authentication using Visual Cryptography

نویسندگان

  • Rahul Saranjame
  • Manik Lal Das
چکیده

This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a counter to the described attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contrast Grayscale Image in Visual Cryptography Using Sigmoid Function

Visual Cryptography (VC), proposed by Naor and Shamir, has numerous uses, including visual authentication and identification, image encryption and steganography for security purpose, and. In this paper Contrast the visual information based on pseudo randomization and pixel reversal using sigmoid function is also proposed. Keywords— Information hiding, Information Security, Halftone image, Visua...

متن کامل

HMAC Based authentication for VANETS combined with Visual cryptography

VANET is an emerging type of distributed network and it is dynamic in nature which provides variety of services such as detecting oncoming collision and provides warning signal to alert the driver. In military application data security is an imp issues. This paper presents a secured and an efficient way of sending data and image in encrypted form using HMAC based authentication and Visual Crypt...

متن کامل

مطالعه‌ای بر رمز‌نگاری بصری و ارائه‌ی روش پیشنهادی برای رمزنگاری تصاویر رنگی

Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreov...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

Secure Iris Authentication Using Visual Cryptography

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1711.09032  شماره 

صفحات  -

تاریخ انتشار 2017