Open Access   Article Go Back

Visual Cryptography Identity Specification Scheme

Anmol S. Budhewar1 , Shubhanand S. Hatkar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 1148-1152, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.11481152

Online published on Apr 30, 2019

Copyright © Anmol S. Budhewar, Shubhanand S. Hatkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anmol S. Budhewar, Shubhanand S. Hatkar, “Visual Cryptography Identity Specification Scheme,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1148-1152, 2019.

MLA Style Citation: Anmol S. Budhewar, Shubhanand S. Hatkar "Visual Cryptography Identity Specification Scheme." International Journal of Computer Sciences and Engineering 7.4 (2019): 1148-1152.

APA Style Citation: Anmol S. Budhewar, Shubhanand S. Hatkar, (2019). Visual Cryptography Identity Specification Scheme. International Journal of Computer Sciences and Engineering, 7(4), 1148-1152.

BibTex Style Citation:
@article{Budhewar_2019,
author = {Anmol S. Budhewar, Shubhanand S. Hatkar},
title = {Visual Cryptography Identity Specification Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1148-1152},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4180},
doi = {https://doi.org/10.26438/ijcse/v7i4.11481152}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.11481152}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4180
TI - Visual Cryptography Identity Specification Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Anmol S. Budhewar, Shubhanand S. Hatkar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1148-1152
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
343 320 downloads 163 downloads
  
  
           

Abstract

This paper focuses on the use of visual cryptography for the unique identification of user where different schemes like visual secret sharing schemes, halftone schemes, etc are used. The scheme uses users identifying data to be split into meaningful and meaningless shares. These shares can further be used by merging two shares and reveal the original data content. For additional security of data content, we can use different types of encryption techniques to hide the data content and the same can be retrieved by using the decryption method. The user is identified by the data content hidden in the two shares. One share of the data content can be put on the server side and the second share is at users end. At the time evaluation, one share is shown to the user at the server side and can be matched by the user with given second share of the data content.

Key-Words / Index Term

Visual secret sharing (VSS), Visual cryptography (VC), Random grid (RG), Visual cryptography visual secret sharing (VCVSS), Random grid Visual secret sharing (RGVSS)

References

[1] Y.C. Hou, S.C. Wei, and C.Y. Lin, “Random- Grid based Visual Cryptography Schemes”, IEEE Transactions on Circuits and Systems for Video Technology, VOL. 24, NO. 5, May 2014.
[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998.
[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Adv. Cryptology-EUROCRYPT’94, LNCS 950, 1995, pp. 1–12.
[4] S. K Joseph, R. Ramesh , “Random Grid based Visual Cryptography using a common share”, 2015 Intl. Conference on Computing and Network Communications (CoCoNet`15), Dec. 16-19, 2015, Trivandrum, India.
[5] T. Chen and K. Tsao, “User-friendly random-grid-based visual secret sharing”, IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693-1703, Nov. 2011.
[6] X. Wu and W. Sun, “Generalized Random Grid and Its Applications in Visual Cryptography”, IEEE Transactions On Information Forensics And Security, vol. 8, NO. 9, September 2013.
[7] http://bookboon.com/en/visual-cryptography-and-itsapplicationsebook.
[8] Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone Visual Cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, Aug. 2006.
[9] S. Pahuja, S. Kasana, “Halftone Visual Cryptography For Color Images”,International Conference on Computer, Communications and Electronics (Comptelix) Manipal University Jaipur, Malaviya National Institute of Technology Jaipur & IRISWORLD, July 01-02, 2017.
[10] T. H. Chen and K. H. Tsao, “Threshold visual secret sharing by random grids,” J. Syst. Softw., vol. 84, no. 7, pp. 1197–1208, 2011.