Visual Cryptography Identity Specification Scheme
Anmol S. Budhewar1 , Shubhanand S. Hatkar2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-4 , Page no. 1148-1152, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.11481152
Online published on Apr 30, 2019
Copyright © Anmol S. Budhewar, Shubhanand S. Hatkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Anmol S. Budhewar, Shubhanand S. Hatkar, “Visual Cryptography Identity Specification Scheme,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1148-1152, 2019.
MLA Style Citation: Anmol S. Budhewar, Shubhanand S. Hatkar "Visual Cryptography Identity Specification Scheme." International Journal of Computer Sciences and Engineering 7.4 (2019): 1148-1152.
APA Style Citation: Anmol S. Budhewar, Shubhanand S. Hatkar, (2019). Visual Cryptography Identity Specification Scheme. International Journal of Computer Sciences and Engineering, 7(4), 1148-1152.
BibTex Style Citation:
@article{Budhewar_2019,
author = {Anmol S. Budhewar, Shubhanand S. Hatkar},
title = {Visual Cryptography Identity Specification Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1148-1152},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4180},
doi = {https://doi.org/10.26438/ijcse/v7i4.11481152}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.11481152}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4180
TI - Visual Cryptography Identity Specification Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Anmol S. Budhewar, Shubhanand S. Hatkar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1148-1152
IS - 4
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
343 | 320 downloads | 163 downloads |
Abstract
This paper focuses on the use of visual cryptography for the unique identification of user where different schemes like visual secret sharing schemes, halftone schemes, etc are used. The scheme uses users identifying data to be split into meaningful and meaningless shares. These shares can further be used by merging two shares and reveal the original data content. For additional security of data content, we can use different types of encryption techniques to hide the data content and the same can be retrieved by using the decryption method. The user is identified by the data content hidden in the two shares. One share of the data content can be put on the server side and the second share is at users end. At the time evaluation, one share is shown to the user at the server side and can be matched by the user with given second share of the data content.
Key-Words / Index Term
Visual secret sharing (VSS), Visual cryptography (VC), Random grid (RG), Visual cryptography visual secret sharing (VCVSS), Random grid Visual secret sharing (RGVSS)
References
[1] Y.C. Hou, S.C. Wei, and C.Y. Lin, “Random- Grid based Visual Cryptography Schemes”, IEEE Transactions on Circuits and Systems for Video Technology, VOL. 24, NO. 5, May 2014.
[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998.
[3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Adv. Cryptology-EUROCRYPT’94, LNCS 950, 1995, pp. 1–12.
[4] S. K Joseph, R. Ramesh , “Random Grid based Visual Cryptography using a common share”, 2015 Intl. Conference on Computing and Network Communications (CoCoNet`15), Dec. 16-19, 2015, Trivandrum, India.
[5] T. Chen and K. Tsao, “User-friendly random-grid-based visual secret sharing”, IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693-1703, Nov. 2011.
[6] X. Wu and W. Sun, “Generalized Random Grid and Its Applications in Visual Cryptography”, IEEE Transactions On Information Forensics And Security, vol. 8, NO. 9, September 2013.
[7] http://bookboon.com/en/visual-cryptography-and-itsapplicationsebook.
[8] Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone Visual Cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, Aug. 2006.
[9] S. Pahuja, S. Kasana, “Halftone Visual Cryptography For Color Images”,International Conference on Computer, Communications and Electronics (Comptelix) Manipal University Jaipur, Malaviya National Institute of Technology Jaipur & IRISWORLD, July 01-02, 2017.
[10] T. H. Chen and K. H. Tsao, “Threshold visual secret sharing by random grids,” J. Syst. Softw., vol. 84, no. 7, pp. 1197–1208, 2011.