Open Access   Article Go Back

Application of Visual Encryption and its Inferences in Data Provenance

Kukatlapalli Pradeep Kumar1 , Ravindranath C Cherukuri2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1088-1094, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.10881094

Online published on May 31, 2019

Copyright © Kukatlapalli Pradeep Kumar, Ravindranath C Cherukuri . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kukatlapalli Pradeep Kumar, Ravindranath C Cherukuri, “Application of Visual Encryption and its Inferences in Data Provenance,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1088-1094, 2019.

MLA Style Citation: Kukatlapalli Pradeep Kumar, Ravindranath C Cherukuri "Application of Visual Encryption and its Inferences in Data Provenance." International Journal of Computer Sciences and Engineering 7.5 (2019): 1088-1094.

APA Style Citation: Kukatlapalli Pradeep Kumar, Ravindranath C Cherukuri, (2019). Application of Visual Encryption and its Inferences in Data Provenance. International Journal of Computer Sciences and Engineering, 7(5), 1088-1094.

BibTex Style Citation:
@article{Kumar_2019,
author = {Kukatlapalli Pradeep Kumar, Ravindranath C Cherukuri},
title = {Application of Visual Encryption and its Inferences in Data Provenance},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1088-1094},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4366},
doi = {https://doi.org/10.26438/ijcse/v7i5.10881094}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.10881094}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4366
TI - Application of Visual Encryption and its Inferences in Data Provenance
T2 - International Journal of Computer Sciences and Engineering
AU - Kukatlapalli Pradeep Kumar, Ravindranath C Cherukuri
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1088-1094
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
420 504 downloads 120 downloads
  
  
           

Abstract

Security is the main aspect of any communications among untrusted networks in the current world. Thanks to many researchers for their enormous contributions on effective security algorithms despite different attacks breaching the weakness on the computer systems. As always, execution of these algorithms used to take time because of their dependency on mathematical analysis. The more the complexity of mathematical model, the more is the robustness of the algorithm though. Good number of them proved to be strong and are used in many popular applications over internet systems for providing security. There were a few of some methods which used very less of the mathematical concepts. One of them and the most widespread schemes is Visual Cryptography. This considers images as one of the important element in its methodology. However, this notion is different from other imagery concepts used in security. The below information gives reader a clear view on visual cryptographic schemes available, and also it provides an understanding on different heterogeneous applications oriented to the same. This paper also focuses on an application oriented aspect of Data Provenance with respect to secure communication.

Key-Words / Index Term

Visual Encryption, Data Provenance, Cyber Security, Attack Investigations

References

[1] Jithi, P. V., & Nair, A. T. (2013, March). Progressive visual cryptography with watermarking for meaningful shares. In Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on (pp. 394-401). IEEE.
[2] Basavegowda, R., & Seenappa, S. (2013, April). Electronic Medical Report Security Using Visual Secret Sharing Scheme. In Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on (pp. 78-83). IEEE.
[3] Pope, C., Kaur, K.: ‘Is it human or computer? Defending e-commerce with CAPTCHAs’, IT Professional, 2005, 7, (2), pp. 43–40
[4] CAPTCHA: Telling Humans and Computers Apart Automatically. Available at: http://www.captcha.net/
[5] Lee, J. S., & Hsieh, M. H. (2013). Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique.IET networks, 2(2), 81-91.
[6] Wu, X., & Sun, W. (2013). Generalized random grid and its applications in visual cryptography.
[7] Zhong, G. S., & Wang, J. J. (2013, May). Region incrementing visual secret sharing scheme based on random grids. In Circuits and Systems (ISCAS), 2013 IEEE International Symposium on (pp. 2351-2354). IEEE.
[8] Yang, Ching-Nung, and Daochun Wang. "Property Analysis of XOR Based Visual Cryptography." (2014): 1-1.
[9] Daoshun, W., et al. "Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing." (2013): 1-1.
[10] Chiu, P. L., Lee, K. H., Peng, K. W., & Cheng, S. Y. (2013, July). User-friendly visual cryptography with complementary cover images. In Signal and Information Processing (ChinaSIP), 2013 IEEE China Summit & International Conference on (pp. 641-644). IEEE.
[11] Tan, X., & Zhang, Q. (2013, September). A Kind of Verifiable Visual Cryptography Scheme. In Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on (pp. 215-219). IEEE.
[12] Iwamoto, M. (2012). A weak security notion for visual secret sharing schemes. Information Forensics and Security, IEEE Transactions on, 7(2), 372-382.
[13] Premkumar, S., & Narayanan, A. E. (2012, March). New visual Steganography scheme for secure banking application. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 1013-1016). IEEE.
[14] Lin, K. T. (2012, July). Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on (pp. 59-62). IEEE.
[15] Surekha, B., Swamy, G., & Reddy, K. R. L. (2012, July). A novel copyright protection scheme based on Visual Secret Sharing. In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on (pp. 1-5). IEEE.
[16] Prema, G., & Natarajan, S. (2013, February). Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application. In Information Communication and Embedded Systems (ICICES), 2013 International Conference on (pp. 727-730). IEEE.
[17] W.P. Fang and J.C. Lin, “Visual cryptography with extra ability of hiding confidential data,” Journal of Electronic Imaging , Vol. 15, No. 2, pp.0230201–023020 7, 2006.
[18] Huang, Y. J., & Chang, J. D. (2013, February). Non-expanded visual cryptography scheme with authentication. In Next-Generation Electronics (ISNE), 2013 IEEE International Symposium on (pp. 165-168). IEEE.
[19] Kaur, K., & Khemchandani, V. (2013, February). Securing Visual Cryptographic shares using Public Key Encryption. In Advance Computing Conference (IACC), 2013 IEEE 3rd International (pp. 1108-1113). IEEE.
[20] Lee, K., and P. Chiu. "Image size invariant visual cryptography for general access structures subject to display quality constraints." (2013): 1-1.
[21] Babu, C. R., Sridhar, M., & Babu, B. R. (2013, March). Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security. In Information Systems and Computer Networks (ISCON), 2013 International Conference on (pp. 195-199). IEEE.
[22] Rajendra, A. B., & Sheshadri, H. S. (2013, August). Visual Cryptography in Internet Voting System. In Innovative Computing Technology (INTECH), 2013 Third International Conference on (pp. 60-64). IEEE.
[23] Lee, K., and P. Chiu. "Digital Image Sharing by Diverse Image Media." (2014): 1-1.
[24] Liu, X. Y., Chen, M. S., & Zhang, Y. L. (2013, August). A new color visual cryptography scheme with perfect contrast. In Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 449-454). IEEE.
[25] Kester, Q. A., Nana, L., & Pascu, A. C. (2013, November). A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications. In Adaptive Science and Technology (ICAST), 2013 International Conference on (pp. 1-6). IEEE.
[26] Kester, Q. A., Nana, L., & Pascu, A. C. (2013, November). A new hybrid asymmetric key-exchange and visual cryptographic algorithm for securing digital images. In Adaptive Science and Technology (ICAST), 2013 International Conference on (pp. 1-5). IEEE.
[27] Yadav, G. S., & Ojha, A. (2013, December). A novel visual cryptography scheme based on substitution cipher. In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on (pp. 640-643). IEEE.
[28] Thankappan, A., & Wilscy, M. (2013, December). (2, 3) RIVC Scheme in Visual Cryptography without Pixel Expansion. In Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on (pp. 259-263). IEEE.
[29] De Prisco, R., & De Santis, A. (2014). On the Relation of Random Grid and Deterministic Visual Cryptography. IEEE transactions on information forensics and security, 9(3-4), 653-665.
[30] Bunker, S. C., Barasa, M., & Ojha, A. (2014, February). Linear equation based visual secret sharing scheme. In Advance Computing Conference (IACC), 2014 IEEE International (pp. 406-410). IEEE.
[31] Jana, B., & Jana, S. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE.
[32] Stanisavljevic, Zarko, et al. "COALA-System for Visual Representation of Cryptography Algorithms." 1-1.
[33] Wang, Xiang, Qingqi Pei, and Hui Li. "A Lossless Tagged Visual Cryptography Scheme." (2014): 1-1.
[34] Roy, S., & Venkateswaran, P. (2014, March). Online payment system using steganography and visual cryptography. In Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students` Conference on (pp. 1-5). IEEE.
[35] Chavan, P. V., Atique, M., & Malik, L. (2014, March). Signature based authentication using contrast enhanced hierarchical visual cryptography. InElectrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students` Conference on (pp. 1-5). IEEE.
[36] M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptography: Eurocrypt`94, Springer-Verlag, Berlin, pp. 1-12.
[37] Yan, B., Xiang, Y., & Hua, G. (2019). Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach. IEEE Transactions on Image Processing, 28(2), 896-911.
[38] Yang, C. N., Wu, C. C., & Lin, Y. C. (2017). k out of n Region-Based Progressive Visual Cryptography. IEEE Transactions on Circuits and Systems for Video Technology.
[39] Jia, X., Wang, D., Nie, D., & Zhang, C. (2018). Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology, 28(5), 1056-1070.
[40] I. M. Yazici, E. Karabulut and M. S. Aktas (2018), "A Data Provenance Visualization Approach," 2018 14th International Conference on Semantics, Knowledge and Grids (SKG), Guangzhou, China, pp. 84-91
[41] Kumar, K. P., & Cherukuri, R. C. (2016, May). The secured data provenance: Background and application oriented analysis. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1212-1216). IEEE.
[42] Kumar, K. P., & Cherukuri, R. C. (2018, July). Secured Electronic Transactions Using Visual Encryption: An E-Commerce Instance. In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 1341-1345). IEEE.