Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
23 May 2019TL;DR: A double authentication system where user is identified by decrypted image and PSNR value is proposed, which provides a very high level of security.
Abstract: Authentication is a critical step in initializing a bank transaction. Core banking and net banking systems use ID cards, passwords/PIN, OTP, etc. for authentication. However, these methods are still prone to forgery and hacking, due to which unauthorized person could gain access to user’s account. We propose a methodology which uses an image share as authentication key. This has been created using visual cryptography and other image processing techniques to encrypt authentication parameters. It is encrypted such that the share becomes incomprehensible to human eyes and non-decryptable by hacker, thus protecting the data from forgery or hacking. This paper proposes a double authentication system where user is identified by decrypted image and PSNR value. Hence this system provides a very high level of security.
7 citations
••
01 Nov 2016TL;DR: Hierarchical Visual Cryptography Scheme is applied on gray image instead of binary image, so, generated shares are gray share, not binary shares that are generated by the binary image.
Abstract: In this technology era, every sensitive data must be secured. Visual cryptography is a technique to hide the image based secret. In visual cryptography the secret image is encrypted in to shares and at decryption side all shares are superimposed with each other so that secret is revealed. The key feature of visual cryptography is that, no difficult computation is needed at decryption side to decrypt the secret. In this paper we are applying Hierarchical Visual Cryptography Scheme on gray image instead of binary image. So, generated shares are gray share, not binary shares that are generated by the binary image. Here we are using the new proposed gray share generation algorithm for generation of n number of shares. Here original image is encrypted in to n number of levels so security of original image is increased. At decryption side all n shares must have to participate to reveal the original secret. Decrypted image has same size and better visual quality then original secret image.
7 citations
••
01 Jan 2020TL;DR: The proposed architecture provides revocability to multimodal biometric templates and secures their storage and transmission over a remote network with the help of visual cryptography technique.
Abstract: This work proposes an architecture for multimodal biometric recognition systems where user, recognition system, and template database are remotely located over a network. As the number of biometrics are limited and once lost they are compromised forever, it becomes imperative to design systems that optimize recognition rates and also address security and privacy issues for biometric-enabled authentication schemes. The proposed architecture provides revocability to multimodal biometric templates and secures their storage and transmission over a remote network with the help of visual cryptography technique. The proposed architecture gives a good matching performance and also fulfills four template protection criteria, i.e., security, diversity, revocability, and performance. Various attack scenarios such as phishing, replay, database, man-in-middle, and attack via record multiplicity are also addressed.
7 citations
••
18 Nov 2014TL;DR: An encryption technique of securing the biometric image data collected from devices with an approach of feature based encryption technique based on a visual cryptographic technique is proposed.
Abstract: With the current emergence of biometric image data applications on devices such as smart phones, security cameras, personal computers etc, there is a need for securing the image templates obtained from crime scenes as well as such devices before storing them in locations such as the cloud etc. In this paper, we proposed an encryption technique of securing the biometric image data collected from devices with an approach of feature based encryption technique. The biometric image data was encrypted using advanced encryption process and visual cryptography method. The method engaged the encrypted feature extracted from the plain image in the encryption process and used in to encrypt the image based on a visual cryptographic technique. Analysis of the plain and ciphered image was done and there was no pixel expansion in the process. The implementation was done using MATLAB.
7 citations
••
07 May 2007TL;DR: A new construction of visual cryptography scheme with dihedral group access structure for two shares and many secret images is proposed, which is perfect and has contrast 1/(6n2).
Abstract: A new construction of visual cryptography scheme (VCS) with dihedral group access structure for two shares and many secret images is proposed Let D2n be a dihedral group of order 2n, and let {Image(τ) | τ ∈ D2n} be 2n secret images corresponding to D2n In a VCS with dihedral group access structure, two shares (two transparencies) A and B are constructed so that for any element τ of D2n, A and τ (B) reconstruct the secret image Image(τ) This new VCS is perfect and has contrast 1/(6n2)
7 citations