A Comparative Study on Visual Cryptography Method for Handwriting Image Security

被引:0
|
作者
Suharjito [1 ]
Sugianto [2 ]
Surantha, Nico [1 ]
机构
[1] Bina Nusantara Univ, Dept Comp Sci, Binus Grad Program, Jakarta, Indonesia
[2] Inst Business Dev Indonesia, Informat Technol Study Program, Jakarta, Indonesia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The secret sharing protocol is a method used to divide or break a secret message into 2 (two) or more recipients, so that the results of these shares are not known to the secret recipients unless the recipients exchange shares for reconstructing the secret. This study aims to analyze the performance of the Asmuth-Bloom secret sharing protocol, secret splitting, and visual cryptography. Although the attacker gets shares shadow at the share exchange, the party must merge the shares shadow. It would be impossible for the attacker to know the correct share, despite adequate computer resources. This study also analyzes the results of the comparison of the three methods: secret splitting, secret sharing, and recursive threshold visual cryptography for image handwriting security. Simulation results show the difference in execution time among the three methods.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Color Image Visual Cryptography Scheme with Enhanced Security
    Khokhar, Prachi
    Jena, Debasish
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 267 - 279
  • [2] Digital Image Security Using Hybrid Visual Cryptography
    Bhatia, Shradha
    Khatri, Sunil Kumar
    Singh, Ajay Vikram
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 570 - 576
  • [3] Enhanced Visual Cryptography: An Augmented Model for Image Security
    Tripathi, Jyoti
    Saini, Anu
    Kishan
    Nikhil
    Shazad
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 323 - 333
  • [4] Visual Cryptography and Image Processing Based Approach for Bank Security Applications
    Pathak, Bageshree
    Pondkule, Darshana
    Shaha, Rasika
    Surve, Apurva
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 292 - 298
  • [5] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [6] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [7] Comparative study of cryptography for cloud computing for data security
    Mathur, Priya
    Gupta, Amit K.
    Vashishtha, Prateek
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513
  • [8] Reversible selective embedding for DICOM image security and integrity using visual cryptography
    Paikaray, Bijay Kumar
    Swain, Debabala
    Chakravarty, Sujata
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (05) : 498 - 514
  • [9] Image Hatching for Visual Cryptography
    Weir, Jonathan
    Yan, Wei-Qi
    [J]. 2009 13TH INTERNATIONAL MACHINE VISION AND IMAGE PROCESSING CONFERENCE, 2009, : 59 - 64
  • [10] Image Hatching for Visual Cryptography
    Weir, Jonathan
    Yan, Weiqi
    Kankanhalli, Mohan S.
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2012, 8 (02)