User Authentication using Visual Cryptography

被引:0
|
作者
Kumar, Praveen P. [1 ]
Sabitha, S. [2 ]
机构
[1] Coll Engn Trivandrum, Dept Comp Sci, Informat Secur, Trivandrum, Kerala, India
[2] Coll Engn Trivandrum, Dept Comp Sci, Trivandrum, Kerala, India
关键词
User Authentication; Visual Cryptography; Secret Sharing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is an important process in the area of security. Most of the existing user authentication schemes uses computationally expensive cryptographic algorithms. Also, these protocols cannot successfully prevent brute force and dictionary attacks. Visual cryptography is a secret sharing technique which requires less computation. Here, decryption process depends on the property of human vision. Even though visual cryptography offers a computationally inexpensive way of performing encryption and decryption, only few user authentication schemes were proposed using this technique. None of them are suitable for general purpose applications as they possess various vulnerabilities. There are few challenges in designing a user authentication scheme using visual cryptography because of its property that security is lost if we use the same key more than once. In this paper, we suggest a new protocol for authenticating user to server, using an encryption technique based on visual cryptography.
引用
收藏
页码:647 / 652
页数:6
相关论文
共 50 条
  • [1] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [2] Remote Multimodal Biometric Authentication using Visual Cryptography
    Kaur, Harkeerat
    Khanna, Pritee
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 13 - 25
  • [3] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06)
  • [4] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [5] Facial Images Authentication In Visual Cryptography Using Sterilization Algorithm
    Dalvi, Gopal D.
    Wakde, D. G.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 951 - 955
  • [6] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [7] Security analysis of authentication of images using recursive Visual Cryptography
    Yang, Ching-Nung
    Chen, Tse-Shih
    [J]. CRYPTOLOGIA, 2008, 32 (02) : 131 - 136
  • [8] Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits
    Arafin, Md Tanvir
    Qu, Gang
    [J]. 2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 169 - 174
  • [9] User Authentication System using Visual Communication
    Oh, Byung-Hun
    Chang, Kyung-Won
    Hong, Kwang-Seok
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 269 - 278
  • [10] Speckle visual cryptography for credential authentication
    Jiao, Anqing
    Zhu, Yupeng
    Mi, Zhaoke
    Zhou, Xinlong
    Zhu, Qiaofen
    Ke, Changjun
    Shi, Yishi
    [J]. APPLIED OPTICS, 2024, 63 (16) : 4351 - 4359