New Fool Proof Examination System through Color Visual Cryptography and Signature Authentication

被引:0
|
作者
Fathimal, Mohamed [1 ]
Jansirani, Arockia [2 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[2] Manonmaniam Sundaranar Univ, Dept Comp Sci & Engn, Tirunelveli, Tamil Nadu, India
关键词
Visual cryptography; secret sharing scheme; examination system; information security; authentication; SHARING SCHEME; STEGANOGRAPHY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There have been widespread allegations about the question papers leakage for a number of subjects in the recently held Secondary School Leaving Certificate examinations. The leakage is due to the practice of using printed question papers. Such incidents and subsequent cancellation of examinations are happening frequently. This creates political and social embarrassment and causes loss of money and time. This paper proposes a new system of foolproof examination by tamperproof e-question paper preparation and secure transmission using secret sharing scheme. The application is perfectly secure because the proposed method automatically embeds the corresponding institute seal in the form of the key. As a result, it is easy to trace out the source culprit for the leakage of question papers. This scheme has reduced reconstruction time because the reconstruction process involves only Exclusive-OR (XOR) operation apart from authentication. The proposed method recovers the original secret image without any loss. The existing visual cryptographic scheme recovers half-toned secret image with average Peak Signal-to-Noise Ratio (PSNR) value 24dB. Further, it shall be stated that the proposed method with authentication recovers the image with 64.7dB PSNR value, which is greater than that of the existing method. In addition, this method does not suffer from pixel Expansion.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 34 条
  • [1] Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization
    Ibrahim, D. R.
    Teh, J. S.
    Abdullah, R.
    [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (03): : 149 - 159
  • [2] Signature Based Authentication using Contrast Enhanced Hierarchical Visual Cryptography
    Chavan, Pallavi Vijay
    Atique, Mohammad
    Malik, Latesh
    [J]. 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [3] Multimodal Biometric Template Authentication of Finger Vein and Signature Using Visual Cryptography
    Nandhinipreetha, A.
    Radha, N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [4] Remote Optical Information Authentication System Based on Visual Cryptography
    Tao Ye
    Zhu Yupeng
    Yang Dongyu
    Lu Wenjin
    Shi Yishi
    [J]. ACTA OPTICA SINICA, 2021, 41 (16)
  • [5] A New Color Visual Cryptography Scheme with Perfect Contrast
    Liu, Xiao-Yi
    Chen, Ming-Song
    Zhang, Ya-Li
    [J]. 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 449 - 454
  • [6] Design and implementation of a novel authentication algorithm for fool-proof lock-key system based on visual secret sharing scheme
    Tunga, Harinandan
    Mukherjee, Soumen
    [J]. International Journal of Computer Science Issues, 2012, 9 (03): : 182 - 186
  • [7] A Novel E-passport Authentication System Based on Visual Cryptography
    Han, Yanyan
    Ge, Xiaonan
    He, Wencai
    Xu, Zhuolin
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 420 - 425
  • [8] A New Technique for Color Share Generation using Visual Cryptography
    Patel, Trupti
    Srivastava, Rohit
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 17 - 20
  • [9] A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP
    Kumar, Akhitha S.
    Girish, K. P.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 673 - 679
  • [10] Design a new visual cryptography for human-verifiable authentication in accessing a database
    Yang, Ching-Nung
    Sun, Li-Zhe
    Yan, Xuehu
    Kim, Cheonshik
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2016, 12 (02) : 483 - 494