Tamperproof Transmission of Fingerprints Using Visual Cryptography Schemes

被引:17
|
作者
Monoth, Thomas [1 ]
Anto, Babu P. [1 ]
机构
[1] Kannur Univ, Dept Informat Technol, Kannur 670567, Kerala, India
关键词
visual cryptography; visual secret sharing; biometric image; fingerprints;
D O I
10.1016/j.procs.2010.11.018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual Cryptography and biometrics have been identified as the two most important aspects of digital security. In this paper, we propose a method for the preparation and secure transmission of fingerprint images using visual cryptography scheme. Visual cryptography (VC) is a kind of secret image sharing scheme that uses the human visual system to perform the decryption computations. A visual cryptography scheme (VCS) allows confidential messages to be encrypted into k-out-of-n secret sharing schemes. Whenever the number of participants from the group (n) is larger than or equal to the predetermined threshold value (k), the confidential message can be obtained by these participants. VCS is interesting because decryption can be done with no prior knowledge of cryptography and can be performed without any cryptographic computations. In this paper, the fingerprint image is broken up into n pieces, which individually yield no information about the image. These pieces of the images, called shares or shadows, may then be distributed among a group of n participants/ dealers. By combining any k (k <= n) of these shares, the original fingerprint image can be recovered, but combining less than k of them will not reveal any information about the image. The scheme is perfectly secure and very easy to implement. To decode the encrypted information, i. e., to get the original information back, the shares are stacked and the secret image pops out. The only drawback of the VCS is the loss in contrast of reconstructed image. The proposed method for the reconstruction of fingerprint image is based on XNOR operation. This will enable one to obtain back perfect fingerprint image. (C) 2010 Published by Elsevier Ltd c.
引用
收藏
页码:143 / 148
页数:6
相关论文
共 50 条
  • [1] On visual cryptography schemes
    De Santis, A
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 154 - 155
  • [2] Collaborative Visual Cryptography Schemes
    Jia, Xingxing
    Wang, Daoshun
    Nie, Daxin
    Zhang, Chaoyang
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (05) : 1056 - 1070
  • [3] Colour visual cryptography schemes
    Liu, F.
    Wu, C. K.
    Lin, X. J.
    [J]. IET Information Security, 2008, 2 (04) : 151 - 165
  • [4] On the Contrast in Visual Cryptography Schemes
    Carlo Blundo
    Alfredo De Santis
    Douglas R. Stinson
    [J]. Journal of Cryptology, 1999, 12 : 261 - 289
  • [5] Extended visual cryptography schemes
    Stoleru, D
    [J]. DR DOBBS JOURNAL, 2005, 30 (10): : 36 - 39
  • [6] Survey of Visual Cryptography Schemes
    Revenkar, P. S.
    Anjum, Anisa
    Gandhare, W. Z.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (02): : 49 - 56
  • [7] Improved Schemes for Visual Cryptography
    Carlo Blundo
    Annalisa De Bonis
    Alfredo De Santis
    [J]. Designs, Codes and Cryptography, 2001, 24 : 255 - 278
  • [8] Improved schemes for visual cryptography
    Blundo, C
    Bonis, AD
    Santis, AD
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (03) : 255 - 278
  • [9] Probabilistic visual cryptography schemes
    Cimato, S
    De Prisco, R
    De Santis, A
    [J]. COMPUTER JOURNAL, 2006, 49 (01): : 97 - 107
  • [10] Visual Cryptography Schemes with Reversing
    Yang, Ching-Nung
    Wang, Chung-Chun
    Chen, Tse-Shih
    [J]. COMPUTER JOURNAL, 2008, 51 (06): : 710 - 722