A Double Security Approach for Visual Cryptography using Transform Domain

被引:0
|
作者
Ravikumar, Arya [1 ]
Mredhula, L. [1 ]
机构
[1] MES Coll Engn, Dept Elect & Commun Engn, Kuttipuram, Kerala, India
关键词
Visual Cryptography; Secret Sharing Scheme; Transform Domain; Security; Cheating Prevention; DFT;
D O I
10.1109/ICACC.2015.32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual Cryptography is an approach to share secrets, basically images, which are divided into n shares using the basic principles of Shamir Secret Sharing Schemes. In (t, n) system, the secrets can be retrieved by combining t number of threshold shares from n shares. In the existing system, the attacks by malicious outsider and malicious participant cannot be detected. In this paper, a double security system using transform domain along with the key verification has been proposed to overcome these attacks. Security analysis and quality evaluations ensures that the system is highly secure.
引用
收藏
页码:141 / 144
页数:4
相关论文
共 50 条
  • [1] A Model for Biometric Security using Visual Cryptography
    Gupta, Himanshu
    Sharma, Nupur
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 328 - 332
  • [2] Plane Transform Visual Cryptography
    Weir, Jonathan
    Yan, WeiQi
    [J]. DIGITAL WATERMARKING, 2011, 6526 : 60 - 74
  • [3] Digital Image Security Using Hybrid Visual Cryptography
    Bhatia, Shradha
    Khatri, Sunil Kumar
    Singh, Ajay Vikram
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 570 - 576
  • [4] Iris Biometric Security using Watermarking and Visual Cryptography
    Swathi, B.
    Kumari, T. Madhavi
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1218 - 1220
  • [5] Security and Privacy for Medical Images Using Chaotic Visual Cryptography
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alsulaiman, Mansour
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1296 - 1301
  • [6] Visual Cryptography and Image Processing Based Approach for Bank Security Applications
    Pathak, Bageshree
    Pondkule, Darshana
    Shaha, Rasika
    Surve, Apurva
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 292 - 298
  • [7] Security analysis of authentication of images using recursive Visual Cryptography
    Yang, Ching-Nung
    Chen, Tse-Shih
    [J]. CRYPTOLOGIA, 2008, 32 (02) : 131 - 136
  • [8] Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain
    Abuturab, Muhammad Rafiq
    [J]. OPTICS AND LASER TECHNOLOGY, 2013, 45 : 525 - 532
  • [9] A novel approach to key management using visual cryptography
    Bhat M.N.
    Buradagunta S.
    Rani K.U.
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (06): : 627 - 632
  • [10] ENHANCED SECURITY FOR MILITARY GRID REFERENCE SYSTEM USING VISUAL CRYPTOGRAPHY
    Thomas, Sandhya Anne
    Gharge, Saylee
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,