Facial Images Authentication In Visual Cryptography Using Sterilization Algorithm

被引:0
|
作者
Dalvi, Gopal D. [1 ]
Wakde, D. G. [2 ]
机构
[1] SantGadge Baba Amravati Univ, Amravati, MS, India
[2] PR Patil Coll Engn & Technol, Amravati, MS, India
关键词
Pixel-Sharing; Sterilization Algorithm; Visual Cryptography;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security is a vital issue to be taken care of and to be experienced with different perspectives and preventive measures. In the present time, entire web is coming nearer from content information to mixed media information. One of the real security concerns is the insurance of this sight and sound information. Picture, which covers the most noteworthy rate of the media information, its assurance is essential. These might incorporate Military Secrets, Commercial Secrets and Information of people. This can be accomplished by visual Cryptography. It is one sort of picture encryption. In current innovation, the greater part of visual cryptography is implanted a mystery utilizing various shares.
引用
收藏
页码:951 / 955
页数:5
相关论文
共 50 条
  • [1] Security analysis of authentication of images using recursive Visual Cryptography
    Yang, Ching-Nung
    Chen, Tse-Shih
    [J]. CRYPTOLOGIA, 2008, 32 (02) : 131 - 136
  • [2] An Improved Multi-secret Sharing Visual Cryptography Technique for Color Images Using Sterilization Algorithm
    Dalvi, G. D.
    Wakde, D. G.
    [J]. ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 443 - 452
  • [3] A Robust Authentication Algorithm for Medical Images Based on Fractal Brownian Model and Visual Cryptography
    Sun Tiankai
    Wang Xingyuan
    Jiang Daihong
    Lin Da
    Ding Bin
    Li Dan
    [J]. SCIENTIFIC PROGRAMMING, 2020, 2020
  • [4] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
  • [5] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [6] Authentication for ID Cards based on Colour Visual Cryptography and Facial Recognition
    Ibrahim, D. R.
    Abdullah, R.
    Teh, J. S.
    Alsalibi, B.
    [J]. PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 164 - 167
  • [7] Remote Multimodal Biometric Authentication using Visual Cryptography
    Kaur, Harkeerat
    Khanna, Pritee
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 13 - 25
  • [8] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06) : 614 - 639
  • [9] Multiplying Cipher Images on Visual Cryptography with ElGamal Algorithm
    Kacaribu, Alexander Edi Suranta
    Ratnadewi
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2015, : 159 - 162
  • [10] A new visual cryptography using natural images
    Kim, HJ
    Choi, Y
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 5537 - 5540