An Access Control System using Visual Cryptography and Steganography

被引:0
|
作者
Bhase, Gargee [1 ]
Mangrulkar, Ramchandra S. [1 ]
机构
[1] Dwarkadas J Sanghvi Coll Engn, Dept Comp Engn, Mumbai, Maharashtra, India
关键词
Access Control; Authentication; Privilege Separation; Steganography; Visual Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual Cryptographic Scheme(VCS) is a type of cryptography in which an image is split into shares, and can be decrypted only by superimposing those shares. In this paper, the authors propose an access control system using VCS and Steganography. Authentication Schemes have previously been proposed using VCS. The Authors introduce a model which separates the system into different privilege levels and can grant different Read/Write permissions to access a specific level to participants based on their roles.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Online Payment System using Steganography and Visual Cryptography
    Roy, Souvik
    Venkateswaran, P.
    [J]. 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [2] TAGGED VISUAL CRYPTOGRAPHY WITH ACCESS CONTROL
    Chen, Yi-Hui
    Chan, Chi-Shiang
    Hsu, Po-Yu
    Huang, Wei-Lin
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2014,
  • [3] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [4] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608
  • [5] AN EFFICIENT STEGANOGRAPHY ALGORITHM USING VISUAL CRYPTOGRAPHY AND AES ENCRYPTION
    Andi, Velumurugan
    Edeswaran, Logashanmugam
    [J]. IIOAB JOURNAL, 2016, 7 (10) : 22 - 25
  • [6] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [7] Visual Cryptography and Image Steganography using Space Filling Hilbert Curves
    Sheidaeian, Hamed
    Abbasifard, Mohammad Reza
    Zolfaghari, Behrouz
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 763 - 767
  • [8] CVC: Chaotic Visual Cryptography to Enhance Steganography
    Mostaghim, Melika
    Boostani, Reza
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 44 - 48
  • [9] A Novel Steganography-Cryptography System
    Fadhil, Mohammed Abbas
    [J]. WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS 1 AND 2, 2010, : 120 - 123
  • [10] Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
    Prema, G.
    Natarajan, S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 727 - 730