CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Visual Secret Sharing between Remote Participants

by N. Buckley, A.k. Nagar, S. Arumugam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 2
Year of Publication: 2014
Authors: N. Buckley, A.k. Nagar, S. Arumugam
10.5120/18044-8931

N. Buckley, A.k. Nagar, S. Arumugam . Visual Secret Sharing between Remote Participants. International Journal of Computer Applications. 103, 2 ( October 2014), 8-17. DOI=10.5120/18044-8931

@article{ 10.5120/18044-8931,
author = { N. Buckley, A.k. Nagar, S. Arumugam },
title = { Visual Secret Sharing between Remote Participants },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 2 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 8-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number2/18044-8931/ },
doi = { 10.5120/18044-8931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:29.679610+05:30
%A N. Buckley
%A A.k. Nagar
%A S. Arumugam
%T Visual Secret Sharing between Remote Participants
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 2
%P 8-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.

References
  1. Chen, T. & Tsao, K. (2011). Threshold visual secret sharing by random grids. The Journal of Systems and Software, 84(7). pp 1197-1208
  2. Fang, W. (2011). Offline QR Code Authorization Based on Visual Cryptography. Seventh International conference on Intelligent Information Hiding and Multimedia Signal Processing. pp 89-92
  3. Filardo, N. W. & Ateniese, G. (2011). High-Entropy Visual Identification for Touch Screen Devices. John Hopkins University, Baltimore. pp 1-16
  4. Ibrahim, M. H. (2012). New Capabilities of Visual Cryptography. International Journal of computer Science Issues, 9(5). pp 225-231
  5. Jin, D. , Yan, W. & Kankanhalli, M. S. (2005). Progressive color visual cryptography. Journal of Electronic Imaging, 14(3). pp 1-13
  6. Kafri, O. & Keren, E. (1987) Image encryption by multiple random grids. Optical Letters 12(6). pp 377–379
  7. Liu, F. , Wu, C. K. & Lin, X. J. (2008). The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography, 50(2). pp 215-227
  8. Machizaud, J. , Chavel, P. & Fournel, T. (2011). Fourier-based automatic alignment for improved visual cryptography schemes. Optics Express, 19(23). pp 22709-22722
  9. Naor, M. & Shamir A. (1994). Visual Cryptography. EUROCRYPT 1994. pp 1-12
  10. Sivasankari, S. & George, V. S. (2012). Implementation of Stenography within Visual Cryptography. 2012 International Conference on Computing and Control Engineering. pp 1-5
  11. Tuyls, P. , Hollmann, H. D. L. , Van Lint, J. H. & Tolhuizen, L. (2005). XOR-based Visual Cryptography Schemes. Designs, Codes and Cryptography, 37(1). pp 169-186
  12. Wu, X. & Sun, W. (2013). Improving the visual quality of random grid-based visual secret sharing. Signal Processing, 93(5). pp 977-995
Index Terms

Computer Science
Information Sciences

Keywords

Secret Sharing Visual Cryptography Random Grids Augmented Reality Mobile Technology