CFP last date
20 May 2024
Reseach Article

An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications

by Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 6
Year of Publication: 2013
Authors: Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami
10.5120/10932-5879

Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami . An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications. International Journal of Computer Applications. 65, 6 ( March 2013), 42-46. DOI=10.5120/10932-5879

@article{ 10.5120/10932-5879,
author = { Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami },
title = { An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 6 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number6/10932-5879/ },
doi = { 10.5120/10932-5879 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:06.456780+05:30
%A Md. Tanbin Islam Siyam
%A Kazi Md. Rokibul Alam
%A Tanveer Al Jami
%T An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 6
%P 42-46
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

VC is a cryptographic technique that ensures the security of images by dividing a secret image into random shares, which makes the image data unreadable. Then decryption is performed by superimposing the shares, without any special computational power. Intuitively, VC can be categorized as: secret sharing scheme [1] for monochrome images and extended VC (EVC) [2] for color images. In this paper both schemes of VC have been exploited to hide image where image security is essential, such as Bangla text document, hand-written signature, biometric authentication (e. g. human face) etc. These can be exercised in offices for deed, in banking sector for financial document and in examination or election system for authentication respectively. Moreover a minor modification of EVC which can be applied for color image also has been presented.

References
  1. M. Naor and A. Shamir, "Visual cryptography", in Proc. of Advances in Cryptology, Vol. 950, pp. 1–12, Springer-Verlag, 1995.
  2. G. Ateniese, C. Blundo, A. de Santisand, and D. Stinson, "Visual cryptography for general access structures", Information and Computation, Vol. 129(2), pp. 86–106, 1996.
  3. Shamir A. "How to share a secret", Communications of the ACM, Vol. 22 (11), pp. 612–613, 1979.
  4. N. Askari, C. Moloney and H. M. Heys, "Application of Visual Cryptography to Biometric Authentication", Newfoundland Electrical and Computer Engineering Conference, 2011.
  5. J. K. Pal, J. K. Mandal and K. Dasgupta, "A (2, N) Visual Cryptographic Technique for Banking Applications", Int. Journal of Network Security and Its Applications (IJNSA), Vol. 2, No. 4, October 2010
  6. L. W. Hawkes, A. Yasinsac and C. Cline, "An Application of Visual Cryptography to Financial Documents", Technical Report TR001001, Florida State University, 2000.
  7. Arun Ross and A. A. Othman, "Visual Cryptography for Face Privacy", Proc. of SPIE Conference on Biometric Technology for Human Identification VII, (Orlando, USA), April 2010
  8. M. Nakajima and Y. Yamaguchi, "Extended Visual Cryptography for Natural Images", Journal of WSCG,Vol. 10 (2), pp. 303–310, 2002.
  9. P. S. Revenkar, A. Anjum, and W. Z. Gandhare, "Survey of Visual Cryptography Schemes", Int. Journal of Security and Its Applications, Vol. 4, No. 2, April, 2010
  10. J. B Feng, G. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu, "Visual secret sharing for multiple secrets", Pattern Recognition, Vol. 41, pp. 3572 - 3581, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Extended Visual Cryptography Secret sharing