Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Analysis of Message sharing between Authorized Users and preventing from Cheating and Phishing using Visual Cryptography Schemes

Published on April 2014 by Amit Chaturvedi, V. Rama Kanth
National Seminar on Recent Advances in Wireless Networks and Communications
Foundation of Computer Science USA
NWNC - Number 1
April 2014
Authors: Amit Chaturvedi, V. Rama Kanth
e6f1b98a-2077-45cb-9b02-89bf1e73ae6b

Amit Chaturvedi, V. Rama Kanth . Analysis of Message sharing between Authorized Users and preventing from Cheating and Phishing using Visual Cryptography Schemes. National Seminar on Recent Advances in Wireless Networks and Communications. NWNC, 1 (April 2014), 16-21.

@article{
author = { Amit Chaturvedi, V. Rama Kanth },
title = { Analysis of Message sharing between Authorized Users and preventing from Cheating and Phishing using Visual Cryptography Schemes },
journal = { National Seminar on Recent Advances in Wireless Networks and Communications },
issue_date = { April 2014 },
volume = { NWNC },
number = { 1 },
month = { April },
year = { 2014 },
issn = 0975-8887,
pages = { 16-21 },
numpages = 6,
url = { /proceedings/nwnc/number1/16109-1405/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Seminar on Recent Advances in Wireless Networks and Communications
%A Amit Chaturvedi
%A V. Rama Kanth
%T Analysis of Message sharing between Authorized Users and preventing from Cheating and Phishing using Visual Cryptography Schemes
%J National Seminar on Recent Advances in Wireless Networks and Communications
%@ 0975-8887
%V NWNC
%N 1
%P 16-21
%D 2014
%I International Journal of Computer Applications
Abstract

With the rapid advancement of network technology, multimedia information is transmitted over the Internet conveniently. Various confidential data such as military maps and commercial identifications are transmitted over the Internet. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over communication network to steal information that they want. To deal with the security problems of secret images, various image secret sharing schemes have been developed. Visual cryptography was introduced in 1994 Noar and Shamir [1]. With the rapid development of the network technology, multimedia information is transmitted over the Internet conveniently. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over communication network to steal information that they want. To deal with the security problems of multimedia images, various image secret sharing schemes have been developed. In this paper, we have proposed a technique of well known secret sharing on both black and white and color images.

References
  1. M. Noar and A. Shamir, "Visual cryptography," Advances in Cryptology - EUROCRYPT'94, pp. 1-12, 1995.
  2. D. S. Tsai, T. Chenc, and G. Horng, "On generating meaningful shares in visual secret sharing scheme," 2008.
  3. S. J. Shyu, S. Y. Huang, Y. K. Lee,R. Z. Wang, and K. Chen, "Sharing multiple secrets in visual cryptography," 2007.
  4. L. Feng, W. Chuankun, "Embedded Extended Visual Cryptography Schemes," IEEE Transactions on Information Forensics and Security, June 2011.
  5. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Trans. Inf. Forensics Security, Sep. 2009.
  6. F. Liu, C. K. Wu, and X. J. Lin, "Color visual cryptography schemes," IET Inf. Security, 2008.
  7. D. S. Wang, F. Yi, and X. B. Li, "On general construction for extended visual cryptography schemes," 2009.
  8. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, "Halftone visual cryptography via direct binary search," Sep. 2006.
  9. D. Jin, W. Q. Yan, and M. S. Kankanhalli, "Progressive color visual cryptography," 2005. 74
  10. P. Tuyls, T. Kevenaar, G. J. Schrijen, T. Staring, and M. Van Dijk, "Security displays enable secure communications," 2004.
  11. M. Nakajima and Y. Yamaguchi, "Extended Visual Cryptography for Natural Images,"2002
  12. Visual Cryptography Application originally developed by Johannes boble, university of
  13. Regensburg. Source is from http://www-sec. uniregensburg. de/vc. Source modified for the purpose of application in plain java files. Error Filtering Schemes for Color Images in Visual Cryptography (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 11, 2011
  14. P. A. Eisen and D. R. Stinson, "Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels," 2002.
  15. Z. M. Wang and G. R. Arce, "Halftone visual cryptography through error diffusion," in IEEE Int. Conf. Image Processing, 2006,
  16. C. Blundo, A. De Bonis, and A. De Santis, "Improved Schemes for Visual Cryptography," 2001.
  17. S. Droste, "New Results on Visual Cryptography," 1996.
  18. G. J. Simmons, W. Jackson, and K. Martin, "The geometry of shared secret schemes," 1991.
  19. An overview of visual cryptography International Journal of Computational Intelligence Techniques, ISSN: 0976–0466 & E-ISSN: 0976–0474 Volume 1, Issue 1, 2010, PP-32-37
  20. An Implementation of Algorithms in Visual Cryptography in Images International Journal of Scientific and Research Publications, Volume 3, Issue 3, March 2013 1 ISSN 2250-3153
  21. Secure Visual Cryptography International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume 2 Issue 1 Jan 2013 Page No. 265-303
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Scheme (vcs) Pixel Expansion Contrast Security Accuracy Computational Complexity Secret Share Halftoning