1,253 research outputs found

    Visual Cryptography in Biometrics Passport

    Get PDF
    Every human being is unique in their nature such as traits and physical symptoms so computer science is using the biometric f or perfect identification within large database. Visual cryptography scheme is a cryptographic technique, which allows visual information e.g. printed text, handwritten notes, and picture to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. Biometric passport is a smart card technology product created by use of biometric data and computer chip f or authenticate identification of citizen of particular country. Current passport has certain shortcoming. In the is method it is proposed to convert scan images of retina, fingerprint and face in secret image and meaningful shares by use of visual cryptography. In this method wi th use of Visual Cryptography three biometrics i.e . retina image, fingerprint image and fa ce image encrypted in two meaningful shares when these two share stacking on one another fingerprint image revealed and that can be verified with on the spot live fingerprint image for perfect identification accuracy

    A Benchmarking assessment of known visual cryptography algorithms

    Get PDF
    With the growth of digital media, it is becoming more prevalent to find a method to protect the security of that media. An effective method for securely transmitting images is found in the field of Visual Cryptography. While this method is effective for securely transmitting images, many methods have been developed since the first algorithm was proposed in 1994 by Naor and Shamir. A benchmarking scheme is proposed to give the algorithm capabilities, understand the implementation method, evaluate the algorithm development, and provide image reconstruction information. Additionally, the algorithms are ranked according to a Visual Cryptography standard. This would allow an easy way to differentiate between algorithms and determine the ideal algorithm for a given task or project

    Survey on Biometric Image Sharing Using Cryptography and Diverse Image Media

    Get PDF
    Visual Secret Sharing Scheme is used to transmitting or delivering the secret images over the network. The VSS scheme has a major drawback that is it suffers from high transmission risk because the shares are like noise. As the shares are like noise that causes the attackers attention. In this paper we are using a natural-image based visual secret sharing (NVSS) scheme to reduce the transmission risk problem that occurs in VSS scheme. The NVSS scheme uses the natural images such as paintings, photographs etc as digital shares. As we are using the natural shares instead of noise like shares which reduces the transmission risk to certain limit. This scheme also uses the different media to transmit the shares

    Bit Slicng based Visual Cryptography On Gray Scale ImageÂ

    Get PDF
    Data transmission through online is become mandatory in recent ages. No one can avoid data transmission over internet. But sensitivity of the data to be considered while transmits over internet. Internet is public medium where everyone has equal right to do their activities. Like in general public, internet also having malicious users and their main activity is deployment of attack. These attacks are of many types such as hacking, tampering and eavesdropping etc. Efficient data hiding techniques are required to with stand these attacks or to escape from these attacks. Visual Cryptography is one of such techniques to hide multimedia data in other multimedia data such as images, audio files or video files. In the proposed system secret image is partitioned or divided into shares based on the bits. These shares are then covered with given cover images then these covered shares are distributed to ‘n’ participants. To recover the secret all those participants are required. The proposed approach followed a novel method of bit slicing on gray scale images. So at the time of recover secret image cant’ be visible with same intensity or resolution as that of original image. For this purpose four secret keys are used. Simulation results shows that when compared to existing schemes , proposed approach can hide the image under cover images in efficient way as well as recovering of secret also lightweight and resilience to attacks

    Development of Visual Cryptography Technique for Authentication Using Facial Images

    Get PDF
    Security in the real world is an important issue to be taken care and to be encountered with various aspects and preventive measures. In the present era, whole major security concerns is the protection of this multimedia web is coming closer from text data to multimedia data, one of the data. Image, which covers the highest percentage of the multimedia data, its protection is very important. These might include Military Secrets, Commercial Secrets and Information of individuals. This can be achieved by visual Cryptography. It is one kind of image encryption. Incurrent technology, most of visual cryptography areembedded a secret using multiple shares. Visual is secret sharing technique used in visual cryptography which divides the secret image into multiple shares and by superimposing those shares the original secret image is going to be revealed, but it create a threat when an intruder get shares with which the image is going to be decrypted easily. However in these project work, an extremely useful bitwise operation is perform on every pixel with the help of key. The key is provided by new concept of sterilization algorithm. Initially Red, Green and Blue channels get separated from image and are going to be encrypted on multiple levels using multiple shares, convert an image into unreadable format and by combining all the shares in proper sequence the original secret image revealed

    Multi Level Encryption Scheme for Transferring Secret image

    Get PDF
    As the rapid development of Internet Technology, Security and Privacy of data being transmitted has become the major issue. Transfer of data securely and reliably has become one of the challenges. Security issues should be considering because hackers may utilize weak link over communication network to steal information. Cryptography is the technique used to keep the message secure. Many images transmitted via Internet containing secret information but not secure. Encryption technique which prevents unauthorized access of data. Visual Cryptography technique introduced by Naor and Shamir, in which secret image is divided into number of shares. No information about secret image is revealed from individual share. Decryption can be done by overlaying one share above the other share. In this paper the idea is to increase the security level as the basic model of Visual Cryptography is not an efficient tool to hide the information. The secret image is encrypted using Arnold’s Transformation technique in the first level. In the second level create two shares from encrypted image using basic (2, 2) Visual Cryptography technique. To increase the security level, instead of sending these shares to receiver, third level security is adopted. In third level security, shares are embedded in two host images using Chang and Yu’s method. Generated shares are embedded into respective host images so that the attacker cannot suspect the secret image in it. On the receiver end, shares are extracted from camouflage image and then stacked to get the encrypted image. Encrypted image is decrypted using Inverse Arnold Transformation
    • …
    corecore