Research Article

An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications

by  Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Issue 6
Published: March 2013
Authors: Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami
10.5120/10932-5879
PDF

Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam, Tanveer Al Jami . An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications. International Journal of Computer Applications. 65, 6 (March 2013), 42-46. DOI=10.5120/10932-5879

                        @article{ 10.5120/10932-5879,
                        author  = { Md. Tanbin Islam Siyam,Kazi Md. Rokibul Alam,Tanveer Al Jami },
                        title   = { An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 65 },
                        number  = { 6 },
                        pages   = { 42-46 },
                        doi     = { 10.5120/10932-5879 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Md. Tanbin Islam Siyam
                        %A Kazi Md. Rokibul Alam
                        %A Tanveer Al Jami
                        %T An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications%T 
                        %J International Journal of Computer Applications
                        %V 65
                        %N 6
                        %P 42-46
                        %R 10.5120/10932-5879
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

VC is a cryptographic technique that ensures the security of images by dividing a secret image into random shares, which makes the image data unreadable. Then decryption is performed by superimposing the shares, without any special computational power. Intuitively, VC can be categorized as: secret sharing scheme [1] for monochrome images and extended VC (EVC) [2] for color images. In this paper both schemes of VC have been exploited to hide image where image security is essential, such as Bangla text document, hand-written signature, biometric authentication (e. g. human face) etc. These can be exercised in offices for deed, in banking sector for financial document and in examination or election system for authentication respectively. Moreover a minor modification of EVC which can be applied for color image also has been presented.

References
  • M. Naor and A. Shamir, "Visual cryptography", in Proc. of Advances in Cryptology, Vol. 950, pp. 1–12, Springer-Verlag, 1995.
  • G. Ateniese, C. Blundo, A. de Santisand, and D. Stinson, "Visual cryptography for general access structures", Information and Computation, Vol. 129(2), pp. 86–106, 1996.
  • Shamir A. "How to share a secret", Communications of the ACM, Vol. 22 (11), pp. 612–613, 1979.
  • N. Askari, C. Moloney and H. M. Heys, "Application of Visual Cryptography to Biometric Authentication", Newfoundland Electrical and Computer Engineering Conference, 2011.
  • J. K. Pal, J. K. Mandal and K. Dasgupta, "A (2, N) Visual Cryptographic Technique for Banking Applications", Int. Journal of Network Security and Its Applications (IJNSA), Vol. 2, No. 4, October 2010
  • L. W. Hawkes, A. Yasinsac and C. Cline, "An Application of Visual Cryptography to Financial Documents", Technical Report TR001001, Florida State University, 2000.
  • Arun Ross and A. A. Othman, "Visual Cryptography for Face Privacy", Proc. of SPIE Conference on Biometric Technology for Human Identification VII, (Orlando, USA), April 2010
  • M. Nakajima and Y. Yamaguchi, "Extended Visual Cryptography for Natural Images", Journal of WSCG,Vol. 10 (2), pp. 303–310, 2002.
  • P. S. Revenkar, A. Anjum, and W. Z. Gandhare, "Survey of Visual Cryptography Schemes", Int. Journal of Security and Its Applications, Vol. 4, No. 2, April, 2010
  • J. B Feng, G. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu, "Visual secret sharing for multiple secrets", Pattern Recognition, Vol. 41, pp. 3572 - 3581, 2008.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Extended Visual Cryptography Secret sharing

Powered by PhDFocusTM