A Study on Visual Secret Sharing Schemes Using Biometric Authentication Techniques
DOI:
https://doi.org/10.51983/ajcst-2012.1.1.1661Keywords:
Visual Cryptography, Visual Secret SharingAbstract
Visual Secret sharing schemes (VSSS) and biometrics have been identified as the two most important aspects of digital security. VSSS uses the human visual system to perform the decryption. A VSSS allows confidential messages to be encrypted into k-out-of-n secret sharing schemes. Whenever the number of participants from the group (n) is greater than or equal to the threshold value (k), the confidential message can be obtained by these participants. VSSS is interesting because decryption can be done with no prior knowledge of cryptography and can be performed without any complex cryptographic Algorithms. Based on this study, a new approach to analyze VSSS that uses biometric approach is given in this paper.
References
Adi Shamir, “How to share a Secret”, Communications of the ACM, pp 612-613, 1979.
M. Naor and A. Shamir, “Visual Cryptography”,Advances in Cryptology-Eurocrypt ’94 Proceeding, LNCSvol. 950, Springer-Verlag, 1995, pp. 1-12.
Adhikari Avishek and Bimol Roy.“Applications of Partially Balanced Incomplete Block Designs in Developing (2, n) Visual Cryptographic Schemes”. IEICE Trans. Fundamentals, Vol.E90–A, No.5 May2007
Marek R. Ogiela, Urszula Ogiela, “Linguistic Cryptographic Threshold Schemes”,International Journal of Future Generation Communication and Networking.Vol.2, No.1,March 2009.
Thomas Monoth, Babu Anto P, “Achieving optimal Contrast in Visual Cryptography schemes without pixel expansion”.International Journal of Recent Trends in Engineering, Vol 1, No 1, May 2009.
N.Radha and S.Karthikeyan, “A study on biometric template security”,ICTACT journal of soft computing, ,Issue 01, july 2010
S Manimurugan n,K Porkumaran,”A new fast and efficient visual Cryptography Scheme for Medical Images with Forgery Detection”. 594 – 599, ICETECT, May 2011
Aseel M.Al-Anani,M.H,Abdallah,Randa A.Al-Dallah,Rola I.Al-Khalid, “Multimedia Multilevel Hiding Technique”,European Journal of Scientific Research.Vol 24,No.1,pp.42-54,2008.
Chi-Chen Chang, Yu-Zheng Wang and Chi-shiang Chan, “An Efficient Probability – based t out of n secret Image sharing scheme”. International Journal of signal processing, Image processing and pattern.Vol 2, No.1, March 2009.
Chao – Wen Chan and Yi – da Wu, “A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme”. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008.
Levent Ertaul and Vaidehi, “Implementaion of Homomorphic Encryption Schemes for secure Packet Forwording in Mobile Ad Hoc Networks (MANETs)”,IJCSNS,VOL.7,No.11,November 2007
Massoud Hadian Dehkordi and Abbas Cheraghi, “Visual Cryptography Schemes with Veto Capabilities”. Australian Journal of BASIC AND Applied Sciences, 2(4):1239-1245, 2008.
Ren junn Hwang, “A Digital Image Copyright Protection Scheme Based on Visual Cryptography”.Tamkang Journal of Science and Engineering.Vol 3.,No 2,pp 97-106(2000)
Seifedine Kadry,Aziz Barbar, “Design of Secure Mobile Communication using Fingerprint”, European Journal of Scientific Research.Vol 30,No.1,pp.138-145,2009.
Thomas Monoth & Babu Anto P. “Recursive Visual Cryptography Using Random Basis Column Pixel Expansion”, Proc. ofthe IEEE International Conference on Information Technology (ICIT ’07), (2007), 41-43.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.