SlideShare a Scribd company logo
1 of 3
Download to read offline
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011



An Intelligent System for Secured Authentication using
      Hierarchical Visual Cryptography-Review
                       Pallavi V Chavan1, Dr. Mohammad Atique2, and Dr. Anjali R Mahajan2
                                          1
                                          CE Department, BDCOE, Sevagram, India
                                               Pallavichavan11@gmail.com
                               2
                                 PG Department of Computer Science, SGBAU, Amravati, India
                                                 Mohd.atique@gmail.com


Abstract—This paper introduces the idea of hierarchical visual        the secret. Secondly, the individuals who do not have
cryptography. Authentication is the important issue over the          knowledge of cryptography are indirectly getting involved
internet. This paper describes a secured authentication               in decryption. The major drawback of this scheme is that
mechanism with the help of visual cryptography. Visual
                                                                      visually blind people cannot make use of this technique. The
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted          simple example of visual cryptography is shown in Figure1
over the network and at the receiving end secrets are revealed        [3].
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.

Index Terms— Visual cryptography, secret sharing, shares,
authentication.

                       I. INTRODUCTION
    Visual cryptography is the art of encrypting information
such as handwritten text, images etc. in such a way that the
decryption is possible without any mathematical
computations and human visual system is sufficient to
decrypt the information. The cryptography scheme is given
by the following setup. A secret image consists of a collection
of black and white pixels. Here each pixel is treated
independently. To encode the secret image, we split the
original image into n modified versions (referred as shares)
such that each pixel in a share now subdivided into n black
and white sub-pixels. To decode the image, a subset S of
those n shares are picked and copied on separate
transparencies [1]. Visual cryptography schemes were
independently introduced by Shamir. Shamir divided data D
into n pieces in such a way that D is easily reconstructable
from any k pieces, but even complete knowledge of k - 1
pieces reveals absolutely no information about D. This
technique enables the construction of robust key management
schemes for cryptographic systems that can function securely
and reliably even when misfortunes destroy half the pieces
                                                                       Figure 1. An example of visual cryptography with share 1 , share2
and security breaches expose all but one of the remaining                                   & decoded password
pieces [2]. The first form of visual cryptography is also known
as secret sharing.                                                                         II.   LITERATURE REVIEW
     The simplest form of visual cryptography separates a
secret into two parts so that either part by itself conveys no           There are number of visual cryptography schemes in
information. When these two parts are combined together               existence. Some of them are described below.
by means of superimposition, the original secret can be               A. 2 out of 2 Visual Cryptography Scheme
revealed. These parts are called as shares. There are several
                                                                         In this type of visual cryptography scheme, the secret
advantages of visual cryptography. Basically it is simple to
                                                                      image is divided into exactly two shares. This is the simplest
use and no mathematical computations are required to reveal
                                                                      kind of visual cryptography. The major application of this
© 2011 ACEEE                                                      7
DOI: 01.IJNS.02.04. 525
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


scheme is found with remote voting system that uses 2 out               reused. Both secret and symmetry-key are represented in
of 2 secret sharing schemes for authentication purpose. To              binary image. The proposed scheme was simple and easy to
reveal the original image, these two shares are required to be          be implemented for shadow images. The shadow images are
stacked together [4], [5]. Figure 2 represents the division of          nothing but the shares. Therefore, it was used in many
black and white pixel in this scheme.                                   electronic business applications. The authors also performed
                                                                        security analysis on the implemented scheme.
                                                                                                      TABLE   I

                                                                                     COMPARISON OF VISUAL CRYPTOGRAPHY SCHEMES




          Figure 2. Basic concept of 2 out of 2 scheme

B. K out of N Visual Cryptography
    This kind of scheme allows dividing a secret into K number
of shares. Then the secret can be revealed from any N number
of Shares among K. The major problem associated with this
scheme is that the user needs to maintain many shares which
may result into loss of shares. Also more number of shares
means more memory consumption. The application of this
scheme is found with banking system. For the joint accounts,
three shares are generated. One is kept with bank’s server,
second is delivered to the one customer for the joint account
and third share is delivered to the second customer. Hence
both customers are able to access the account [6].
C. K out of K Visual Cryptography
                                                                                              IV.   PROPOSED WORK
    Here original secret is divided into K number of shares
and for reconstruction of the secret, all K shares are necessary.           In view of above observations and from review of current
This scheme is not so popular because managing k number                 literatures about various visual cryptography schemes, it is
of shares is difficult task and it also increases time complexity       proposed to investigate as follows:
to compute shares [7].                                                  1) Analyzing the constraints such as pixel expansion, memory
                                                                        requirement, number of shares, type of share, time complexity
                  III. COMPARATIVE ANALYSIS                             while generating shares.
                                                                        2) Innovating new visual cryptography scheme for secured
    Research on visual cryptography is still in its infancy. In         authentication to the intelligent system.
visual cryptography many schemes are proposed that                      3) Multiple secrets encryption in same shares.
depends on type of secret to be encrypted and type of share             4) Design and implementation of intelligent system using the
generation approach [18]. Most of the schemes are designed              approach of hierarchical visual cryptography for the purpose
to minimize the memory requirement as well as simplifying               of secured authentication.
the share type i.e. meaningful share or meaningless share.              5) Comparison between proposed and existing authentication
Some of the interesting parameters studied in literature are            techniques in the area of cryptography.
secret type, number of shares, pixel expansion, type of share           The proposed research is aimed at design and implementation
etc. Chao Chan and Yi Wu stated a new visual cryptography               of an intelligent system with secured authentication using
scheme for secure digital transmission [19],[20]. Visual                hierarchical visual cryptography.
cryptography can be seen as a one-time pad system which
cannot be reused. Authors applied Diffie and Hellman (D-H)
key agreement method such that visual cryptography can be

© 2011 ACEEE                                                        8
DOI: 01.IJNS.02.04. 525
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


                        V. CONCLUSIONS                                    [9] P. S. Revenkar, Anisa Anjum, W. Gandhare, “Survey of Visual
                                                                          Cryptography Schemes,” International Journal of Security and Its
   The authentication scheme proposed here is providing                   Applications, Vol. 4, no. 2, April 2010, pp. 49-56.
security in multiple levels. The share individually is unable             [10] Bin Yu, Jin Lu, Li Fang, “ A Co-Cheating Prevention Visual
to reflect secrecy of the data. The permutations and                      Cryptography Scheme,” in Proceeding of 3rd IEEE International
combinations are failure against the shares. The visual                   Conference on Information and Computing, 2010, pp.157-160
cryptography scheme is also known in the form of secret                   [11] Ayesha Altaf, Rabia, Attiq, “A Novel Approach against DoS
sharing scheme. Color visual cryptography schemes also exist              Attacks in WiMAX              Authentication using Visual
                                                                          Cryptography,” in Proceedings of IEEE International Conference
which is equivalent to stegenography concept in network
                                                                          on Emerging Security Information, Systems and Technologies, 2008,
security.                                                                 pp. 238-242.
                                                                          [12] Jena D, Jena S. K., “A Novel Visual Cryptography Scheme,”
                          REFERENCES                                      in Proceedings of IEEE        International Conference on
[1] Hegde C ,Manu S, Shenoy P D, Venugopal, K. R., Patnaik L.             Advanced Computer Control, 2009, pp. 207-211.
M, ”Secured Authentication  using  Image  Processing  and  Visual         [13] Abboud, G., Marean, J., Yampolskiy, R.V., “Steganography
Cryptography for Banking Applications,” in Proceedings of 16th            and Visual Cryptography in Computer Forensics,” in Proceedings
IEEE International Conference on Advanced Computing and                   of 5 th IEEE International Workshop on Systematic Approaches to
Communications, ADCOM 2008,2008, pp. 65-72.                               Digital Forensic Engineering, 2010, pp. 25-32.
[2] Adi Shamir, “How to Share a Secret,” in Communications of             [14] Shang Chen, Sian Lin, “Non expansible flip-flop visual
ACM, Vol. 22, no.11, 1979, pp. 612-613.                                   cryptography with perfect security,” in Proceeding of 5 th IEEE
[3] Pallavi V. Chavan, R.S. Mangrulkar, “Sharing a Secret in              International Conference on Intelligent Information Hiding and
Network,” in International Engineering and Technology Journal             Multimedia Signal Processing,2009,pp.949-952.
of Information System, Vol.4, no. 2, pp.83-87.                            [15] Jonathan and Wei Yan, “Image Hatching for Visual
[4] Zhongnin Wangarce, G.R., “Halftone Visual Cryptography by             Cryptography,” in Proceeding of 13th IEEE International Conference
Interative Halftoning,” in     Proceed ings of 2010 IEEE                  on Machine Vision and Image Processing, 2009, pp. 59-64.
International Conference on Acoustics Speech and Signal Processing        [16] Abboud,G.,Marean,J. and Yampolskiy,R.V., “Steganography
(ICASSP), March 2010, pp. 1822-1825.                                      and Visual Cryptography in Computer Forensics,” in Proceeding
[5] Moni Naor, Adi Shamir, “Visual Cryptography,” in Springer-            of 5th IEEE International Workshop on Systematic Approaches to
Verlag International Journal, 1998, pp. 1-11.                             Digital Forensics Engineering, 2010, pp. 25-32.
[6] Tzung, Chang Sain, Wei Lee, “A Novel Subliminal Channel               [17] Weir, Yan, “Sharing Multiple Secretes using Visual
Found in Visual Cryptography and Its Application to Image Hiding,”        Cryptography,” in Proceeding of IEEE International Symposium
in Proceedings of 3 rd IEEE International Conference on Intelligent       on Circuits and Systems, 2009, pp. 509-512.
Information Hiding and Multimedia Signal Processing, Vol. 1, 2007,        [18] Chao Wen, Yi Wu, “A Visual Information Encryption Scheme
pp. 421-424.                                                              Based on Visual      Cryptography and D-H Key Agreement
[7] Che Lee, Wen Tsai, “ Authentication of Binary Images in PNG           Scheme,” International Journal of Computer         Science    and
Format Based on a Secret       Sharing Technique,” in Proceedings         Network Security, Vol. 8, no. 4, April 2008, pp. 128-132.
of IEEE International Conference on System and Engineering,               [19] Li Fang, Ya-Min Li, Bin Yu, “Multi Secret Visual Cryptography
Taipei, July 2010, pp. 506-510.                                           based on Reversed Images,” in Proceeding of 3rd IEEE International
[8] R. Youmaran, A. Adler, A. Miri, “An Improved Visual                   Conference on Information and Computing, 2010, pp. 195-198.
Cryptography Scheme for Secret Hiding,” in Proceedings of 23 rd           [20] Thomas Monoth, Babu Anto P, “Contrast Enhanced Visual
IEEE Biennial Symposium on Communications, 2006,            p p .         Cryptography Schemes based on Additional Pixel Pattern,” in
340-343.                                                                  Proceeding of IEEE International Conference on Cyberworlds,
                                                                          2010, pp. 171-178.




© 2011 ACEEE                                                          9
DOI: 01.IJNS.02.04. 525

More Related Content

What's hot

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesIJERA Editor
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyNagarjuna mahanti
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 

What's hot (16)

call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
main doc
main docmain doc
main doc
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
575 579
575 579575 579
575 579
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 

Similar to Secured Authentication Using Hierarchical Visual Cryptography

Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...IJNSA Journal
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptographyeSAT Publishing House
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...IDES Editor
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY Lakshmi Velivala
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYLakshmi Velivala
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixelsmuhammed jassim k
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 

Similar to Secured Authentication Using Hierarchical Visual Cryptography (20)

Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Kaur2013
Kaur2013Kaur2013
Kaur2013
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
F42022628
F42022628F42022628
F42022628
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
C045016020
C045016020C045016020
C045016020
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Secured Authentication Using Hierarchical Visual Cryptography

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review Pallavi V Chavan1, Dr. Mohammad Atique2, and Dr. Anjali R Mahajan2 1 CE Department, BDCOE, Sevagram, India Pallavichavan11@gmail.com 2 PG Department of Computer Science, SGBAU, Amravati, India Mohd.atique@gmail.com Abstract—This paper introduces the idea of hierarchical visual the secret. Secondly, the individuals who do not have cryptography. Authentication is the important issue over the knowledge of cryptography are indirectly getting involved internet. This paper describes a secured authentication in decryption. The major drawback of this scheme is that mechanism with the help of visual cryptography. Visual visually blind people cannot make use of this technique. The cryptography simply divides secret information in to number of parts called shares. These shares are further transmitted simple example of visual cryptography is shown in Figure1 over the network and at the receiving end secrets are revealed [3]. by superimposition. Many layers of visual cryptography exist in proposed system hence called hierarchical visual cryptography. Remote voting systems now a day’s widely using visual cryptography for authentication purpose. Index Terms— Visual cryptography, secret sharing, shares, authentication. I. INTRODUCTION Visual cryptography is the art of encrypting information such as handwritten text, images etc. in such a way that the decryption is possible without any mathematical computations and human visual system is sufficient to decrypt the information. The cryptography scheme is given by the following setup. A secret image consists of a collection of black and white pixels. Here each pixel is treated independently. To encode the secret image, we split the original image into n modified versions (referred as shares) such that each pixel in a share now subdivided into n black and white sub-pixels. To decode the image, a subset S of those n shares are picked and copied on separate transparencies [1]. Visual cryptography schemes were independently introduced by Shamir. Shamir divided data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces Figure 1. An example of visual cryptography with share 1 , share2 and security breaches expose all but one of the remaining & decoded password pieces [2]. The first form of visual cryptography is also known as secret sharing. II. LITERATURE REVIEW The simplest form of visual cryptography separates a secret into two parts so that either part by itself conveys no There are number of visual cryptography schemes in information. When these two parts are combined together existence. Some of them are described below. by means of superimposition, the original secret can be A. 2 out of 2 Visual Cryptography Scheme revealed. These parts are called as shares. There are several In this type of visual cryptography scheme, the secret advantages of visual cryptography. Basically it is simple to image is divided into exactly two shares. This is the simplest use and no mathematical computations are required to reveal kind of visual cryptography. The major application of this © 2011 ACEEE 7 DOI: 01.IJNS.02.04. 525
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 scheme is found with remote voting system that uses 2 out reused. Both secret and symmetry-key are represented in of 2 secret sharing schemes for authentication purpose. To binary image. The proposed scheme was simple and easy to reveal the original image, these two shares are required to be be implemented for shadow images. The shadow images are stacked together [4], [5]. Figure 2 represents the division of nothing but the shares. Therefore, it was used in many black and white pixel in this scheme. electronic business applications. The authors also performed security analysis on the implemented scheme. TABLE I COMPARISON OF VISUAL CRYPTOGRAPHY SCHEMES Figure 2. Basic concept of 2 out of 2 scheme B. K out of N Visual Cryptography This kind of scheme allows dividing a secret into K number of shares. Then the secret can be revealed from any N number of Shares among K. The major problem associated with this scheme is that the user needs to maintain many shares which may result into loss of shares. Also more number of shares means more memory consumption. The application of this scheme is found with banking system. For the joint accounts, three shares are generated. One is kept with bank’s server, second is delivered to the one customer for the joint account and third share is delivered to the second customer. Hence both customers are able to access the account [6]. C. K out of K Visual Cryptography IV. PROPOSED WORK Here original secret is divided into K number of shares and for reconstruction of the secret, all K shares are necessary. In view of above observations and from review of current This scheme is not so popular because managing k number literatures about various visual cryptography schemes, it is of shares is difficult task and it also increases time complexity proposed to investigate as follows: to compute shares [7]. 1) Analyzing the constraints such as pixel expansion, memory requirement, number of shares, type of share, time complexity III. COMPARATIVE ANALYSIS while generating shares. 2) Innovating new visual cryptography scheme for secured Research on visual cryptography is still in its infancy. In authentication to the intelligent system. visual cryptography many schemes are proposed that 3) Multiple secrets encryption in same shares. depends on type of secret to be encrypted and type of share 4) Design and implementation of intelligent system using the generation approach [18]. Most of the schemes are designed approach of hierarchical visual cryptography for the purpose to minimize the memory requirement as well as simplifying of secured authentication. the share type i.e. meaningful share or meaningless share. 5) Comparison between proposed and existing authentication Some of the interesting parameters studied in literature are techniques in the area of cryptography. secret type, number of shares, pixel expansion, type of share The proposed research is aimed at design and implementation etc. Chao Chan and Yi Wu stated a new visual cryptography of an intelligent system with secured authentication using scheme for secure digital transmission [19],[20]. Visual hierarchical visual cryptography. cryptography can be seen as a one-time pad system which cannot be reused. Authors applied Diffie and Hellman (D-H) key agreement method such that visual cryptography can be © 2011 ACEEE 8 DOI: 01.IJNS.02.04. 525
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 V. CONCLUSIONS [9] P. S. Revenkar, Anisa Anjum, W. Gandhare, “Survey of Visual Cryptography Schemes,” International Journal of Security and Its The authentication scheme proposed here is providing Applications, Vol. 4, no. 2, April 2010, pp. 49-56. security in multiple levels. The share individually is unable [10] Bin Yu, Jin Lu, Li Fang, “ A Co-Cheating Prevention Visual to reflect secrecy of the data. The permutations and Cryptography Scheme,” in Proceeding of 3rd IEEE International combinations are failure against the shares. The visual Conference on Information and Computing, 2010, pp.157-160 cryptography scheme is also known in the form of secret [11] Ayesha Altaf, Rabia, Attiq, “A Novel Approach against DoS sharing scheme. Color visual cryptography schemes also exist Attacks in WiMAX Authentication using Visual Cryptography,” in Proceedings of IEEE International Conference which is equivalent to stegenography concept in network on Emerging Security Information, Systems and Technologies, 2008, security. pp. 238-242. [12] Jena D, Jena S. K., “A Novel Visual Cryptography Scheme,” REFERENCES in Proceedings of IEEE International Conference on [1] Hegde C ,Manu S, Shenoy P D, Venugopal, K. R., Patnaik L. Advanced Computer Control, 2009, pp. 207-211. M, ”Secured Authentication  using  Image  Processing  and  Visual [13] Abboud, G., Marean, J., Yampolskiy, R.V., “Steganography Cryptography for Banking Applications,” in Proceedings of 16th and Visual Cryptography in Computer Forensics,” in Proceedings IEEE International Conference on Advanced Computing and of 5 th IEEE International Workshop on Systematic Approaches to Communications, ADCOM 2008,2008, pp. 65-72. Digital Forensic Engineering, 2010, pp. 25-32. [2] Adi Shamir, “How to Share a Secret,” in Communications of [14] Shang Chen, Sian Lin, “Non expansible flip-flop visual ACM, Vol. 22, no.11, 1979, pp. 612-613. cryptography with perfect security,” in Proceeding of 5 th IEEE [3] Pallavi V. Chavan, R.S. Mangrulkar, “Sharing a Secret in International Conference on Intelligent Information Hiding and Network,” in International Engineering and Technology Journal Multimedia Signal Processing,2009,pp.949-952. of Information System, Vol.4, no. 2, pp.83-87. [15] Jonathan and Wei Yan, “Image Hatching for Visual [4] Zhongnin Wangarce, G.R., “Halftone Visual Cryptography by Cryptography,” in Proceeding of 13th IEEE International Conference Interative Halftoning,” in Proceed ings of 2010 IEEE on Machine Vision and Image Processing, 2009, pp. 59-64. International Conference on Acoustics Speech and Signal Processing [16] Abboud,G.,Marean,J. and Yampolskiy,R.V., “Steganography (ICASSP), March 2010, pp. 1822-1825. and Visual Cryptography in Computer Forensics,” in Proceeding [5] Moni Naor, Adi Shamir, “Visual Cryptography,” in Springer- of 5th IEEE International Workshop on Systematic Approaches to Verlag International Journal, 1998, pp. 1-11. Digital Forensics Engineering, 2010, pp. 25-32. [6] Tzung, Chang Sain, Wei Lee, “A Novel Subliminal Channel [17] Weir, Yan, “Sharing Multiple Secretes using Visual Found in Visual Cryptography and Its Application to Image Hiding,” Cryptography,” in Proceeding of IEEE International Symposium in Proceedings of 3 rd IEEE International Conference on Intelligent on Circuits and Systems, 2009, pp. 509-512. Information Hiding and Multimedia Signal Processing, Vol. 1, 2007, [18] Chao Wen, Yi Wu, “A Visual Information Encryption Scheme pp. 421-424. Based on Visual Cryptography and D-H Key Agreement [7] Che Lee, Wen Tsai, “ Authentication of Binary Images in PNG Scheme,” International Journal of Computer Science and Format Based on a Secret Sharing Technique,” in Proceedings Network Security, Vol. 8, no. 4, April 2008, pp. 128-132. of IEEE International Conference on System and Engineering, [19] Li Fang, Ya-Min Li, Bin Yu, “Multi Secret Visual Cryptography Taipei, July 2010, pp. 506-510. based on Reversed Images,” in Proceeding of 3rd IEEE International [8] R. Youmaran, A. Adler, A. Miri, “An Improved Visual Conference on Information and Computing, 2010, pp. 195-198. Cryptography Scheme for Secret Hiding,” in Proceedings of 23 rd [20] Thomas Monoth, Babu Anto P, “Contrast Enhanced Visual IEEE Biennial Symposium on Communications, 2006, p p . Cryptography Schemes based on Additional Pixel Pattern,” in 340-343. Proceeding of IEEE International Conference on Cyberworlds, 2010, pp. 171-178. © 2011 ACEEE 9 DOI: 01.IJNS.02.04. 525