Downloads: 155 | Views: 526
Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.8 / 10
A Review Paper on Development of Visual Cryptography Technique for Authentication Using Facial Images
Bhagyashri P. Kandalkar, G. D. Dalavi
Abstract: Cryptography refers to the study of science and art for achieving security by encode the messages to make them the data is not readable. For example the readable message is converted into an unreadable message by using cryptographic system and this process called well-structured and systematic. The Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. In this project, I am presenting a novel technique of in the Development of Visual Cryptography Using low complexity algorithm and bit shifting which image is encrypted at multiple levels using low complexity and bit shifting algorithm method. In encryption secret image is converted into monochromatic image i. e. Red, Green and Blue channels are separated and each channel encrypted using low complexity and bit shifting algorithm. It is a bitwise operation. In this project a modified approach is being proposed for increasing the security of the data. For increasing the security we are basically concentrating on the key part of the cryptography we basically uses the Low complexity and bit shifting algorithm which is designed by the user. Shares obtain at each level are stored in database using that database image is encrypted to further levels. For decryption all the shares are need to be superimposed in proper sequence using these two algorithms. Sender encrypts the message using the secret key and then sends it to the receiver. The receiver decrypts the message to get the secret information. Visual Cryptography (VC) is a technique which encrypts the image and converts it into unreadable format with the help of key by decrypting the image we get original secret image. This paper provides a higher level of security for Development of visual cryptography technique for authentication using facial images.
Keywords: Visual Cryptography, Security, bitwise operation, Cryptography, Encrypting, Decrypting
Edition: Volume 5 Issue 1, January 2016
Pages: 8 - 12
DOI: https://www.doi.org/10.21275/NOV152524
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1015 - 1019A High Performance Data Encryption and Masking Using AES Algorithm
Poornima TN, Dr. Somashekar K
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022
Pages: 143 - 144Blockchain Based Access Control System for Cloud Storage
Kamisetty Vinay
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022
Pages: 1295 - 1299Implementation of Elliptic Curve Cryptography Processor for FPGA Applications
Ch. Venkateswarlu, Nirmala Teegala
Downloads: 101
Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1054 - 1061Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade, Dimple Chaudhari
Downloads: 103
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2142 - 2145Image Cryptography Based Upon Scrambling and Random Integer
Gurpreet Singh, Lovleen Kaur