Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Visual Secret Sharing between Remote Participants

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 103 - Number 2
Year of Publication: 2014
Authors:
N. Buckley
A. K. Nagar
S. Arumugam
10.5120/18044-8931

N Buckley, A k Nagar and S Arumugam. Article: Visual Secret Sharing between Remote Participants. International Journal of Computer Applications 103(2):8-17, October 2014. Full text available. BibTeX

@article{key:article,
	author = {N. Buckley and A.k. Nagar and S. Arumugam},
	title = {Article: Visual Secret Sharing between Remote Participants},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {103},
	number = {2},
	pages = {8-17},
	month = {October},
	note = {Full text available}
}

Abstract

Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.

References

  • APACS (2012) Fraud – The Facts [online] Available at: [Accessed 27th March 2014] pp 52-58
  • Chen, T. & Tsao, K. (2011). Threshold visual secret sharing by random grids. The Journal of Systems and Software, 84(7). pp 1197-1208
  • Fang, W. (2011). Offline QR Code Authorization Based on Visual Cryptography. Seventh International conference on Intelligent Information Hiding and Multimedia Signal Processing. pp 89-92
  • Filardo, N. W. & Ateniese, G. (2011). High-Entropy Visual Identification for Touch Screen Devices. John Hopkins University, Baltimore. pp 1-16
  • Ibrahim, M. H. (2012). New Capabilities of Visual Cryptography. International Journal of computer Science Issues, 9(5). pp 225-231
  • Jin, D. , Yan, W. & Kankanhalli, M. S. (2005). Progressive color visual cryptography. Journal of Electronic Imaging, 14(3). pp 1-13
  • Kafri, O. & Keren, E. (1987) Image encryption by multiple random grids. Optical Letters 12(6). pp 377–379
  • Liu, F. , Wu, C. K. & Lin, X. J. (2008). The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography, 50(2). pp 215-227
  • Machizaud, J. , Chavel, P. & Fournel, T. (2011). Fourier-based automatic alignment for improved visual cryptography schemes. Optics Express, 19(23). pp 22709-22722
  • Murray-West, R. (2011) Facebook cambpaign by angry HSBC customers over new online security key, The Telegraph [online] Available at: [Accessed 27th March 2014]
  • Naor, M. & Shamir A. (1994). Visual Cryptography. EUROCRYPT 1994. pp 1-12
  • Sivasankari, S. & George, V. S. (2012). Implementation of Stenography within Visual Cryptography. 2012 International Conference on Computing and Control Engineering. pp 1-5
  • Tuyls, P. , Hollmann, H. D. L. , Van Lint, J. H. & Tolhuizen, L. (2005). XOR-based Visual Cryptography Schemes. Designs, Codes and Cryptography, 37(1). pp 169-186
  • Wu, X. & Sun, W. (2013). Improving the visual quality of random grid-based visual secret sharing. Signal Processing, 93(5). pp 977-995