Visual secret sharing using Newton interpolation polynomial and mod operator with PNG images
Autor: | M P Deepika, A Sreekumar |
---|---|
Rok vydání: | 2017 |
Předmět: |
Computer science
business.industry Data security 020207 software engineering Portable Network Graphics 02 engineering and technology computer.file_format Computer security computer.software_genre Encryption Secret sharing Visual cryptography Visualization 0202 electrical engineering electronic engineering information engineering Key (cryptography) business computer Interpolation |
Zdroj: | 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS). |
DOI: | 10.1109/iciiecs.2017.8275917 |
Popis: | Nowadays digitized personal data is common, since technology progresses day by day. Even more of emphasis is on data security today than there has ever been. So protecting these types of data in a secure way which does not obstruct the access of an authorized authority and which does not reveal any information related to the original personal data if any unauthorized person gets the access of it. Visual cryptography is very special data security method which provides a very powerful technique by which one visual secret can be distributed into two or more shares. When shares on transparencies are super imposes exactly together, the original secret can be discovered without any complicated algorithm or computer participation. In this paper we are trying to give a foundation to visual cryptography by giving all the related and important back ground details. We start by focusing on the first traditional visual cryptography and then continue by listing major or striking modifications over that in the area visual cryptography. We have also proposed a method of sharing visual information, in PNG image format, with honest participants using Newton Interpolation Polynomial equations and Mod operator. The main features in the proposed scheme is, the involvement of a key both in sharing phase of the secret as well as the reconstruction phase and that can be used to verify the honesty of the participants. |
Databáze: | OpenAIRE |
Externí odkaz: |