A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES

Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5

Abstract

A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.

Authors and Affiliations

Ratheesh V. R , Jogesh J , Jayamohan M

Keywords

Related Articles

A SURVEY OF SKYLINE PROCESSING IN VARIOUS ENVIRONMENT

Skyline queries which received an interesting attention to the database and data mining field and its main advantage is it is used for multi-criteria decision making. Advanced query operators, such as skyline queries are...

THE MAIN FEATURE FOR SUCCESSFUL IMPLEMENTATION A DATA WAREHOUSE

Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management A lot has been done in this field regarding design and development of data warehouses and a l...

REGRESSION TESTING : TABU SEARCH TECHNIQUE FOR CODE COVERAGE

Software testing is one of the most expensive and critical activities which carries out every time in order to give a best quality of a software product. Here the regression testing which is based on testing mechanism is...

Comparative analysis of Recurrent and Finite Impulse Response Neural Networks in Time Series Prediction

The purpose of this paper is to perform evaluation of two different neural network architectures used for solving temporal problems, i.e. time series prediction. The data sets in this project include Mackey-Glass, Sunspo...

A GLFES and DFT Technique for Feature Selection in High-Dimensional Imbalanced dataset

Feature selection has been an active research area in pattern recognition, statistics ,and data mining communities Feature selection, is a preprocessing step to machine learning, is effective in reducing dimensionality,...

Download PDF file
  • EP ID EP100015
  • DOI -
  • Views 166
  • Downloads 0

How To Cite

Ratheesh V. R, Jogesh J, Jayamohan M (2014). A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES. Indian Journal of Computer Science and Engineering, 5(5), 190-195. https://europub.co.uk/articles/-A-100015