A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES

Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5

Abstract

A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.

Authors and Affiliations

Ratheesh V. R , Jogesh J , Jayamohan M

Keywords

Related Articles

An Overview of MANET: History, Challenges and Applications

We have seen the advancement in the field of internet due to wireless networking technologies. It gives rise to many new applications. In the past of few decades, we have seen the advancement in wireless networks. The em...

ENHANCED RABIN ALGORITHM BASED ERROR CONTROL MECHANISM FOR WIRELESS SENSOR NETWORKS

In wireless sensor nodes, the data transmitted from the sensor nodes are prune to corruption by induced errors by noisy channels and other relevant parameters. Hence it is always vital to provide an effective and efficie...

COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE

Many techniques were proposed for detecting code clone. In this paper we have compared the metrics based on speed, quality and their cost as these are the most that affects due to code clone. The strength and weakness of...

QOS PARAMETER ANALYSIS ON AODV AND DSDV PROTOCOLS IN A WIRELESS NETWORK

Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To imp...

IMPLEMENTATION OF AN OPTIMIZATION TECHNIQUE FOR IMPROVING POWER QUALITY IN THE DISTRIBUTED SYSTEM

This paper deals with the Distributed Generation (DG) capacity of the electrical power system. DG capacity is formulated as a Mixed Integer Programming (MIP) problem with respect to various operating constraints in power...

Download PDF file
  • EP ID EP100015
  • DOI -
  • Views 176
  • Downloads 0

How To Cite

Ratheesh V. R, Jogesh J, Jayamohan M (2014). A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES. Indian Journal of Computer Science and Engineering, 5(5), 190-195. https://europub.co.uk/articles/-A-100015