A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES

Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5

Abstract

A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.

Authors and Affiliations

Ratheesh V. R , Jogesh J , Jayamohan M

Keywords

Related Articles

Connectionist Network and its Application for Optimization

Connectionist network is the network of processing elements. These processing elements are connected with each other. It suggests that we may consider it as the fully connected network. The processing elements of this ne...

IMPLEMENTATION OF IMAGE PROCESSING IN REAL TIME CAR PARKING SYSTEM

Car parking lots are an important object class in many traffic and civilian applications. With the problems of increasing urban traffic congestion and the ever increasing shortage of space, these car parking lots are nee...

LAR VS DSR: EVALUATION OF AD HOC NETWORK PROTOCOLS IN PRACTICAL MANAGEMENT OF COMMUNICATION OF ROBOTS

Controlling and managing of robots and their information communication to each other is an important issue, and wireless technologies without infrastructure like Ad hoc networks due to their quick trigger and cost slight...

ARTIFICIAL NEURAL NETWORK BASED CLASSIFICATION OF AUSTENITIC STAINLESS STEEL WELD DEFECTS IN TOFD TECHNIQUE

In this paper, an automatic detection system to recognize welding defects based on Time of flight diffraction technique is described. The proposed classification consists in detecting the four types of austenitic stainle...

BYZANTINE FAULT TOLERANCE MODEL FOR SOAP FAULTS

The proposed model is to configure Byzantine Fault Tolerance mechanism for every SOAP fault message that is transmitted. The reliability and availability are of major requirements of Web services since they operate in th...

Download PDF file
  • EP ID EP100015
  • DOI -
  • Views 145
  • Downloads 0

How To Cite

Ratheesh V. R, Jogesh J, Jayamohan M (2014). A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES. Indian Journal of Computer Science and Engineering, 5(5), 190-195. https://europub.co.uk/articles/-A-100015