A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES

Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5

Abstract

A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.

Authors and Affiliations

Ratheesh V. R , Jogesh J , Jayamohan M

Keywords

Related Articles

Link Stability Based Hop By Hop Multicast Protocol For Vanets

Vanets are new emerging and challenging technology that makes an improvisation in traffic safety and efficiency. The constant growth of automobile industry is increasing the demand for car safety and the car to car conne...

SERVICE-ORIENTED CLOUD ARCHITECTURE SCHEMA TO BRIDGE GAP BETWEEN STUDENT, STAFF AND ACADEMIA

Cloud Computing is a new resource platform that offers abundant amount of services for organizations to meet furthermore satisfies the needs without huge and prior investment. When it comes to the development of a cloud,...

Improving the QOS in Video Streaming Multicast

In a streaming video multicast environment a large number of users often request various similar processing on the same stream. Therefore service sharing is feasible, with a large potential of savings in processing cost....

OBJECT BASED SEGMENTATION TECHNIQUES FOR CLASSIFICATION OF SATELLITE IMAGE

Automatic feature extraction of features such as building, roads, vegetation etc., which also includes collapsed, height-changed and removed buildings, require the use of high resolution images. This research is helpful...

ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER

In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goa...

Download PDF file
  • EP ID EP100015
  • DOI -
  • Views 165
  • Downloads 0

How To Cite

Ratheesh V. R, Jogesh J, Jayamohan M (2014). A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES. Indian Journal of Computer Science and Engineering, 5(5), 190-195. https://europub.co.uk/articles/-A-100015