A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5
Abstract
A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.
Authors and Affiliations
Ratheesh V. R , Jogesh J , Jayamohan M
An Overview of MANET: History, Challenges and Applications
We have seen the advancement in the field of internet due to wireless networking technologies. It gives rise to many new applications. In the past of few decades, we have seen the advancement in wireless networks. The em...
ENHANCED RABIN ALGORITHM BASED ERROR CONTROL MECHANISM FOR WIRELESS SENSOR NETWORKS
In wireless sensor nodes, the data transmitted from the sensor nodes are prune to corruption by induced errors by noisy channels and other relevant parameters. Hence it is always vital to provide an effective and efficie...
COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE
Many techniques were proposed for detecting code clone. In this paper we have compared the metrics based on speed, quality and their cost as these are the most that affects due to code clone. The strength and weakness of...
QOS PARAMETER ANALYSIS ON AODV AND DSDV PROTOCOLS IN A WIRELESS NETWORK
Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To imp...
IMPLEMENTATION OF AN OPTIMIZATION TECHNIQUE FOR IMPROVING POWER QUALITY IN THE DISTRIBUTED SYSTEM
This paper deals with the Distributed Generation (DG) capacity of the electrical power system. DG capacity is formulated as a Mixed Integer Programming (MIP) problem with respect to various operating constraints in power...