A VISUAL CRYPTOGRAPHIC SCHEME FOR OWNER AUTHENTICATION USING EMBEDDED SHARES
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5
Abstract
A new scheme for user authentication is proposed using visual cryptography and digital watermarking. The original image, mostly the photograph of the authorized person is split into shares. One of the shares is kept within the server and the other one will be printed on the identification card issued to the user. The personal information unique to the user along with his signature will be embedded within the printed share. Least significant bit watermark insertion algorithm has been used for embedding data. Experiments show that the method is efficient and effective. It was possible to retrieve the watermark information from the printed share read through a reading device with no distortion. The method can be implemented with minimum processing cost.
Authors and Affiliations
Ratheesh V. R , Jogesh J , Jayamohan M
RANK LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in...
IDENTIFYING NETWORK LOAD BALANCING REQUIREMENTS ON HISTORICAL TRAFFIC FLOW USING MACHINE LEARNING APPROACH FOR FLEXIBLE MULTIPATH NETWORKS
Multipath routing uses several paths to distribute traffic from a source to destination. This not only improves network performance but also achieves load balancing and fault tolerance. Though multipath routing is not de...
PERFORMANCE OF CONCURRENCY CONTROL MECHANISMS IN CENTRALISED DATABASE SYSTEMS
The objective of this study is to propose user control system that definitely increases the performance of realtime data service. However the most existing work on this RTDB was based on very critical closed loop control...
IMPROVED PROBABILISTIC INTEGRATED OBJECT RECOGNITION AND TRACKING (PIORT) METHODOLOGY
A thinning algorithm is used to reduce unnecessary information by peeling objects layer by layer so that the result is sufficient to allow topological analysis. It has several applications, but is particularly useful for...
Xilinx and Modelsim Habitat for Design of ECC Co-Processor Architecture
Xilinx is a most significant synthesizing tool for controller design in various engineering field specifically industrial engineering, instrumentation engineering, robotics, telecommunication, computer science engineerin...