Skip to main content

2017 | OriginalPaper | Buchkapitel

Secret Information Sharing Using Extended Color Visual Cryptography

verfasst von : Shivam Sharma, Shivam Modi, Akanksha Sharma

Erschienen in: Computing and Network Sustainability

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digitization of personal data is resulting in nefarious activities encircling them which in return perpetually call for immediate implementation of data security method, cryptography being one of them wherein sender can securely transmit the data over a secure platform. Sender can encrypt the data by encoding the text in an image, and receiver on another part can decode the message by collecting the respective shares. Generations of shares, where slight changes are performed accordingly, are implemented using XNOR operation. Until and unless all the shares are received by the receiver, the secret cannot be decoded, which provides an immense scope of security. Also alteration of the shares formed is not possible, and this gives a great perception of security issue being solved.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Li C, Wu A (2010) Simple topology estimating approaches for complex networks. In: 2010 international conference on intelligent system design and engineering application. IEEE Li C, Wu A (2010) Simple topology estimating approaches for complex networks. In: 2010 international conference on intelligent system design and engineering application. IEEE
3.
Zurück zum Zitat Vignesh R, Sudharssun SS, Jegadish Kumar KJ (2009) Limitations of quantum and the versatility of classical cryptography: a comparative study. In: ICECS’09. Second international conference on IEEE environmental and computer science Vignesh R, Sudharssun SS, Jegadish Kumar KJ (2009) Limitations of quantum and the versatility of classical cryptography: a comparative study. In: ICECS’09. Second international conference on IEEE environmental and computer science
4.
Zurück zum Zitat Ameena MN, Binish MC (2014) Image encryption based on diffusion process and multiple chaotic maps. In: 2014 international conference on power signals control and computations (EPSCICON). IEEE Ameena MN, Binish MC (2014) Image encryption based on diffusion process and multiple chaotic maps. In: 2014 international conference on power signals control and computations (EPSCICON). IEEE
5.
Zurück zum Zitat Naor M, Shamir A (1995) Visual cryptography. Advances in cryptology—EUROCRYPT’94. Springer, Berlin Naor M, Shamir A (1995) Visual cryptography. Advances in cryptologyEUROCRYPT’94. Springer, Berlin
6.
Zurück zum Zitat Das S et al (2012) A secured key-based digital text passing system through color image pixels. In: 2012 international conference on advances in engineering, science and management (ICAESM). IEEE Das S et al (2012) A secured key-based digital text passing system through color image pixels. In: 2012 international conference on advances in engineering, science and management (ICAESM). IEEE
7.
Zurück zum Zitat Huang Y-J, Chang J-D (2013) Non-expanded visual cryptography scheme with authentication. In: 2013 IEEE international symposium on next-generation electronics (ISNE). IEEE Huang Y-J, Chang J-D (2013) Non-expanded visual cryptography scheme with authentication. In: 2013 IEEE international symposium on next-generation electronics (ISNE). IEEE
8.
Zurück zum Zitat Dixit S, Jain DK, Saxena A (2014) An approach for secret sharing using randomised visual secret sharing. In: 2014 fourth international conference on communication systems and network technologies (CSNT). IEEE Dixit S, Jain DK, Saxena A (2014) An approach for secret sharing using randomised visual secret sharing. In: 2014 fourth international conference on communication systems and network technologies (CSNT). IEEE
9.
Zurück zum Zitat Deepa AK, Benziger B (2014) Embedded extended visual cryptography scheme for color image using ABC algorithm. In: 2014 12th international conference on signal processing (ICSP). IEEE Deepa AK, Benziger B (2014) Embedded extended visual cryptography scheme for color image using ABC algorithm. In: 2014 12th international conference on signal processing (ICSP). IEEE
10.
Zurück zum Zitat Kamath M et al (2012) Extended visual cryptography for color images using coding tables. In: 2012 international conference on communication, information and computing technology (ICCICT). IEEE Kamath M et al (2012) Extended visual cryptography for color images using coding tables. In: 2012 international conference on communication, information and computing technology (ICCICT). IEEE
11.
Zurück zum Zitat Rajput PK (2013) A novel multi secret sharing scheme with MSB extraction using EVCS. In: 2013 sixth international conference on contemporary computing (IC3). IEEE Rajput PK (2013) A novel multi secret sharing scheme with MSB extraction using EVCS. In: 2013 sixth international conference on contemporary computing (IC3). IEEE
Metadaten
Titel
Secret Information Sharing Using Extended Color Visual Cryptography
verfasst von
Shivam Sharma
Shivam Modi
Akanksha Sharma
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3935-5_41

Neuer Inhalt