Secret Information Sharing Using Extended Color Visual Cryptography

被引:0
作者
Sharma, Shivam [1 ]
Modi, Shivam [1 ]
Sharma, Akanksha [1 ]
机构
[1] Vellore Inst Technol, Dept Informat Technol, Vellore, Tamil Nadu, India
来源
COMPUTING AND NETWORK SUSTAINABILITY | 2017年 / 12卷
关键词
Decryption; Encryption; Visual cryptography; XNOR;
D O I
10.1007/978-981-10-3935-5_41
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Digitization of personal data is resulting in nefarious activities encircling them which in return perpetually call for immediate implementation of data security method, cryptography being one of them wherein sender can securely transmit the data over a secure platform. Sender can encrypt the data by encoding the text in an image, and receiver on another part can decode the message by collecting the respective shares. Generations of shares, where slight changes are performed accordingly, are implemented using XNOR operation. Until and unless all the shares are received by the receiver, the secret cannot be decoded, which provides an immense scope of security. Also alteration of the shares formed is not possible, and this gives a great perception of security issue being solved.
引用
收藏
页码:403 / 412
页数:10
相关论文
共 11 条
  • [1] Ameena MN, 2014, 2014 INT C POW SIGN
  • [2] Das S, 2012, 2012 INT C ADV ENG S
  • [3] Deepa AK, 2014, 2014 12 INT C SIGN P
  • [4] Dixit S, 2014, 2014 4 INT C COMM SY
  • [5] Huang Y-J, 2013, IEEE INT C BIOINFORM
  • [6] Hunter Philip, 2012, Engineering & Technology, V7, P78, DOI 10.1049/et.2012.0815
  • [7] Li C, 2010, 2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM)
  • [8] Naor M., 1995, ADV CRYPTOLOGY EUROC
  • [9] Rajput PK, 2013, 2013 6 INT C CONT CO
  • [10] Shailesh KR, 2012, INT C EMERG TRENDS E