Image Authentication using Visual Cryptography

11/24/2017
by   Rahul Saranjame, et al.
0

This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a counter to the described attack.

READ FULL TEXT
research
08/15/2021

An authentication model based on cryptography

In this paper we proposed an authentication technique based on the user ...
research
06/02/2020

Probability theory and public-key cryptography

In this short note, we address a common misconception at the interface o...
research
11/05/2019

Breaking the Hidden Irreducible Polynomials Scheme

In 2019 Gómez described a new public key cryptography scheme based on id...
research
02/20/2021

Design of Ciphers based on the Geometric Structure of the Möbius Plane

Till now geometric structures don't play a major role in cryptography. G...
research
12/10/2022

Realization Scheme for Visual Cryptography with Computer-generated Holograms

We propose to realize visual cryptography in an indirect way with the he...
research
07/30/2019

Code based Cryptography: Classic McEliece

This technical report addresses code-based cryptography and is designed ...
research
02/10/2020

Product Subset Problem : Applications to number theory and cryptography

We consider applications of Subset Product Problem (SPP) in number theor...

Please sign up or login with your details

Forgot password? Click here to reset