DeepAI
Log In Sign Up

Image Authentication using Visual Cryptography

11/24/2017
by   Rahul Saranjame, et al.
0

This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a counter to the described attack.

READ FULL TEXT
08/15/2021

An authentication model based on cryptography

In this paper we proposed an authentication technique based on the user ...
06/02/2020

Probability theory and public-key cryptography

In this short note, we address a common misconception at the interface o...
02/20/2021

Design of Ciphers based on the Geometric Structure of the Möbius Plane

Till now geometric structures don't play a major role in cryptography. G...
11/05/2019

Breaking the Hidden Irreducible Polynomials Scheme

In 2019 Gómez described a new public key cryptography scheme based on id...
07/30/2019

Code based Cryptography: Classic McEliece

This technical report addresses code-based cryptography and is designed ...
02/10/2020

Product Subset Problem : Applications to number theory and cryptography

We consider applications of Subset Product Problem (SPP) in number theor...
02/09/2018

When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users

We evaluate Tencent's QQ Browser, a popular mobile browser in China with...