Volume : 2, Issue : 12, DEC 2016

MULTIPLE SECRET SHARING WITH CIRCULAR SHARES OF VISUAL CRYPTOGRAPHY

Dr. G Lakshmeeswari, P Chaitanya

Abstract

Visual Cryptography has its prominence in authentication applications. User authentication is the maiden requirement for a safe communication. The proposed technique hosts multiple secrets in two shares that are circular in shape and reveals the accurate information only on precise specification of stacking angle of the shares. This methodology is mainly aimed at producing meaningful information to the intruder and disguising him that his intrusion was successful. The right user is decided being on the disclosed content.

Keywords

Menarche, Height, Adolescents.

Article : Download PDF

Cite This Article

Article No : 9

Number of Downloads : 870

References

[1] M. Naor and A. Shamir “Visual cryptography”, Lecture notes in Computer Science,(950):1–12, 1995. [2] Tzuung-Her Chen, Chang-Sian Wu, Wei-Bin B. Lee, ” A Novel Subliminal Channel Found in Visual Cryptography and its Application to Image Hiding” D.O.I: 10.1109/IIH-MSP.2007.51 Publication Year: 2007 , Page(s): 421 – 424. [3] L. Ge, S. Tang, “Sharing Multi-secret Based on Circle Properties”, 2008 International Conference on Computational Intelligence and Security”. [4] J. Weir, W-Q Yan, “Sharing Multiple Secrets Using Visual Cryptography”, 978-1-244-3828-0/09/, 2009 IEEE. [5] Z. Fu, B. Yu, “Research on Rotation Visual Cryptography Scheme”, 2009, International Symposium on Information Engineering and Electronic Commerce. [6] Hsien-Chu Wu, Chin-Chen Chang, Sharing visual multi-secrets using circle shares, Elsevier, Volume 28, Issue 1, July 2005, pp 123-135. [7] Lakshmeeswari, G., Rajya Lakshmi, D., Lalitha Bhaskari, D.: Extended Encoding of Telugu Text for Hiding Compatibility. IJCA 30(5) , 2011 [8] Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for Visual Cryptography. Theoretical Computer Science 250(1-2), 143–161 (2001) [9] Yu, B., Xu, X., Fang, L.: Multi-Secret sharing threshold Visual Cryptography Scheme. International Conference on Computational Intelligence and Security (2007) [10] Lakshmeeswari, G., Rajya Lakshmi, D., Srinivas, Y.: A New Encoding Scheme of Telugu Text for Information Hiding. International Journal of Computational Intelligence Techniques 2(1), 26–28 (2011) ISSN: 0976–20466 & E-ISSN: 0976–0474.
[11] Lakshmeeswari, G., Rajya Lakshmi, D., Srinivas, G Hima Bindu: A Model for Encryption of Telugu Text using Visual Cryptography scheme, AISC 177, Springer Verlag Berlin Heidelberg, 2013.