Secure User Identification Using Visual Cryptography And Encryption Techniques
Abstract
This paper proposes a novel approach for user identification using visual cryptography, leveraging various schemes such as visual secret sharing and halftone schemes. User identifying data is divided into meaningful and meaningless shares, which can be merged to reveal the original content. To enhance security, encryption techniques are employed to conceal the data content, retrievable via decryption. User identification is based on the hidden data content within the shares. One share is stored on the server side while the other is with the user. During authentication, one share is displayed to the user from the server, matched with the user's share. This method ensures secure and unique user identification while preserving data confidentiality. The effectiveness of the proposed approach is demonstrated through experimental evaluation against various encryption and visual cryptography techniques.
References
[2]Y.C. Hou, S.C. Wei, and C.Y. Lin, ―Random- Grid based Visual Cryptography Schemes‖, IEEE Transactions on Circuits and Systems for Video Technology, VOL. 24, NO. 5, May 2014.
[3]R. Solanki, ―Principle of Data Mining‖, McGraw-Hill Publication, India, pp. 386-398, 1998.
[4]M. Naor and A. Shamir, ―Visual cryptography,‖ in Proc. Adv. Cryptology-EUROCRYPT’94, LNCS 950, 1995, pp. 1–12.
[5]S. K Joseph, R. Ramesh , ―Random Grid based Visual Cryptography using a common share‖, 2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India.
[6]T. Chen and K. Tsao, ―User-friendly random-grid-based visual secret sharing‖, IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693-1703, Nov. 2011.
[7]X. Wu and W. Sun, ―Generalized Random Grid and Its Applications in Visual Cryptography‖, IEEE Transactions On Information Forensics And Security, vol. 8, NO. 9, September 2013.
[8] http://bookboon.com/en/visual-cryptography-and-itsapplicationsebook.
[9] Z. Zhou, G. R. Arce, and G. D. Crescenzo, ―Halftone Visual Cryptography,‖ IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, Aug. 2006.
[10] S. Pahuja, S. Kasana, ―Halftone Visual Cryptography For Color Images‖,International Conference on Computer, Communications and Electronics (Comptelix) Manipal University Jaipur, Malaviya National Institute of Technology Jaipur & IRISWORLD, July 01-02, 2017.
[11] T. H. Chen and K. H. Tsao, ―Threshold visual secret sharing by random grids,‖ J. Syst. Software, vol. 84, no. 7, pp. 1197–1208, 2011.