International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 140 | Views: 252

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016


Development of Visual Cryptography Technique for Authentication using Facial Images

Bhagyashri P. Kandalkar [2] | Gopal D. Dalavi


Abstract: The Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. Cryptography is the science of maintaining private information whether communicated over secured or unsecured channel from unofficial access, of ensuring data privacy, integrity and authentication, and other tasks. In this project, I am presenting a novel technique of in the Development of Visual Cryptography Using low complexity algorithm (Modular operation), bit shifting algorithm and image is encrypted at Secret sharing method. In encryption secret image is converted into number of share. In this project Secret sharing approach is being proposed for increasing the security of the data. For increasing the security we are basically concentrating on the key part of the cryptography we basically uses the Low complexity and bit shifting algorithm which is designed by the user. Encryption can be perform by dividing number ( Total number of pieces of information n=8, The no. of pieces of info which are sufficient for reconstruction k=3) of share. For decryption all the shares are need to be superimposed in proper sequence (for that n=8, k=2). Visual Cryptography (VC) is a technique which encrypts the image and converts it into unreadable format with the help of key by decrypting the image we get original secret image.


Keywords: Low complexity algorithm, visual cryptography, bit shifting


Edition: Volume 5 Issue 12, December 2016,


Pages: 712 - 717


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top