A Hash Based Visual Cryptography Scheme for Image Authentication

Download Now
Provided by: Auricle Technologies
Topic: Security
Format: PDF
In this paper, the authors have proposed a hash based visual cryptography scheme for image authentication. The secret image to be transmitted is encoded into two shadow images called user share and key share. The hash cryptographic algorithm is applied on each share, and the resultant hash codes are concatenated with the shares and sent to communication participants. The same hash is used to verify the sender at the receiving end. Then the shares are stacked together to recover the original secret image. From the results obtained in their analysis, they conclude that the proposed scheme provides not only confidentiality but also image authentication.
Download Now

Find By Topic