Open Access Open Access  Restricted Access Subscription or Fee Access

To Identify the Fake Passport Using Image Hiding by Visual Cryptography

P. Manjamadha, R. Sankar

Abstract


A major issue for the computer networks is to prevent the information from Threats. To secure the information, cryptography technique has been implemented. By using this technique, data can be encrypted over the network during transmission. Once the data has been sent to the destination, the authorized person (user) will decrypt the data along with the key. The data can be in the form of text, image, audio etc... Visual cryptography technique has been implemented for image. Using the visual cryptography technique, fake passport can be identified. The image can be encrypted and the decryption will be done by the immigration department to identify whether the passport is real or not.


Keywords


Decryption, Encryption, Image, Passport.

Full Text:

PDF

References


Ran-Zan Wang and Shuo-Fang Hsu, “Tagged Visual Cryptography,” IEEE Signal Processing Letters, Vol. 18, No. 11, November 2011.

Xiang Wang, Member, IEEE, Qingqi Pei, Member, IEEE, and Hui Li, “A Lossless Tagged Visual Cryptography Scheme,” IEEE Signal Processing Letters, Vol. 21, No. 7, July 2014.

Pei-Ling chiu and kai-hui Lee, “A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, September 2011.

Young-Chang Hou and Zen-Yu Quan, “Transactions Letters - Progressive Visual Cryptography with Unexpanded Shares,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 21, No. 11, November 2011.

Shyong Jian Shyu and Hung-Wei Jiang “Efficient Construction for Region Incrementing - [1] Visual Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 22, No. 5, May 2012.

Kai-Hui Lee and Pei-Ling Chiu “An Extended Visual Cryptography Algorithm for General Access Structures,” IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, February 2012.

Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Image Process., vol. 4, no. 3, pp. 383–396, 2009.

Ching-Nung Yang, Senior Member, IEEE, and Dao-Shun Wang, Member, IEEE, “Property Analysis of XOR-Based Visual Cryptography,” IEEE transactions on circuits and systems for video technology, vol. 24, no. 2, february 2014.

Xiaotian Wu and Wei Sun “Extended Capabilities for XOR-Based Visual Cryptography,” IEEE transactions on information forensics and security, vol. 9, no. 10, October 2014.

Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, 2006.

Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Image Process., vol. 4, no. 3, pp. 383–396, 2009.

R. Z. Wang, “Region incrementing visual cryptography,” IEEE Signal Process. Lett., vol. 16, no. 8, pp. 659–662, 2009.

M. Naor and A. Shamir, “Visual cryptography,” in Proc. Adv. Cryptography: Eurpocrypt, LNCS 950. 1995, pp. 1–12.

Y. C. Hou, “Visual cryptography for color images,” Patt. .Recognit., vol. 36, no. 7, pp. 1619–1629, 2003.

D. Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 15, no. 3, pp. 033019: 1–13,2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.