The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For secure data transmission over internet, it is important to transfer data in high security and high confidentiality, information security is the most important issue of data communication in networks and internet. To secure transferred information from intruders, it is important to convert the information into cryptic format. Different methods used to ensure data security and confidentiality during...
A number of approaches have been developed for image steganography till date but none have used quadtree partition scheme. The quadtree partition is used to divide the image on the basis of variations among the pixel values and therefore we can identify the fine grained and coarse grained areas inside the image. It is very much comfortable and effective to hide something in the roadside scrub rather...
The digital image data transmission and storage in today's cyberspace has increase with privacy and security concerns. Digital media collected from different sources such as surveillance systems, forensic databases, medical images are very sensitive hence security concerns regarding the safe transmission and authentication of such digital data across secured and unsecured communication channels needs...
Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. The confidentiality and integrity of the data during communication depends partially on algorithm and partially on key. Due to human memorizability the size of key in cryptography is limited....
From thousands of years back our predecessors have invented several ways of passing information in hidden form with other objects like papyrus scroll, cryptex etc. As decades crossed through earth's vein we are getting matured and invented several steganographic systems for message passing. The availability of internet in every corner of the universe forced the user of steganographic systems to invent...
Visual secret sharing scheme (for short the VSS scheme) with access structure based on graph \cite{ABSS96} has been proposed and this can be considered as an extension of $(2, n) $-threshold VSS scheme. Ateniese et al. showed a decomposition method that we decompose star graphs from a given graph which edges are specified by qualified sets. Namely, two participants (vertices in a given graph) has...
Cryptography is the art of securing information by making sure that the secret can be understood only by the right person. Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network...
Theft of a template is theft of identity Fingerprint identification is used by forensic department in identifying criminals because of its uniqueness. Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits. Fingerprint identification is commonly employed in Forensic science to support criminal investigations and in...
Visual Cryptography is an encryption technique where a secret image is cryptographically encoded into n meaningless share images. In visual secret sharing scheme (k, n) the secret images can be visually revealed by stacking together any k or more transparencies of the shares and by inspecting less than k shares, one cannot retrieve the secret image. In Visual Secret Sharing based on halftoning, the...
In this paper a secret message/image transmission technique has been proposed through (2, 2) visual cryptographic shares which are covered by meaningful images so that a potential eavesdropper won't know there's a message to be read. A binary image is taken as cover image and authenticating message/image has been fabricated into it through a hash function where two bits in each pixel within four bits...
Biometrics is the detailed measurements of the human body. Biometrics deals with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioural characteristics. Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among the various...
Verifiability is essential for a secret sharing approach which allows the involved participants to detect cheaters during the secret retrieval process. In this article, we propose a verifiable secret image sharing scheme that can not only resist dishonest participants but can also satisfy the requirements of loss less and camouflage. The new approach conceals the shadows into a pixel pair of the host...
With the recent advances in internet and multimedia technologies by which the exchange and the transmission of information became easy, encryption methods have been proposed to protect confidential and secure digital data from illegal access. In this paper, we propose a new image encryption model that uses the Frei-Chen bases. The projections of the Frei-Chen bases on the image are used to represent...
In this paper we are proposing a technique for secret communication between Alice and Bob. We are using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th bit locations or 7th and 8th bit locations or 6 and 8 bit locations of...
With the increased use of digital images in numerous fields, especially sensitive ones like medicine and military where confidentiality is extremely important, their encryption has become mandatory. This paper depicts our proposed digital image encryption technique which employs two types of non-linear pixel transformation and the traditional Hill cipher which is a Matrix Transformation (MT). While...
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies, there is a huge data transaction in mobile, internet, TV, teleconferencing, telemedicine and military applications. For all these applications we need a security. Encryption is one of way to give the security for data; in this regard we propose a hybrid approach for partial...
A system employing entropy reduction on layout data to manage and track physical intellectual property (IP) is presented. Using a combination of symbolic encoding, canonical reduction, lossless compression and cryptographic hash functions, this system provides an efficient, scalable, robust and extensible method for tracking geometrical layout from design through manufacturing and into production...
In the field of medicine, storing images in a secure way has become a challenge. In order to face this challenge of security, we propose an algorithm based on visual cryptography for black and white medical images. Here, we bring out a new approach to visual cryptography. The main advantage of this system is that there is no necessity for post processing of the image without which a good quality of...
With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality,...
This paper proposes a novel confusion and diffusion algorithm for image encryption based on logistic map and cheat image. We choose the initial condition and control parameter of logistic map as the secret key. The cheat image selected from the most common images in public network, together with the chaotic matrices generated by logistic maps, is employed both in encryption and decryption processes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.