Skip to main content

Secret Code Authentication Using Enhanced Visual Cryptography

  • Conference paper
  • First Online:
Emerging Research in Electronics, Computer Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 248))

Abstract

Secret code (password) is widely used in many applications like data transfer, sharing data, and login to emails or internet banking. So a big necessity to have a strong authentication to secure all our applications is as possible. In this paper, we present a new approach to authenticate password using Enhanced visual cryptography (EVC). Visual cryptography is a secret sharing scheme in which an image is converted into shares. No information can be revealed by observing any share. The information about the original image will be obtained on after stacking sufficient number of shares. We have a new approach to authentication secret code using our 2-out-of-2 EVC which provides efficient authentication for e-banking and other internet application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir A (1979) How to share a secret. Comm ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  2. Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of advances in cryptology EUROCRYPT’ 94, LNCS, Springer, pp 1–12

    Google Scholar 

  3. Monoth T, Babu Anto P (2009) Achieving optimal contrast in visual cryptography schemes without pixel expansion. Int J Recent Trends Eng 1(1)

    Google Scholar 

  4. Ogiela MR, Ogiela U (2009) Linguistic cryptographic threshold schemes. Int J Future Gener Comm Network 2(1):33–40

    Google Scholar 

  5. Rajendra AB, Sheshadri HS (2012) A study on visual secret sharing schemes using biometric authentication techniques. AJCST 1:157–160

    Google Scholar 

  6. Manimurugan S, Porkumaran K (2011) A new fast and efficient visual cryptography scheme for medical images with forgery detection. In: Proceedings of IEEE international conference on emerging trends in electrical and computer technology (ICETECT) 2011, pp 594–599

    Google Scholar 

  7. Blundo C, University of Salerno, De Santis A, Stinson DR, University of Nebraska-Lincon (1996) On the contrast in visual cryptography scheme

    Google Scholar 

  8. Radha N, Karthikeyan S (2010) A study on biometric template security. ICTACT J Soft Comput 01

    Google Scholar 

  9. Stinson D (1999) Visual cryptography and threshold schemes. IEEE Potentials 18(1):13–16

    Article  Google Scholar 

Download references

Acknowledgments

I thank my guide Dr. H S Sheshadri, professor and dean (research) for supporting to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajendra Ajjipura Basavegowda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Ajjipura Basavegowda, R., Holalu Seenappa, S. (2014). Secret Code Authentication Using Enhanced Visual Cryptography. In: Sridhar, V., Sheshadri, H., Padma, M. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 248. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1157-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1157-0_8

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1156-3

  • Online ISBN: 978-81-322-1157-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics