Please use this identifier to cite or link to this item:
Title: Analysis and design of tamperproof and contrastenhanced secret sharing based on visual cryptography schemes
Researcher: Thomas Monoth
Guide(s): Babu Anto P
Keywords: Cryptography
Digital Watermarking
Upload Date: 2-Jan-2013
University: Kannur University
Completed Date: August 2011
Abstract: The concept of secret sharing was independently introduced by Shamir and Blakley in 1979. Secret sharing becomes indispensable whenever secret information needs to be kept collectively by a group of participants in such a way that only a qualified subgroup is able to reconstruct the secret. An example of such a scheme is a k-out-of-n threshold secret sharing, in which there are n participants holding their shares of the secret and every k (k and#8804; n) participants can collectively recreate the secret, while k-1 participants cannot get any information about the secret. The need for secret sharing arises if the storage system is not reliable and secure. Secret sharing is also useful if the owner of the secret does not trust any single person. This concept was first applied to numbers; but in 1990s, researchers extended it to images. Visual cryptography implements secret sharing of images. In 1995, Naor and Shamir invented a new type of secret sharing scheme, called visual cryptography (VC). Visual cryptography is a kind of secret image sharing scheme that uses the human visual system to perform the decryption computation. A visual cryptography scheme (VCS) allows confidential messages to be encrypted into k-out-of-n secret sharing schemes. VC is interesting because decryption can be done with no prior knowledge of cryptography and can be performed without any cryptographic computations. Visual cryptography scheme eliminates complex computation problems in the decryption process and the secret images can be restored by stacking operation. This property makes visual cryptography useful for low computation requirements. Contrast is one of the most important parameters of visual cryptography schemes. Usually, the reconstructed secret image will be darker than the original secret image. This thesis presents three different methods to improve the contrast of visual cryptography schemes.
Pagination: 197p.
Appears in Departments:Department of Information Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File168.28 kBAdobe PDFView/Open
02_dedication.pdf98.12 kBAdobe PDFView/Open
03_certificate.pdf205.88 kBAdobe PDFView/Open
04_declaration.pdf203.85 kBAdobe PDFView/Open
05_acknowledgements.pdf163.35 kBAdobe PDFView/Open
06_contents.pdf203.33 kBAdobe PDFView/Open
07_abstract.pdf132.38 kBAdobe PDFView/Open
08_list of abbreviations.pdf138.14 kBAdobe PDFView/Open
09_list of figures.pdf135.47 kBAdobe PDFView/Open
10_list of tables.pdf179 kBAdobe PDFView/Open
11_chapter 1.pdf483.01 kBAdobe PDFView/Open
12_chapter 2.pdf783.87 kBAdobe PDFView/Open
13_chapter 3.pdf1.63 MBAdobe PDFView/Open
14_chapter 4.pdf615.44 kBAdobe PDFView/Open
15_chapter 5.pdf603.12 kBAdobe PDFView/Open
16_chapter 6.pdf251.33 kBAdobe PDFView/Open
17_author publications.pdf230.53 kBAdobe PDFView/Open
18_references.pdf248.27 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: