Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/6102
Title: | Analysis and design of tamperproof and contrastenhanced secret sharing based on visual cryptography schemes |
Researcher: | Thomas Monoth |
Guide(s): | Babu Anto P |
Keywords: | Cryptography Steganography Digital Watermarking |
Upload Date: | 2-Jan-2013 |
University: | Kannur University |
Completed Date: | August 2011 |
Abstract: | The concept of secret sharing was independently introduced by Shamir and Blakley in 1979. Secret sharing becomes indispensable whenever secret information needs to be kept collectively by a group of participants in such a way that only a qualified subgroup is able to reconstruct the secret. An example of such a scheme is a k-out-of-n threshold secret sharing, in which there are n participants holding their shares of the secret and every k (k and#8804; n) participants can collectively recreate the secret, while k-1 participants cannot get any information about the secret. The need for secret sharing arises if the storage system is not reliable and secure. Secret sharing is also useful if the owner of the secret does not trust any single person. This concept was first applied to numbers; but in 1990s, researchers extended it to images. Visual cryptography implements secret sharing of images. In 1995, Naor and Shamir invented a new type of secret sharing scheme, called visual cryptography (VC). Visual cryptography is a kind of secret image sharing scheme that uses the human visual system to perform the decryption computation. A visual cryptography scheme (VCS) allows confidential messages to be encrypted into k-out-of-n secret sharing schemes. VC is interesting because decryption can be done with no prior knowledge of cryptography and can be performed without any cryptographic computations. Visual cryptography scheme eliminates complex computation problems in the decryption process and the secret images can be restored by stacking operation. This property makes visual cryptography useful for low computation requirements. Contrast is one of the most important parameters of visual cryptography schemes. Usually, the reconstructed secret image will be darker than the original secret image. This thesis presents three different methods to improve the contrast of visual cryptography schemes. |
Pagination: | 197p. |
URI: | http://hdl.handle.net/10603/6102 |
Appears in Departments: | Department of Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 168.28 kB | Adobe PDF | View/Open |
02_dedication.pdf | 98.12 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 205.88 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 203.85 kB | Adobe PDF | View/Open | |
05_acknowledgements.pdf | 163.35 kB | Adobe PDF | View/Open | |
06_contents.pdf | 203.33 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 132.38 kB | Adobe PDF | View/Open | |
08_list of abbreviations.pdf | 138.14 kB | Adobe PDF | View/Open | |
09_list of figures.pdf | 135.47 kB | Adobe PDF | View/Open | |
10_list of tables.pdf | 179 kB | Adobe PDF | View/Open | |
11_chapter 1.pdf | 483.01 kB | Adobe PDF | View/Open | |
12_chapter 2.pdf | 783.87 kB | Adobe PDF | View/Open | |
13_chapter 3.pdf | 1.63 MB | Adobe PDF | View/Open | |
14_chapter 4.pdf | 615.44 kB | Adobe PDF | View/Open | |
15_chapter 5.pdf | 603.12 kB | Adobe PDF | View/Open | |
16_chapter 6.pdf | 251.33 kB | Adobe PDF | View/Open | |
17_author publications.pdf | 230.53 kB | Adobe PDF | View/Open | |
18_references.pdf | 248.27 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: