Malik et al., 2011 - Google Patents
Novel authentication system using visual cryptographyMalik et al., 2011
- Document ID
- 6967819436503900887
- Author
- Malik S
- Aggarwal A
- Sardana A
- et al.
- Publication year
- Publication venue
- 2011 World Congress on Information and Communication Technologies
External Links
Snippet
An array of encryption techniques has been proposed for providing data security. However, most of the traditional cryptography methods require complex algorithms for encryption and decryption. Visual cryptography is a technique which provides confidentiality without any …
- 230000000007 visual effect 0 title abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Malik et al. | Novel authentication system using visual cryptography | |
Ullah et al. | Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey | |
Qadir et al. | A review paper on cryptography | |
US11336446B2 (en) | System and method for generating and depositing keys for multi-point authentication | |
CN104243494B (en) | A kind of data processing method | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN110138548B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol | |
Kulyk et al. | Coercion-resistant proxy voting | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN110098925B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number | |
Singamaneni et al. | A novel multi-qubit quantum key distribution Ciphertext-policy attribute-based encryption model to improve cloud security for consumers | |
Zhang et al. | A High‐Quality Authenticatable Visual Secret Sharing Scheme Using SGX | |
Guo et al. | A novel quantum proxy blind signature scheme | |
Sen et al. | Find out the innovative techniques of data sharing using cryptography by systematic literature review | |
CN106487495B (en) | Lightweight RFID authentication method based on integer chaos | |
Al-Saidi et al. | Password authentication based on fractal coding scheme | |
CN110113152B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and digital signature | |
CN110086627B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp | |
Kumar et al. | User authentication using visual cryptography | |
Li | An improved lightweight and privacy preserving authentication scheme for smart grid communication | |
Choudhury et al. | Cryptanalysis of ‘A novel user-participating authentication scheme’ | |
Zhou et al. | Fast Settlement Scheme of Aviation Business Privacy Preservation Based on Consortium Blockchain | |
CN110519223B (en) | Anti-quantum computing data isolation method and system based on asymmetric key pair | |
Adjei et al. | Anonymous Signcryption for Securing Knowledge Management System | |
Take et al. | E-certificate generation using blockchain for p2p network: An overview |