Visual Secret Sharing between Remote Participants
Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses th...
Gespeichert in:
Veröffentlicht in: | International journal of computer applications 2014-01, Vol.103 (2), p.8-17 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 17 |
---|---|
container_issue | 2 |
container_start_page | 8 |
container_title | International journal of computer applications |
container_volume | 103 |
creator | Buckley, N Nagar, A K Arumugam, S |
description | Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology. |
doi_str_mv | 10.5120/18044-8931 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1629343059</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3473279181</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1731-c9decbde0d071606631362e323716bec1be17a93cdd33228e8798b3b1e10d7f63</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyJEd3bS_ThK0SoUFKtel81moin5qLsJ4r83tR7EucwMPLy8PIydAr-cg-BXoHmWpdogHLAJN2qeaq3V4Z_7mM1i3PBx0AhpsgmD1yoOrk7W5AP1yfrdhap9S3LqP4na5Imarqfk0YW-8tXWtX08YUelqyPNfveUvdzePC_u0tXD8n5xvUo9KITUm4J8XhAvuALJpURAKQgFjm9OHnIC5Qz6okAUQpNWRueYAwEvVClxys73udvQfQwUe9tU0VNdu5a6IVqQwmCGfG5G9OwfuumG0I7tRgpUhmhkNlIXe8qHLsZApd2GqnHhywK3O4H2R6DdCcRvuyxftw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1617433964</pqid></control><display><type>article</type><title>Visual Secret Sharing between Remote Participants</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Buckley, N ; Nagar, A K ; Arumugam, S</creator><creatorcontrib>Buckley, N ; Nagar, A K ; Arumugam, S</creatorcontrib><description>Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/18044-8931</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Algorithms ; Complement ; Cryptography ; Encryption ; Prototypes ; Stacking ; Visual</subject><ispartof>International journal of computer applications, 2014-01, Vol.103 (2), p.8-17</ispartof><rights>Copyright Foundation of Computer Science 2014</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1731-c9decbde0d071606631362e323716bec1be17a93cdd33228e8798b3b1e10d7f63</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Buckley, N</creatorcontrib><creatorcontrib>Nagar, A K</creatorcontrib><creatorcontrib>Arumugam, S</creatorcontrib><title>Visual Secret Sharing between Remote Participants</title><title>International journal of computer applications</title><description>Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.</description><subject>Algorithms</subject><subject>Complement</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Prototypes</subject><subject>Stacking</subject><subject>Visual</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyJEd3bS_ThK0SoUFKtel81moin5qLsJ4r83tR7EucwMPLy8PIydAr-cg-BXoHmWpdogHLAJN2qeaq3V4Z_7mM1i3PBx0AhpsgmD1yoOrk7W5AP1yfrdhap9S3LqP4na5Imarqfk0YW-8tXWtX08YUelqyPNfveUvdzePC_u0tXD8n5xvUo9KITUm4J8XhAvuALJpURAKQgFjm9OHnIC5Qz6okAUQpNWRueYAwEvVClxys73udvQfQwUe9tU0VNdu5a6IVqQwmCGfG5G9OwfuumG0I7tRgpUhmhkNlIXe8qHLsZApd2GqnHhywK3O4H2R6DdCcRvuyxftw</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Buckley, N</creator><creator>Nagar, A K</creator><creator>Arumugam, S</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140101</creationdate><title>Visual Secret Sharing between Remote Participants</title><author>Buckley, N ; Nagar, A K ; Arumugam, S</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1731-c9decbde0d071606631362e323716bec1be17a93cdd33228e8798b3b1e10d7f63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Complement</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Prototypes</topic><topic>Stacking</topic><topic>Visual</topic><toplevel>online_resources</toplevel><creatorcontrib>Buckley, N</creatorcontrib><creatorcontrib>Nagar, A K</creatorcontrib><creatorcontrib>Arumugam, S</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Buckley, N</au><au>Nagar, A K</au><au>Arumugam, S</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Visual Secret Sharing between Remote Participants</atitle><jtitle>International journal of computer applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>103</volume><issue>2</issue><spage>8</spage><epage>17</epage><pages>8-17</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/18044-8931</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2014-01, Vol.103 (2), p.8-17 |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_1629343059 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Algorithms Complement Cryptography Encryption Prototypes Stacking Visual |
title | Visual Secret Sharing between Remote Participants |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T03%3A20%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Visual%20Secret%20Sharing%20between%20Remote%20Participants&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Buckley,%20N&rft.date=2014-01-01&rft.volume=103&rft.issue=2&rft.spage=8&rft.epage=17&rft.pages=8-17&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/18044-8931&rft_dat=%3Cproquest_cross%3E3473279181%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1617433964&rft_id=info:pmid/&rfr_iscdi=true |