Visual Secret Sharing between Remote Participants

Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2014-01, Vol.103 (2), p.8-17
Hauptverfasser: Buckley, N, Nagar, A K, Arumugam, S
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 17
container_issue 2
container_start_page 8
container_title International journal of computer applications
container_volume 103
creator Buckley, N
Nagar, A K
Arumugam, S
description Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.
doi_str_mv 10.5120/18044-8931
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1629343059</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3473279181</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1731-c9decbde0d071606631362e323716bec1be17a93cdd33228e8798b3b1e10d7f63</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyJEd3bS_ThK0SoUFKtel81moin5qLsJ4r83tR7EucwMPLy8PIydAr-cg-BXoHmWpdogHLAJN2qeaq3V4Z_7mM1i3PBx0AhpsgmD1yoOrk7W5AP1yfrdhap9S3LqP4na5Imarqfk0YW-8tXWtX08YUelqyPNfveUvdzePC_u0tXD8n5xvUo9KITUm4J8XhAvuALJpURAKQgFjm9OHnIC5Qz6okAUQpNWRueYAwEvVClxys73udvQfQwUe9tU0VNdu5a6IVqQwmCGfG5G9OwfuumG0I7tRgpUhmhkNlIXe8qHLsZApd2GqnHhywK3O4H2R6DdCcRvuyxftw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1617433964</pqid></control><display><type>article</type><title>Visual Secret Sharing between Remote Participants</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Buckley, N ; Nagar, A K ; Arumugam, S</creator><creatorcontrib>Buckley, N ; Nagar, A K ; Arumugam, S</creatorcontrib><description>Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/18044-8931</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Algorithms ; Complement ; Cryptography ; Encryption ; Prototypes ; Stacking ; Visual</subject><ispartof>International journal of computer applications, 2014-01, Vol.103 (2), p.8-17</ispartof><rights>Copyright Foundation of Computer Science 2014</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1731-c9decbde0d071606631362e323716bec1be17a93cdd33228e8798b3b1e10d7f63</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Buckley, N</creatorcontrib><creatorcontrib>Nagar, A K</creatorcontrib><creatorcontrib>Arumugam, S</creatorcontrib><title>Visual Secret Sharing between Remote Participants</title><title>International journal of computer applications</title><description>Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.</description><subject>Algorithms</subject><subject>Complement</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Prototypes</subject><subject>Stacking</subject><subject>Visual</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyJEd3bS_ThK0SoUFKtel81moin5qLsJ4r83tR7EucwMPLy8PIydAr-cg-BXoHmWpdogHLAJN2qeaq3V4Z_7mM1i3PBx0AhpsgmD1yoOrk7W5AP1yfrdhap9S3LqP4na5Imarqfk0YW-8tXWtX08YUelqyPNfveUvdzePC_u0tXD8n5xvUo9KITUm4J8XhAvuALJpURAKQgFjm9OHnIC5Qz6okAUQpNWRueYAwEvVClxys73udvQfQwUe9tU0VNdu5a6IVqQwmCGfG5G9OwfuumG0I7tRgpUhmhkNlIXe8qHLsZApd2GqnHhywK3O4H2R6DdCcRvuyxftw</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Buckley, N</creator><creator>Nagar, A K</creator><creator>Arumugam, S</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140101</creationdate><title>Visual Secret Sharing between Remote Participants</title><author>Buckley, N ; Nagar, A K ; Arumugam, S</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1731-c9decbde0d071606631362e323716bec1be17a93cdd33228e8798b3b1e10d7f63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Complement</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Prototypes</topic><topic>Stacking</topic><topic>Visual</topic><toplevel>online_resources</toplevel><creatorcontrib>Buckley, N</creatorcontrib><creatorcontrib>Nagar, A K</creatorcontrib><creatorcontrib>Arumugam, S</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Buckley, N</au><au>Nagar, A K</au><au>Arumugam, S</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Visual Secret Sharing between Remote Participants</atitle><jtitle>International journal of computer applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>103</volume><issue>2</issue><spage>8</spage><epage>17</epage><pages>8-17</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Visual cryptography and random grids are forms of visual secret sharing that encrypt a secret image into indecipherable shares. Decryption occurs by printing them onto transparencies and stacking, but this requires participants to be in the physical presence of each other, so this paper addresses the use of visual secret sharing between remote, incommunicado agents. To this end, a prototype application has been developed to form a subpixel matrix of a photographed share that is one half of a (2, 2) scheme. It is algorithmically "stacked" with its stored complement to decrypt the secret. The implemented algorithms are presented, as well as visual results for variations of three values of three photographic condition metrics. Although only a third of the total results proved positive, recommendations are given regarding photographic conditions to significantly improve accuracy. Furthermore, we suggest a number of applications of this technology.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/18044-8931</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2014-01, Vol.103 (2), p.8-17
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_1629343059
source EZB-FREE-00999 freely available EZB journals
subjects Algorithms
Complement
Cryptography
Encryption
Prototypes
Stacking
Visual
title Visual Secret Sharing between Remote Participants
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T03%3A20%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Visual%20Secret%20Sharing%20between%20Remote%20Participants&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Buckley,%20N&rft.date=2014-01-01&rft.volume=103&rft.issue=2&rft.spage=8&rft.epage=17&rft.pages=8-17&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/18044-8931&rft_dat=%3Cproquest_cross%3E3473279181%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1617433964&rft_id=info:pmid/&rfr_iscdi=true