Analysis and design of tamperproof and contrastenhanced secret sharing based on visual cryptography schemes

dc.contributor.guideBabu Anto Pen_US
dc.coverage.spatialComputer Scienceen_US
dc.creator.researcherThomas Monothen_US
dc.date.accessioned2013-01-02T11:27:36Z
dc.date.available2013-01-02T11:27:36Z
dc.date.awardedn.d.en_US
dc.date.completedAugust 2011en_US
dc.date.issued2013-01-02
dc.date.registeredn.d.en_US
dc.description.abstractThe concept of secret sharing was independently introduced by Shamir and Blakley in 1979. Secret sharing becomes indispensable whenever secret information needs to be kept collectively by a group of participants in such a way that only a qualified subgroup is able to reconstruct the secret. An example of such a scheme is a k-out-of-n threshold secret sharing, in which there are n participants holding their shares of the secret and every k (k and#8804; n) participants can collectively recreate the secret, while k-1 participants cannot get any information about the secret. The need for secret sharing arises if the storage system is not reliable and secure. Secret sharing is also useful if the owner of the secret does not trust any single person. This concept was first applied to numbers; but in 1990s, researchers extended it to images. Visual cryptography implements secret sharing of images. In 1995, Naor and Shamir invented a new type of secret sharing scheme, called visual cryptography (VC). Visual cryptography is a kind of secret image sharing scheme that uses the human visual system to perform the decryption computation. A visual cryptography scheme (VCS) allows confidential messages to be encrypted into k-out-of-n secret sharing schemes. VC is interesting because decryption can be done with no prior knowledge of cryptography and can be performed without any cryptographic computations. Visual cryptography scheme eliminates complex computation problems in the decryption process and the secret images can be restored by stacking operation. This property makes visual cryptography useful for low computation requirements. Contrast is one of the most important parameters of visual cryptography schemes. Usually, the reconstructed secret image will be darker than the original secret image. This thesis presents three different methods to improve the contrast of visual cryptography schemes.en_US
dc.description.noteReferences p.183-197en_US
dc.format.accompanyingmaterialNoneen_US
dc.format.dimensions-en_US
dc.format.extent197p.en_US
dc.identifier.urihttp://hdl.handle.net/10603/6102
dc.languageEnglishen_US
dc.publisher.institutionDepartment of Information Technologyen_US
dc.publisher.placeKannuren_US
dc.publisher.universityKannur Universityen_US
dc.relation102en_US
dc.rightsuniversityen_US
dc.source.inflibnetINFLIBNETen_US
dc.subject.keywordCryptographyen_US
dc.subject.keywordSteganographyen_US
dc.subject.keywordDigital Watermarkingen_US
dc.titleAnalysis and design of tamperproof and contrastenhanced secret sharing based on visual cryptography schemesen_US
dc.title.alternative-en_US
dc.type.degreePh.D.en_US

Files

Original bundle

Now showing 1 - 5 of 18
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
168.28 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_dedication.pdf
Size:
98.13 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_certificate.pdf
Size:
205.88 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_declaration.pdf
Size:
203.85 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_acknowledgements.pdf
Size:
163.35 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: