Journal Homepage: www.ijcst.org

Saved in:
Bibliographic Details
Title: Journal Homepage: www.ijcst.org
Authors: M. Agnihotra Sharma, M. Chinna Rao
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf.
Collection: CiteSeerX
Subject Terms: Index Terms — Visual Cryptography, Extended Visual Cryptography, 2D Data Matrix Code, Data Matrix Code, Seed Image and Share Image
Description: — An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470; http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470
http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.34728FE3
Database: BASE
Description
Abstract:— An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner.