Journal Homepage: www.ijcst.org

Saved in:
Bibliographic Details
Title: Journal Homepage: www.ijcst.org
Authors: M. Agnihotra Sharma, M. Chinna Rao
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf.
Collection: CiteSeerX
Subject Terms: Index Terms — Visual Cryptography, Extended Visual Cryptography, 2D Data Matrix Code, Data Matrix Code, Seed Image and Share Image
Description: — An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470; http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470
http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.34728FE3
Database: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Sharma%20MA
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.34728FE3
RelevancyScore: 750
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 750
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Journal Homepage: www.ijcst.org
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22M%2E+Agnihotra+Sharma%22">M. Agnihotra Sharma</searchLink><br /><searchLink fieldCode="AR" term="%22M%2E+Chinna+Rao%22">M. Chinna Rao</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: The Pennsylvania State University CiteSeerX Archives
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <i>http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf</i>.
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: CiteSeerX
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Index+Terms+—+Visual+Cryptography%22">Index Terms — Visual Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Extended+Visual+Cryptography%22">Extended Visual Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%222D+Data+Matrix+Code%22">2D Data Matrix Code</searchLink><br /><searchLink fieldCode="DE" term="%22Data+Matrix+Code%22">Data Matrix Code</searchLink><br /><searchLink fieldCode="DE" term="%22Seed+Image+and+Share+Image%22">Seed Image and Share Image</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: — An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: text
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470; http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
– Name: URL
  Label: Availability
  Group: URL
  Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470<br />http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.34728FE3
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.34728FE3
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Index Terms — Visual Cryptography
        Type: general
      – SubjectFull: Extended Visual Cryptography
        Type: general
      – SubjectFull: 2D Data Matrix Code
        Type: general
      – SubjectFull: Data Matrix Code
        Type: general
      – SubjectFull: Seed Image and Share Image
        Type: general
    Titles:
      – TitleFull: Journal Homepage: www.ijcst.org
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: M. Agnihotra Sharma
      – PersonEntity:
          Name:
            NameFull: M. Chinna Rao
      – PersonEntity:
          Name:
            NameFull: The Pennsylvania State University CiteSeerX Archives
    IsPartOfRelationships:
      – BibEntity:
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
              Type: main
ResultId 1