Journal Homepage: www.ijcst.org
Saved in:
| Title: | Journal Homepage: www.ijcst.org |
|---|---|
| Authors: | M. Agnihotra Sharma, M. Chinna Rao |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf. |
| Collection: | CiteSeerX |
| Subject Terms: | Index Terms — Visual Cryptography, Extended Visual Cryptography, 2D Data Matrix Code, Data Matrix Code, Seed Image and Share Image |
| Description: | — An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470; http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470 http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.34728FE3 |
| Database: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Sharma%20MA Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.34728FE3 RelevancyScore: 750 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 750 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Journal Homepage: www.ijcst.org – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22M%2E+Agnihotra+Sharma%22">M. Agnihotra Sharma</searchLink><br /><searchLink fieldCode="AR" term="%22M%2E+Chinna+Rao%22">M. Chinna Rao</searchLink> – Name: Author Label: Contributors Group: Au Data: The Pennsylvania State University CiteSeerX Archives – Name: TitleSource Label: Source Group: Src Data: <i>http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf</i>. – Name: Subset Label: Collection Group: HoldingsInfo Data: CiteSeerX – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Index+Terms+—+Visual+Cryptography%22">Index Terms — Visual Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Extended+Visual+Cryptography%22">Extended Visual Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%222D+Data+Matrix+Code%22">2D Data Matrix Code</searchLink><br /><searchLink fieldCode="DE" term="%22Data+Matrix+Code%22">Data Matrix Code</searchLink><br /><searchLink fieldCode="DE" term="%22Seed+Image+and+Share+Image%22">Seed Image and Share Image</searchLink> – Name: Abstract Label: Description Group: Ab Data: — An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner. – Name: TypeDocument Label: Document Type Group: TypDoc Data: text – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470; http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf – Name: URL Label: Availability Group: URL Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470<br />http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf – Name: Copyright Label: Rights Group: Cpyrght Data: Metadata may be used without restrictions as long as the oai identifier remains attached to it. – Name: AN Label: Accession Number Group: ID Data: edsbas.34728FE3 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.34728FE3 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: Index Terms — Visual Cryptography Type: general – SubjectFull: Extended Visual Cryptography Type: general – SubjectFull: 2D Data Matrix Code Type: general – SubjectFull: Data Matrix Code Type: general – SubjectFull: Seed Image and Share Image Type: general Titles: – TitleFull: Journal Homepage: www.ijcst.org Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: M. Agnihotra Sharma – PersonEntity: Name: NameFull: M. Chinna Rao – PersonEntity: Name: NameFull: The Pennsylvania State University CiteSeerX Archives IsPartOfRelationships: – BibEntity: Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science