Journal Homepage: www.ijcst.org

Gespeichert in:
Bibliographische Detailangaben
Titel: Journal Homepage: www.ijcst.org
Autoren: M. Agnihotra Sharma, M. Chinna Rao
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Quelle: http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf.
Bestand: CiteSeerX
Schlagwörter: Index Terms — Visual Cryptography, Extended Visual Cryptography, 2D Data Matrix Code, Data Matrix Code, Seed Image and Share Image
Beschreibung: — An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner.
Publikationsart: text
Dateibeschreibung: application/pdf
Sprache: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470; http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
Verfügbarkeit: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.470
http://www.ijcst.org/Volume2/Issue8/p10_2_8.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Dokumentencode: edsbas.34728FE3
Datenbank: BASE
Beschreibung
Abstract:— An Identity Card is any document which may be used to verify aspects of a identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). It plays in the society, threats of fraud, tampering, and identity theft arises. Thus, security and authenticity of these ID cards and their owners prove to be of much necessity. This paper goal is to make use of Visual Cryptography and 2D data matrix codes to address these issues. Visual Cryptography is a secret sharing scheme where a confidential image is encrypted into noise-like secure shares, which can be reconstructed visually by superimposing the shares. Extended Visual Cryptography on the other hand, makes use of recognizable images as shares to the confidential image. In this paper, the information in the ID cards are encoded into two 2D data matrix codes, which then are used in the two levels of extended visual cryptography. The first level provides authentication of the ID card, and the second level secures the identity of the ID card owner.