Signature based authentication using contrast enhanced hierarchical visual cryptography

Idea stated in this paper describes the application of hierarchical visual cryptography to the authentication system. This is an alternative approach for fingerprint based authentication mechanism. Fingerprint based authentication mechanism have two major problems: repetitiveness during authentication and non acceptability for some users. In proposed system, the signature of a person is taken as input which is encrypted using hierarchical visual cryptography. HVC divides input signature into four resultant shares. Among four shares, any three are taken to generate key share. Remaining share is handed over to the user and the key share is placed on authentication system. Both the shares appear in scrambled format but upon superimposition, the secret is revealed. HVC encrypts the input secret in hierarchical manner hence more secrecy is maintained in the shares. Shares generated out of this scheme are expansion less. Original secret size is retained while encrypting the secret. While authenticating, user have to produce his/her share to the authentication system. Card reader reads the share and stacks with one which is available in database. Upon stacking signature is revealed and the enrollment number of the share is retrieved indicating that the person is authentic.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  K.R. Venugopal,et al.  Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[3]  W. Z. Gandhare,et al.  Secure Iris Authentication Using Visual Cryptography , 2010, ArXiv.

[4]  Shefali Sonavane,et al.  Multi-Share Crypt-Stego Authentication System , 2013 .

[5]  Li-Guo Fang,et al.  Multi-secret Visual Cryptography Based on Reversed Images , 2010, 2010 Third International Conference on Information and Computing.

[6]  Chao-Wen Chan,et al.  A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme , 2008 .

[7]  P. Babu Anto,et al.  Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns , 2010, 2010 International Conference on Cyberworlds.

[8]  Anand Sharma,et al.  Visual cryptography improvises the security of tongue as a biometric in banking system , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[9]  Yi-Hui Chen,et al.  Authentication Mechanism for Secret Sharing Using Boolean Operation , 2012 .

[10]  Abhinav Aggarwal,et al.  Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.

[11]  Y.V.S. Rao,et al.  Fingerprint based authentication application using visual cryptography methods (Improved ID card) , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.