Steganography Based Visual Cryptography (SBVC)

A digital signature performs the function of conventional handwritten signatures for authentication of documents, data integrity and non-repudiation. Most of the conventional digital signature schemes are based on complex mathematical computations to generate the keys and verify signatures. In late nineteen century comparatively less computation based scheme known as visual cryptography (VC) is introduced. VC has high security and requires comparatively less complex computations. In this paper, we consider a new digital signature scheme, based on the concept of Visual Secret Sharing associated to XOR-based non-expansion visual cryptography systems. Our proposed scheme is towards enhancement of security of born digital and digitized document by generating visual shares and embedding them within a cover image using steganographic techniques rather than complicated mathematical computations. The proposed scheme could be applied for ownership protection, copy control, authentication of digital media etc.

[1]  Alaa H. Alhamami,et al.  A New Approach for Authentication Technique , 2005 .

[2]  Ning Liu,et al.  Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[3]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Chi-Sung Laih,et al.  Generating visible RSA public keys for PKI , 2003, International Journal of Information Security.

[6]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[7]  V. Sridhar,et al.  Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[8]  Gwoboa Horng,et al.  A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..

[9]  Wanhua Cao,et al.  Visual Cryptography for General Access Structure by Multi-pixel Encoding with Variable Block Size , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.

[10]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[11]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[12]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[13]  Regunathan Radhakrishnan,et al.  Data Masking: A New Approach for Steganography? , 2005, J. VLSI Signal Process..

[14]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.