Secure Mail using Visual Cryptography (SMVC)
Title | Secure Mail using Visual Cryptography (SMVC) |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Ajish, S., Rajasree, R. |
Conference Name | Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on |
Date Published | July |
Keywords | CFB mode encryption, chaos, chaos based image encryption algorithm, chaos-based image encryption algorithm, data privacy, dynamic s-box algorithm, e-mail messaging, Electronic mail, Encryption, gray scale image, Heuristic algorithms, image processing, Internet standards, low frequency wavelet coefficient, message authentication, OpenPGP, personal security, pretty good privacy, public key based image authentication method, public key cryptography, receipent mail box, receiver side, Receivers, secure mail using visual cryptography, SMVC, transmission medium, visual cryptography, visualization, wavelet decomposition, wavelet transform, wavelet transforms |
Abstract | The E-mail messaging is one of the most popular uses of the Internet and the multiple Internet users can exchange messages within short span of time. Although the security of the E-mail messages is an important issue, no such security is supported by the Internet standards. One well known scheme, called PGP (Pretty Good Privacy) is used for personal security of E-mail messages. There is an attack on CFB Mode Encryption as used by OpenPGP. To overcome the attacks and to improve the security a new model is proposed which is "Secure Mail using Visual Cryptography". In the secure mail using visual cryptography the message to be transmitted is converted into a gray scale image. Then (2, 2) visual cryptographic shares are generated from the gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform and authenticated using Public Key based Image Authentication method. One of the shares is send to a server and the second share is send to the receipent's mail box. The two shares are transmitted through two different transmission medium so man in the middle attack is not possible. If an adversary has only one out of the two shares, then he has absolutely no information about the message. At the receiver side the two shares are fetched, decrypted and stacked to generate the grey scale image. From the grey scale image the message is reconstructed. |
URL | https://ieeexplore.ieee.org/document/6963148 |
DOI | 10.1109/ICCCNT.2014.6963148 |
Citation Key | 6963148 |
- OpenPGP
- wavelet transforms
- wavelet transform
- wavelet decomposition
- visualization
- visual cryptography
- transmission medium
- SMVC
- secure mail using visual cryptography
- Receivers
- receiver side
- receipent mail box
- public key cryptography
- public key based image authentication method
- pretty good privacy
- personal security
- CFB mode encryption
- message authentication
- low frequency wavelet coefficient
- Internet standards
- Image Processing
- Heuristic algorithms
- gray scale image
- encryption
- Electronic mail
- e-mail messaging
- dynamic s-box algorithm
- data privacy
- chaos-based image encryption algorithm
- chaos based image encryption algorithm
- chaos