Title | V-CRYPT: A Secure Visual Cryptography System |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Nashrudin, Muhamad Ridhwan Bin, Nasser, Abdullah B., Abdul-Qawy, Antar Shaddad H. |
Conference Name | 2021 International Conference on Software Engineering Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM) |
Date Published | aug |
Keywords | Complexity theory, compositionality, cryptographic techniques, data privacy, election, Encryption, hacker, image processing, Information management, phishing attack, Predictive Metrics, pubcrawl, Resiliency, Scientific computing, Scientific Computing Security, security, visual cryptography, visualization, Voting |
Abstract | Nowadays, peoples are very concerned about their data privacy. Hence, all the current security methods should be improved to stay relevant in this fast-growing technology world. Visual Cryptography (VC) is a cryptographic technique that using the image processing method. The implementation of VC can be varying and flexible to be applied to the system that requires an extra security precaution as it is one of the effective solutions in securing the data exchange between two or more parties. The main purpose of the development of V-CRYPT System is to improve the current VC technique and make it more complex in the encryption and decryption process. V-CRYPT system will let the user enter the key, then select the image that they want to encrypt, and the system will split the image into four shares: share0, share1, share2, share3. Each pixel of the image will be splatted into a smaller block of subpixels in each of the four shares and encrypted as two subpixels in each of the shares. The decryption will work only when the user selects all the shares, and the correct text key is entered. The system will superimpose all the shares and producing one perfect image. If the incorrect key is entered, the resulted image will be unidentified. The results show that V- CRYPT is a valuable alternative to existing methods where its security level is higher in terms of adding a secure key and complexity. |
DOI | 10.1109/ICSECS52883.2021.00110 |
Citation Key | nashrudin_v-crypt_2021 |