TY - GEN
T1 - A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems
AU - Prakasha, Krishna
AU - Kalkur, Rachana
AU - Acharya, Vasundhara
AU - Muniyal, Balachandra
AU - Khandelwal, Mayank
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.
AB - Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.
UR - http://www.scopus.com/inward/record.url?scp=85061112575&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061112575&partnerID=8YFLogxK
U2 - 10.1007/978-981-13-5826-5_45
DO - 10.1007/978-981-13-5826-5_45
M3 - Conference contribution
AN - SCOPUS:85061112575
SN - 9789811358258
T3 - Communications in Computer and Information Science
SP - 578
EP - 590
BT - Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers
A2 - Thampi, Sabu M.
A2 - Rawat, Danda B.
A2 - Alcaraz Calero, Jose M.
A2 - Madria, Sanjay
A2 - Wang, Guojun
PB - Springer Verlag
T2 - 6th International Symposium on Security in Computing and Communications, SSCC 2018
Y2 - 19 September 2018 through 22 September 2018
ER -