Multi user authentication protocol using visual sceret sharing

Prakasha K. Krishna, Balachandra Muniyal, Srushti, Deeksha Shetty

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is a very important, as it prevents unauthorized person from accessing the confidential file and protects it by allowing only authorized members to use it. We authenticate the user by assigning image password using the visual secret sharing scheme. This protocol is best suited for a file which can be used by more than one user at a time with equal rights. It prevents only one user using it without other user members knowing about it. Here, access to the confidential file is not given even if a small part of the password is incorrect.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Inventive Computation Technologies, ICICT 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume2016
DOIs
Publication statusPublished - 2016
Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
Duration: 26-08-201627-08-2016

Conference

Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
CountryIndia
CityCoimbatore
Period26-08-1627-08-16

Fingerprint

Authentication
Cryptography
Protect-It

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics

Cite this

Krishna, P. K., Muniyal, B., Srushti, & Shetty, D. (2016). Multi user authentication protocol using visual sceret sharing. In Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016 (Vol. 2016). [7830205] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/INVENTIVE.2016.7830205
Krishna, Prakasha K. ; Muniyal, Balachandra ; Srushti ; Shetty, Deeksha. / Multi user authentication protocol using visual sceret sharing. Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Vol. 2016 Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{6df7ad9002074500aca23c9b23aeb68f,
title = "Multi user authentication protocol using visual sceret sharing",
abstract = "Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is a very important, as it prevents unauthorized person from accessing the confidential file and protects it by allowing only authorized members to use it. We authenticate the user by assigning image password using the visual secret sharing scheme. This protocol is best suited for a file which can be used by more than one user at a time with equal rights. It prevents only one user using it without other user members knowing about it. Here, access to the confidential file is not given even if a small part of the password is incorrect.",
author = "Krishna, {Prakasha K.} and Balachandra Muniyal and Srushti and Deeksha Shetty",
year = "2016",
doi = "10.1109/INVENTIVE.2016.7830205",
language = "English",
volume = "2016",
booktitle = "Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Krishna, PK, Muniyal, B, Srushti & Shetty, D 2016, Multi user authentication protocol using visual sceret sharing. in Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. vol. 2016, 7830205, Institute of Electrical and Electronics Engineers Inc., 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India, 26-08-16. https://doi.org/10.1109/INVENTIVE.2016.7830205

Multi user authentication protocol using visual sceret sharing. / Krishna, Prakasha K.; Muniyal, Balachandra; Srushti; Shetty, Deeksha.

Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Vol. 2016 Institute of Electrical and Electronics Engineers Inc., 2016. 7830205.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Multi user authentication protocol using visual sceret sharing

AU - Krishna, Prakasha K.

AU - Muniyal, Balachandra

AU - Srushti,

AU - Shetty, Deeksha

PY - 2016

Y1 - 2016

N2 - Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is a very important, as it prevents unauthorized person from accessing the confidential file and protects it by allowing only authorized members to use it. We authenticate the user by assigning image password using the visual secret sharing scheme. This protocol is best suited for a file which can be used by more than one user at a time with equal rights. It prevents only one user using it without other user members knowing about it. Here, access to the confidential file is not given even if a small part of the password is incorrect.

AB - Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is a very important, as it prevents unauthorized person from accessing the confidential file and protects it by allowing only authorized members to use it. We authenticate the user by assigning image password using the visual secret sharing scheme. This protocol is best suited for a file which can be used by more than one user at a time with equal rights. It prevents only one user using it without other user members knowing about it. Here, access to the confidential file is not given even if a small part of the password is incorrect.

UR - http://www.scopus.com/inward/record.url?scp=85022037189&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85022037189&partnerID=8YFLogxK

U2 - 10.1109/INVENTIVE.2016.7830205

DO - 10.1109/INVENTIVE.2016.7830205

M3 - Conference contribution

VL - 2016

BT - Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Krishna PK, Muniyal B, Srushti, Shetty D. Multi user authentication protocol using visual sceret sharing. In Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Vol. 2016. Institute of Electrical and Electronics Engineers Inc. 2016. 7830205 https://doi.org/10.1109/INVENTIVE.2016.7830205