Proceeding of

National Conference

on

Recent Trends in Mobile

and Cloud Computing

(NCRMC-2014)

17-18 December, 2014

 

as

A Special Issue of

International Journal of Computer Science and Applications

(ISSN:0974-1011)

Chief Patron

Shri Banwarilal Purohit 

Chairman,RCOEM

 

Shri Govindlal Agarwal

General Secretary, RCOEM

 

Patron

 

 Prof. Q.H.Jeevaji

Director, DMT, RCOEM

 

Dr. R.S. Pande

Principal,RCOEM

 

Conveners

Dr. M. B. Chandak

(Head, Dept. of CSE)

 

Co-convener

Dr. A. J. Agrawal

 

Organizing Committee

Prof. M. R. Wanjari

Prof. S. G. Mundhada

Prof. A.V. Buche

Prof. N. N. Tirpude

Prof. K. P. Khurana

Prof. D. A. Borikar

Prof. A. R. Raipurkar

Organized by

Description: RCOEM_Logo.png

Dept of Computer Science & Engineering,

Shri Ramdeobaba College of Engineering and Management, Nagpur 440013.

Website: www.rknec.edu

 

In association with

Description: logo.dept.science.gif

Department of Science & Technology

 

 

Editor

K. H. Walse

M.S.India

 

 

 

   
   
   
   
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
IJCSA ISSN: 0974-1011 (Online) >>    
Title:

Secure Authentication Using Visual Cryptography

Author:

Deepti Chaudhary and Rashmi Welekar                       

 

Abstract

Visual Cryptography is a cryptographic technique which allows visual information (text, picture, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Visual Cryptography deals with any type of secrets such as printed or pictures, etc. These secrets are delivered into the system in a digital (image) form. The secrets which are in a digital form divided into different parts based on the pixel of the digital secret. These parts are called shares. To visualize the secret, the shares are then overlapped correctly.This paper introduces secure authentication using Visual Cryptography. In any authentication system the major problem is the authenticity of the customer. Due to unavoidable hacking of the database on the internet, it is always difficult to trust the information on the internet. To solve this authentication problem, we are discussing with the two most important topics based on image processing and visual cryptography.


2015 International Journal of Computer Science and Applications 

Published by Research Publications, India