{"title":"Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing","authors":"Manas Abhilash Gundapuneni, Anzum Bano, Navjot Singh","doi":"10.1109/UEMCON51285.2020.9298166","DOIUrl":null,"url":null,"abstract":"This paper provides an approach to a new encryption architecture using double layer encryption standards for the existing secret sharing methodology. The image encryption standard in this scheme deals with both gray scale and color images and provides the experimental results. The paper deals with the transmission of multimedia such as images over insecure and secure networks, secret sharing helps to mask the image from the attacker by breaking it down to shares which are not at all related in the sense of content to the original image and provide the security of only reconstructing the original image when the client has all the shares.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"211 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper provides an approach to a new encryption architecture using double layer encryption standards for the existing secret sharing methodology. The image encryption standard in this scheme deals with both gray scale and color images and provides the experimental results. The paper deals with the transmission of multimedia such as images over insecure and secure networks, secret sharing helps to mask the image from the attacker by breaking it down to shares which are not at all related in the sense of content to the original image and provide the security of only reconstructing the original image when the client has all the shares.