A (2,N) Visual Cryptographic Technique for Banking Applications

  • Pal J
  • J.k M
  • Dasgupta K
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in banking operations in the "either or survivor" mode where n is the number of generated shares, from which n-1 is the number of account holders in an account and one share should be kept to the bank authority. In this technique one account holder should stack his/her share with the share of the bank authority and the secret image for user authentication will be revealed. In this technique two consecutive pixels are taken as the one time input for the share generation process. This technique generates shares with less space overhead compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography.

Cite

CITATION STYLE

APA

Pal, J. K., J.k, M., & Dasgupta, K. (2010). A (2,N) Visual Cryptographic Technique for Banking Applications. International Journal of Network Security & Its Applications, 2(4), 118–127. https://doi.org/10.5121/ijnsa.2010.2410

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free