Multi user Authentication Protocol using Visual Sceret Sharing

Krishna Prakasha, K and Muniyal, Balachandra and Srushti, . and Shetty, Deeksha (2016) Multi user Authentication Protocol using Visual Sceret Sharing. In: International Conference on Innovative Computation Technologies, 26/08/2016, Coimbatore,Tamilnadu.

[img] PDF
319.pdf - Published Version
Restricted to Registered users only

Download (637kB) | Request a copy
Official URL:


— Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is a very important, as it prevents unauthorized person from accessing the confidential file and protects it by allowing only authorized members to use it. We authenticate the user by assigning image password using the visual secret sharing scheme. This protocol is best suited for a file which can be used by more than one user at a time with equal rights. It prevents only one user using it without other user members knowing about it. Here, access to the confidential file is not given even if a small part of the password is incorrect.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: visual-cryptography;security; authentication;
Subjects: Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 18 Oct 2016 15:20
Last Modified: 18 Oct 2016 15:20

Actions (login required)

View Item View Item