Visual Cryptography encrypts the secret or key into 'n' shares or portions and distributes them to a group of 'n' participants. The secret is recovered only when shares of all the participants in the group are stacked upon one another depending on the method used. This technique eliminates complex computations during decryption. It uses simple OR or XOR Boolean operations. Once the secret is revealed, it is no more a secret. So, a new secret acts as a key, that is to be again shared confidentially. The same process is performed and new shares are generated and distributed. The generation and distribution of shares must be done every time when a new secret or a combinational key is shared. In this paper, a trusted third party generates the shares and distributes it to the group of participants. It also generates an extra share for itself. To reveal the secret, the third party's share is also used along with other participants shares. Every time when the secret is to be changed, the third party regenerates its share only, instead of generating shares for all participants. This method reduces the overhead of regeneration and redistribution of shares to all participants with every change of the secret or key. This method of key management also retains the perfect contrast and security. The OR based method leads to noise during recovery. XOR based operations during recovery recovers lossless image. So, XOR operation is more preferable during recovery of the secret.
Increasing security has always been an issue since Internet and Web Development came into existence, text based passwords is not enough to counter such problems, which is also an anachronistic approach now. Therefore, this demands the need for something more secure along with being more user-friendly. Therefore, this system has to increase the security by involving a 3-level security approach, involving text based password at Level 1, Image Based Authentication at Level 2,slider based password authentication is implemented, at Level 3 password key such as 9 secret character's should be used. Thus an assiduous effort has been done for the Shoulder attack, Tempest attack, and Brute-force attack at client side, through the use of unique image set in the IBA System Authentication plays a crucial role in protecting resources against unauthorized and illegal use. Security at this level has been imposed by using Text based password (with special characters), which is a usual and now an anachronistic approach. At this level the security has been imposed using Image based authentication (IBA), where the user will be asked to select from the two difficulty levels. Both the levels will be having three unique Image grids, from where the user has to select three images, one from each grid. After the successful clearance of the above two levels, the 3-Level Security System will then generate a one-time numeric password that would be valid just for that login session. Any hacker if in the extreme case, suppose (although difficult) will cross through the above two mentioned security levels, will definitely not be able to cross the third security level.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.