2014 IEEE National Conference on Communication, Signal Processing and Networking (NCCSN) 2014
DOI: 10.1109/nccsn.2014.7001156
|View full text |Cite
|
Sign up to set email alerts
|

Biometric privacy using visual cryptography, halftoning and watermarking for multiple secrets

Abstract: It is important to secure the privacy of digital face image that are stored in central database. To impart privacy to such biometric face images, first the digital face image is split into two such that, each of it gives no idea of existence of the original face image and the original image can be retrieved only when both split images available. To achieve this, Visual Cryptography, Halftoning along with Digital Watermarking are employed. The method can be extended to preserve the privacy of a maximum of any n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 8 publications
0
0
0
Order By: Relevance
“…It allows two ways of cryptography: symmetric uses the same key for encryption and decryption but asymmetric cryptosystem uses one key (public key) for encryption and another related key for decryption (private key). A digital signature scheme is a special type of asymmetric cryptographic primitive whereas electronic code book mode, cipher feedback mode, feedback chaining cipher mode and counter cipher mode of operation are symmetric cryptographic primitives [5]. Each can be used in wide variety of applications.…”
mentioning
confidence: 99%
“…It allows two ways of cryptography: symmetric uses the same key for encryption and decryption but asymmetric cryptosystem uses one key (public key) for encryption and another related key for decryption (private key). A digital signature scheme is a special type of asymmetric cryptographic primitive whereas electronic code book mode, cipher feedback mode, feedback chaining cipher mode and counter cipher mode of operation are symmetric cryptographic primitives [5]. Each can be used in wide variety of applications.…”
mentioning
confidence: 99%