Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 3 of 3
  • Item
    Randomised visual secret sharing scheme for grey-scale and colour images
    (Institution of Engineering and Technology journals@theiet.org, 2018) Mhala, N.C.; Jamal, R.; Pais, A.R.
    Randomised visual secret sharing is an encryption technique that utilises block-based progressive visual secret sharing and discrete cosine transform (DCT) based reversible data embedding technique to recover a secret image. The recovery method is based on progressive visual secret sharing, which recovers the secret image block by block. The existing block based schemes achieve the highest contrast level of 50% for noise-like and meaningful shares. The proposed scheme achieves a contrast level of 70-90% for noise-like and 70-80% for meaningful shares. The enhancement of contrast is achieved by embedding additional information in the shares using DCT-based reversible data embedding technique. Experimental results showed that the proposed scheme restores the secret image with better visual quality in terms of human visual system based parameters. © The Institution of Engineering and Technology 2017.
  • Item
    Verifiable XOR-based visual secret sharing scheme for hyperspectral images
    (SPIE, 2021) Srujana, O.S.; Mhala, N.C.; Pais, A.R.
    Hyperspectral images (HSIs) are the spectral images that provide spatial and spectral information. Unlike multispectral images, these images consist of 100 to 200 bands, which provide a large amount of data to identify minute details of the scene with the help of the spectral signatures. This information is valuable and should be secured while transmitting the HSI over the network. Visual cryptography is a well-known cryptographic method for securing images. It helps in securely transmitting images among n users. It converts visual data into unreadable shares that are transmitted and, stacking these shares together will reveal the image. Many visual secret sharing (VSS) schemes have been proposed in the past decade, which made it easier to hide the visual information from unauthorized users. We have proposed a verifiable XOR-based VSS method for the secure transmission of HSIs. We have introduced a preprocessing step for the image with a band selection technique, which reduces the size of the image and eliminates redundancy. It also includes the detection of the tampered shares. Embedding a verifiable bit in each pixel is performed to test the integrity of the shares. We have assessed the visual quality of the recovered image using quantitative measuring parameters. We also compared them with existing VSS methods. The proposed method recovers the HSI with a self-similarity index of 95% to 99%. The proposed method's experimental results show that the HSI is restored with better visual quality. © 2021 Society of Photo-Optical Instrumentation Engineers (SPIE).
  • Item
    A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution
    (Springer, 2021) Muhammed, A.; Mhala, N.C.; Pais, A.R.
    Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into n shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.