IMPLEMENTASI TEKNIK KRIPTOGRAFI VISUAL PADA CITRA KEABUAN DAN BERWARNA UNTUK OTENTIKASI PENGGUNA PADA TRANSAKSI ONLINE

  • Stephanie Imelda Pella(1*)
    Universitas Nusa Cendana
  • Hendro FJ Lami(2)
  • (*) Corresponding Author

Abstract

Visual cryptography (VC) technique encodes an image into two or more shares that appear random in human eyes. In the decryption section, the pixels in the shared images are combined to obtain the information contained in the original image. This study applies visual cryptographic techniques to graysle and color images for user authentication in online transactions using the VC2,2 scheme. The server computer encodes the CAPTCHA image into two shared images that are sent to the user through different channels or applications. To authenticate himself, the user performs an XOR operation on both share images, identifies the information contained in the CAPTCHA and sends it to the server. In encryption test, histogram of the share image has a different pattern from the original image. The description test shows the decrypted image in this study visually has a better quality than the binary image has better quality than binary images.

Downloads

Download data is not yet available.

References

M. Naor and A. Shamir, "Visual cryptography," in Workshop on the Theory and Application of of Cryptographic Techniques, 1994, pp. 1-12.

E. Myodo, K. Takagi, S. Miyaji, and Y. Takishima, "Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique," in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 2114-2117.

K. Shankar and P. Eswaran, "RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography," China Communications, vol. 14, pp. 118-130, 2017.

M. Karolin and D. T. Meyyapan, "RGB based secret sharing scheme in color visual cryptography," International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, 2015.

H. Kaur and P. Khanna, "Biometric template protection using cancelable biometrics and visual cryptography techniques," Multimedia Tools and Applications, vol. 75, pp. 16333-16361, 2016.

H. Abdolrahimpour and E. Shahab, "A short survey of visual cryptography and secret image sharing techniques and applications," International Advanced Research Journal in Science, Engineering and Technology, vol. 4, pp. 58-62, 2017.

G. S. Mary and S. M. Kumar, "Secure grayscale image communication using significant visual cryptography scheme in real time applications," Multimedia Tools and Applications, vol. 79, pp. 10363-10382, 2020.

T. Yuniati and I. Kresna A, "Metode Pembayaran Elektronik yang Aman pada Online Shopping Berbasis Kriptografi Visual," Rekayasa Sistem dan Teknologi Informasi (RESTI), vol. 4, pp. 319-328, 2020.

S. Roy and P. Venkateswaran, "Online payment system using steganography and visual cryptography," in 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science, 2014, pp. 1-5.

S. I. Pella and M. Pella, "Implementation of Visual Cryptography Techique on Square BW Secret Image," Jurnal Media Elektro, vol. 1, pp. 7-12, 2012.

PlumX Metrics

Published
2021-10-14
How to Cite
[1]
S. Pella and H. Lami, “IMPLEMENTASI TEKNIK KRIPTOGRAFI VISUAL PADA CITRA KEABUAN DAN BERWARNA UNTUK OTENTIKASI PENGGUNA PADA TRANSAKSI ONLINE”, JME, vol. 10, no. 2, pp. 65 - 72, Oct. 2021.
Section
Articles