E-Stamp Authentication using Visual Cryptography
E-Stamp Authentication using Visual Cryptography
ABSTRACT:
Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human visual system. The benefit of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique needs cryptographic computation to divide the image into a number of parts let n. k-n secret sharing scheme is a special type of Visual Cryptographic technique where at least a group of k shares out of n shares reveals the secret information, less of it will reveal no information.
PROJECT OUTPUT VIDEO:
EXISTING SYSTEM:
Stamp Paper scam was a big blow in Indian History, Government losses several crores of rupees in this scam. Government is taking many steps to stop these types of scams. In this system we are providing a solution to identify the stamp paper is released by government or it is duplicated one using Visual Cryptography concept.
In EVCS (Extended Visual Cryptography Scheme), the part of the information about the original share images may appear in the recovered secret image. It’s hard to eradicate and this become a challenging problem.
Half toning visual cryptographic method produces a binary image which is composed of black and white pixels. And the image obtained is of low quality.
DISADVANTAGES OF EXISTING SYSTEM:
- The existing system is applied for black and white images.
- The obtained image is of low quality.
- The size of the shares increases.
- It requires more computations.
PROPOSED SYSTEM:
To develop a web based application which will generate the “e-stamp papers” with authentication, so that we can able to find whether the stamp paper is original or duplicate. In our project we have proposed a new k-n secret sharing scheme for color image where encryption (Division) of the image is done using “Random Number generator”. Using the key, the image is first encrypted then divided into a number of shares. If the intruder gets k number of shares she/he cannot be able to decrypt it if the key is not known to her/his. For key, combinations of character or number can be used. The change of higher bits make the image more blur, so the key can be applied on the higher bits of each pixels. Encryption can be done by left or right shift of bits of each pixel of the original image.
ADVANTAGES OF PROPOSED SYSTEM:
- Visual cryptography technique is used to make the data secure.
- We have proposed a technique of well known k-n secret sharing but on color images. And the recovered image is of high quality.
- At the time of dividing an image into n number of shares we have used random number generator.
- This technique needs very less mathematical calculation compare with other existing techniques of visual cryptography on color images.
- Each share reflects very little or even no information regarding the original image to human eye hence the intruder has less chance to get the whole information..
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
- System : Pentium i3 Processor
- Hard Disk : 500 GB..
- Monitor : 15’’ LED
- Input Devices : Keyboard, Mouse
- RAM : 4 GB.
SOFTWARE REQUIREMENTS:
- Operating system : Windows 10/11.
- Coding Language : C#.net.
- Frontend : Net, HTML, CSS, JavaScript.
- IDE Tool : VISUAL STUDIO.
- Database : SQL SERVER 2005.