Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Secret sharing

Biometric Privacy Using Secret Image Sharing

A.T. Hashim; D.A. Noori

Engineering and Technology Journal, 2017, Volume 35, Issue 7, Pages 701-708

Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and stability (i.e., no two persons in the world can have same iris). For authentication, the feature template in the database and the user template should be the same method for extracting iris template in this proposed system. Also storing the template in the database securely is not a secure approach, because it can be stolen or tampered. To deal with this security issue, the proposed system is securely storing the template in the database by firstly using randomness to scramble the bits of template based on chaos system. Secondly, a hiding technique is utilized to hide the scrambled templates in host images randomly. Finally, a secret sharing based on linear system is implemented on the iris template in database to protect it and adding extra layer of iris authentication system. The proposed secret sharing system has been generated a meaningful shares which overcomes the problem in traditional methods. Also in proposed system, two approaches of iris extraction have been presented.

Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption

Musaab R. Abdulrazzaq

Engineering and Technology Journal, 2010, Volume 28, Issue 7, Pages 1340-1349

Secret sharing is a scheme used to distribute secret among a group of users.
Rather than making duplicated copies of secrets among users, the secret is divided
into a number of pieces, called shares. The secret can be revealed if a certain
number of user shares are combined. The method proposed here (i)utilizes bit-level
decomposition and stacking operations to both encrypt and decrypt B-bit image,
(ii) preserves all the features of traditional (k, n) sharing schemes, (iii) allows for
perfect reconstruction of the input B-bit image, (iv) encrypts binary, gray-scale and
color images, and (v) can be effectively implemented either in software or