(3, 3) Visual Cryptography for Online Certificate Authentication
Tridib Chakraborty1, Sudeep Ghosh2, Trishita Ghosh3, Chowdhury Md. Mizan4, Suparna Karmakar5
1Mr. Tridib Chakraborty*, Assistant Professor, Department of Information Technology , Guru Nanak Institute of Technology, Nagpur, Maharashtra, India.
2Mr Sudeep Ghosh, Assistant Professor, Department of Information Technology, Guru Nanak Institute of Technology, Nagpur, Maharashtra, India.
3Mrs. Trishita Ghosh, Assistant Professor, Department of IT, Guru Nanak Institute of Technology, Nagpur, Maharashtra, India.
4Miss.Suparna Karmakar, Assistant Professor, Department of IT, Guru Nanak Institute of Technology, Nagpur, Maharashtra, India.
5Chowdhury Md Mizan Assistant Professor, Department of IT, Guru Nanak Institute of Technology, Nagpur, Maharashtra, India.
Manuscript received on July 02, 2020. | Revised Manuscript received on July 10, 2020. | Manuscript published on August 30, 2020. | PP: 152-156 | Volume-9 Issue-6, August 2020. | Retrieval Number: F1302089620/2020©BEIESP | DOI: 10.35940/ijeat.F1302.089620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Today organizations face a challenge while recruiting candidates, who provide forged mark sheets in order to get a job. To prevent wrong hiring a detailed and thorough approach is needed to verify the authentication of both the candidate and the marks obtained by him/her. There are so many modern cryptographic protocols available which can be used for authenticating individual’s academic achievement certificates. Visual Cryptography is a simple and secure way to allow the secret sharing of images without any cryptographic computations or the use of encryption or decryption keys. The novelty of the visual secret sharing scheme is in its decryption process where human visual system (HVS) is employed for decryption of secret shares. In this paper we have discussed (3, 3) visual cryptography scheme which can be used to generate shares and distributes them among three parties, i.e. the Job Seeker, Certificate Issuance Authority and the Organization conducting Job interview. Secret message can be decrypted only if all the three shares are available. Every certificate carries a unique number which is encrypted using visual cryptography and without handshaking of all the parties it is impossible to decrypt, thus ensuring full proof authentication.
Keywords: (k, n) Visual Cryptography, Digital Authentication.