CSS PRESENTATION
CSS PRESENTATION
SYSTEM SECURTIY
Presented By : Ryan D’Mello,
Aston Castelino and Janice DCruz
TABLE OF CONTENTS
Problem Statement
Objectives
Literature Review
Methodology
Result
Conclusion
References
Implementation and Analysis of Various Visual
Cryptographic Techniques for Sensitive Data Protection
Problem Statement
In today's digital age, safeguarding sensitive data, particularly in domains like defense
and space exploration, presents a pressing challenge due to increasing digitization. This
study aims to assess the efficacy of various visual cryptographic techniques in
protecting such data from unauthorized access and breaches. By exploring these
methods, the research endeavors to offer practical solutions for enhancing data security
in critical sectors reliant on digital platforms.
OBJECTIVES
To study and analyze various existing visual cryptographic techniques.
2016
data sharing in fog computing environments. This approach provides robust
using visual authentication mechanisms for communication between clients and servers, ensuring
cryptography and data integrity and confidentiality. By leveraging the discrete wavelength transformer
(DWT) for digital watermarking, the method enhances security measures while
watermarking method facilitating efficient data sharing in fog computing scenarios.
in fog computing.
Explores the efficacy of the Least Significant Bit (LSB) steganography method, which
encompasses various cryptographic schemes such as black and white cryptography,
Protecting gray-level visual cryptography, and color visual cryptography. By embedding secret
2015 documents using data within the least significant bits of digital images, this method ensures
imperceptibility to human observers while facilitating covert communication channels.
visual cryptography Through an in-depth analysis, the paper elucidates the robustness and applicability of
the LSB steganography technique across diverse scenarios, shedding light on its
potential applications in secure data transmission and covert communication.
LITERATURE REVIEW
Year Paper Title Description
Security enhancement Explores how visual cryptography and image steganography can work together to
improve security and enhance image quality. By combining these techniques, it aims
2016 in image steganography to strengthen data protection and hide sensitive information within images. Through
using neural networks analysis, it shows how visual cryptography and steganography complement each
other, enhancing data confidentiality and integrity. Additionally, the study discusses
and visual practical applications of this combined approach, suggesting advancements in covert
communication and secure data transmission.
cryptography
A visual cryptographic This paper explores the use of visual cryptography to secure medical data stored in
encryption technique cloud environments. It addresses the challenges of protecting sensitive patient
A comparative analysis of the three cryptographic algorithms revealed that while the (2,
2) visual cryptography scheme necessitates both shares for revealing the secret
information, the (k, n) scheme allows for efficient decryption using any k shares, even if
some are lost. However, to enhance security, the general access structure visual
cryptography method restricts the use of forbidden shares for secret image generation.
This comparison underscores the superior security offered by the extended general
access structure visual cryptography, positioning it as an effective solution for
safeguarding sensitive data.
CONCLUSION
In conclusion, the study highlights the significance of data security,
especially concerning the protection of sensitive information like defense
data. Through meticulous analysis, it was determined that extended visual
cryptography employing a general access structure emerges as the optimal
approach for maintaining data integrity and confidentiality. Additionally,
the incorporation of region incrementing techniques enhances security
measures, providing a robust framework against potential threats. Looking
ahead, ongoing research in this domain promises to further refine existing
methods and tackle emerging security challenges, thereby fortifying data
protection in various applications and sectors.
REFERENCES
[1] Abboud, A.J., 2015. Protecting documents using visual cryptography.
International Journal of Engineering Research and General Science, 3(2), pp.464-
470.
[3] Seethalakshmi, K.S., Usha, B.A. and Sangeetha, K.N., 2016, October. Security
enhancement in image steganography using neural networks and visual
cryptography. In 2016 International Conference on Computation System and
Information Technology for Sustainable Solutions (CSITSS) (pp. 396-403). IEEE.
[4] Gajul, S., Gite, A., Kedari, V. and Kumbhar, P., 2016. Secure data sharing using
visual cryptography and watermarking method in fog computing.
THANK YOU