Fool Proof Examination System through Color Visual Cryptography

Authors

  • Sayali Wani Student, Department of Computer Engineering, Sandip Institute of Technology and Research Center, Nashik, India
  • Pranjal Sansare Student, Department of Computer Engineering, Sandip Institute of Technology and Research Center, Nashik, India
  • Mansi Singh Student, Department of Computer Engineering, Sandip Institute of Technology and Research Center, Nashik, India
  • Gayatri Waghchaure Student, Department of Computer Engineering, Sandip Institute of Technology and Research Center, Nashik, India
  • Abhay Gaidhani Professor, Department of Computer Engineering, Sandip Institute of Technology and Research Center, Nashik, India

Keywords:

Visual cryptography, secret sharing scheme, examination system, information security, authentication

Abstract

This paper proposes a replacement system of foolproof examination by tamperproof e-question paper preparation and secure transmission using secret sharing scheme. The appliance is perfectly secure because the proposed method automatically embeds the corresponding institute lock in the shape of the key. As a result, it's easy to trace out the source culprit for the leakage of question papers. This scheme has reduced reconstruction time because the reconstruction process involves only Exclusive-OR (XOR) operation aside from authentication. The proposed method recovers the first secret image with none loss. The prevailing visual cryptographic scheme recovers half-toned secret image with average Peak signal-to-noise (PSNR) value 24dB. Further, it shall be stated that the proposed method with authentication recovers the image with 64.7dB PSNR value, which is bigger than that of the prevailing method. Additionally, this method doesn't suffer from pixel Expansion.

Downloads

Download data is not yet available.

Downloads

Published

13-06-2021

Issue

Section

Articles

How to Cite

[1]
S. Wani, P. Sansare, M. Singh, G. Waghchaure, and A. Gaidhani, “Fool Proof Examination System through Color Visual Cryptography”, IJRAMT, vol. 2, no. 6, pp. 82–84, Jun. 2021, Accessed: Dec. 22, 2024. [Online]. Available: https://journals.ijramt.com/index.php/ijramt/article/view/832