Back to Search
Start Over
Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme
- Source :
- Procedia Computer Science. 78:632-639
- Publication Year :
- 2016
- Publisher :
- Elsevier BV, 2016.
-
Abstract
- In this fast world of networking, secure image transmission of data whether the image having some information or some text, is one of the area focus for security. Here we had tried to implement the proposed technique fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme. Using fuzzy logic makes encryption and decryption complex. The (2, 2) secret sharing scheme provides secured and confidential authentication. For image encryption AES algorithm is used for encryption and decryption. The implementation of encryption algorithms can be very complex when we are focusing on rule based share generation.
- Subjects :
- Image Encryption
Homomorphic secret sharing
Plaintext-aware encryption
Theoretical computer science
Proactive secret sharing
Computer science
0211 other engineering and technologies
02 engineering and technology
computer.software_genre
Encryption
Secret sharing
Disk encryption hardware
Visual cryptography
Multiple encryption
Fuzzy Logic
Filesystem-level encryption
0202 electrical engineering, electronic engineering, information engineering
Match Value
General Environmental Science
021110 strategic, defence & security studies
Authentication
business.industry
Client-side encryption
Fuzzy Inference System
Disk encryption theory
Deterministic encryption
Visual Cryptography
Disk encryption
Symmetric-key algorithm
Secret Sharing
Probabilistic encryption
40-bit encryption
56-bit encryption
General Earth and Planetary Sciences
020201 artificial intelligence & image processing
Verifiable secret sharing
Error Value
Link encryption
Attribute-based encryption
On-the-fly encryption
business
computer
Subjects
Details
- ISSN :
- 18770509
- Volume :
- 78
- Database :
- OpenAIRE
- Journal :
- Procedia Computer Science
- Accession number :
- edsair.doi.dedup.....17e34a10dbc9bda6d18af3d28232a472
- Full Text :
- https://doi.org/10.1016/j.procs.2016.02.110