Please use this identifier to cite or link to this item: https://elibrary.tucl.edu.np/handle/123456789/10704
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRegmi, Bikash-
dc.date.accessioned2022-06-02T07:25:24Z-
dc.date.available2022-06-02T07:25:24Z-
dc.date.issued2019-
dc.identifier.urihttps://elibrary.tucl.edu.np/handle/123456789/10704-
dc.description.abstractVisual secret share scheme plays an important role in area of information security. Different from conventional cryptography, visual cryptography is an image cryptographic technique proposed by Naor and Shamir which encodes a secret image into multiple shares. When defined minimum threshold number of shares are gathered from shared participant's share can reveal the secret image. This phenomenon is also known as (k, n) threshold secret share scheme. Visual cryptography schemes allow the encoding of a secret image into shares, which are distributed to the participants. The requirement for minimum threshold share ultimately leads to the confidentiality of secret. (k, n) visual secret sharing uses threshold scheme by using the concept of Lagrange's polynomial interpolation. Applying XOR operation with cover image leads to authentication of secret. The reconstruction of the original image without loss of information can be generated from shared shares using the concept of Lagrange's polynomial interpolation. In this study visual secret share scheme by using Shamir's Secret Share Scheme and Proactive Secret Share Scheme are implemented and analyzed with different parameter like NPCR, UACI, correlation-coefficient, performance speed measures. Based on UACI and correlation-coefficient results Proactive Secret Share scheme has better performance whereas based on the NPCR and Computational time results Shamir's Secret Share scheme showed better performance.en_US
dc.language.isoen_USen_US
dc.publisherDepartment of Computer Science & Information Technologyen_US
dc.subjectShare generationen_US
dc.subjectShare reconstructionen_US
dc.subjectShamir's secret shareen_US
dc.subjectProactive secret share schemeen_US
dc.titleComparative Analysis of Visual Secret Sharing Cryptography Scheme: Shamir's Secret Sharing and Proactive Secret Sharingen_US
dc.typeThesisen_US
local.institute.titleCentral Department of Computer Science and Information Technologyen_US
local.academic.levelMastersen_US
Appears in Collections:Computer Science & Information Technology

Files in This Item:
File Description SizeFormat 
Full Thesis.pdf3.43 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.