The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


New Fool Proof Examination System through Color Visual Cryptography and Signature Authentication

There have been widespread allegations about the question papers leakage for a number of subjects in the recently held Secondary School Leaving Certificate examinations. The leakage is due to the practice of using printed question papers. Such incidents and subsequent cancellation of examinations are happening frequently. This creates political and social embarrassment and causes loss of money and time. This paper proposes a new system of foolproof examination by tamperproof e-question paper preparation and secure transmission using secret sharing scheme. The application is perfectly secure because the proposed method automatically embeds the corresponding institute seal in the form of the key. As a result, it is easy to trace out the source culprit for the leakage of question papers. This scheme has reduced reconstruction time because the reconstruction process involves only Exclusive-OR (XOR) operation apart from authentication. The proposed method recovers the original secret image without any loss. The existing visual cryptographic scheme recovers half-toned secret image with average Peak Signal-to-Noise Ratio (PSNR) value 24dB. Further, it shall be stated that the proposed method with authentication recovers the image with 64.7dB PSNR value, which is greater than that of the existing method. In addition, this method does not suffer from pixel Expansion.


[1] Chen G., Liu J., and Wang L., “Color Image Sharing Method Based on Lagrange’s Interpolating Polynomial,” in Proceedings of International Conference on Health Information Science, Beijing, pp. 63-75, 2012.

[2] Cimato S., Prisco R., and Santis A., “Colored Visual Cryptography without Color Darkening,” 70 The International Arab Journal of Information Technology, Vol. 16, No. 1, January 2019 Theoretical Computer Science, vol. 374, no. 1-2, pp. 261-276, 2007.

[3] Fathimal M. and Jansirani A., “(N, N) Secret Color Image Sharing Scheme with Dynamic Group,” International Journal of Computer Network and Information Security, vol. 7, no. 7, pp. 46-52, 2015.

[4] Fathimal M. and Jansirani A., “Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography,” International Journal of Science, Engineering and Technology Research, vol. 3, no. 9, pp. 2255-2260, 2014.

[5] Fathimal M. and Jansirani A., “Design of Block based Visual Secret sharing Scheme for Color Images,” International Journal of Applied Engineering Research, vol. 10, no. 33, pp. 26087-26091, 2015.

[6] Fathimal M. and Jansirani A., “K out of N Secret Sharing Scheme with Steganography and Authentication,” in Proceedings of Computational Intelligence, Cyber Security and Computational Models, Singapore, pp. 413-424, 2015.

[7] Fathimal M. and Jansirani A., “K out of Secret Sharing Scheme for Gray and Color Images,” in Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, Coimbatore, pp. 1-4, 2015.

[8] Fathimal M. and Jansirani A., “Threshold based Region Incrementing Scheme for Color Images,” International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 9, no. 8, pp. 2049-2054, 2015.

[9] Guo C., Chang C., and Qin C., “A hierarchical Threshold Secret Image Sharing,” Pattern Recognition Letters, vol. 33, no. 3, pp. 83-91, 2012.

[10] Kang I., Arce G., and Lee H., “Color Extended Visual Cryptography using Error Diffusion,” IEEE Transactions on Image Processing, vol. 20, no. 1, pp. 132-145, 2011.

[11] Monoth T., Analysis and Design of Tamperproof and Contrast-Enhanced Secret Sharing Based on Visual Cryptography Schemes, Thesis, Kannur University, 2011.

[12] Naor M. and Shamir A., “Visual Cryptography,” in Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Saint-Malo, pp. 1-12, 1995.

[13] Shyu S., “Efficient Visual Secret Sharing Scheme for Color Images,” Pattern Recognition, vol. 39, no. 5, pp. 866-880, 2006.

[14] Singhal N. and Raina J., “Comparative Analysis of AES and RC4 Algorithms for Better Utilization,” International Journal of Computer Trends and Technology, pp. 177-181, 2011.

[15] Thien C. and Lin J., “Secret Image Sharing,” Computers and Graphics, vol. 26, no. 5, pp. 765- 770, 2002.

[16] Tu S. and Hsu C., “A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography,” The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 276- 283, 2012.

[17] Ulutas M., Ulutas G., and Nabiyev V., “Invertible Secret Image Sharing for Grey Level and Dithered Cover Images,” Journal of Systems and Software, vol. 86, no. 2, pp.485-500, 2013.

[18] Verheul E. and Tilborg H., “Constructions and Properties of K out of N Visual Secret Sharing Schemes,” Designs, Codes and Cryptography, vol. 11, no. 2, pp. 179-196, 1997.

[19] Wu X., Ou D., Liang Q., and Sun W., “A User- Friendly Secret Image-Sharing Scheme with Reversible Steganography Based on Cellular Automata,” Journal of Systems and Software, vol. 85, no. 8, pp. 1852-1863, 2012.

[20] Yang C. and Laih C., “New Colored Visual Secret Sharing Schemes,” Designs, Codes and Cryptography, vol. 20, no. 3, pp. 325-336, 2000.

[21] Yang C., Ouyang J., and Harn L., “Steganography and Authentication in Image Sharing without Parity Bits,” Optics Communications, vol. 285, no. 7, pp. 1725-1735, 2012. New Fool Proof Examination System through Color Visual Cryptography ... 71 Mohamed Fathimal received her BE and ME in Computer Science and Engineering from Manonmanium Sundaranar University, Tirunelveli, Tamilnadu. She has 10 years of teaching Experience. Currently she is pursuing Phd in Manonmanium Sundaranar University. Her research interests include Digital Image Processing and Information Security. Arockia Jansirani graduated B.E in Electronics and Communication Engineering from Government College of Engineering, Tirunelveli, Tamil Nadu, India in 1996 and M.E in Computer Science and Engineering from National Engineering College, Kovilpatti, Tamil Nadu, India in 2002. She has been with the Department of Computer Science and Engineering, Manonmaniam Sundaranar University as Assistant Professor since 2003. She has more than ten years of teaching and research experience. She completed her Ph. D in Computer Science and Engineering from Manonmaniam Sundaranar University, Tamil Nadu, India in 2012. Her research interests include Digital Image Processing, Neural Networks and Data Mining.