COMMUNICATION PROCESSES SECURITY USING VISUAL CRYPTOGRAPHY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.26.677

Keywords:

cryptography, V-Crypt, symmetric encryption, asymmetric encryption, steganography

Abstract

The article is devoted to the study of data encryption technologies with an emphasis on visual cryptography, which is a modern and promising method of ensuring information confidentiality. The main attention is paid to the analysis of information encryption existing methods and the solutions development that allow to ensure reliable communications protection. Visual cryptography, as one of the modern methods, is relevant due to the growing need for protecting confidential data in the face of increasing cybersecurity threats. The paper describes the basic principles of visual cryptography, its advantages and application practical possibilities in areas where information confidentiality is of crucial importance, such as state security, the military, financial institutions and healthcare systems. The visual cryptography advantages are described, which allows transmitting encrypted messages in the form of images that can be decrypted by physically superimposing parts. This expands the potential of the technology in the authentication context and access systems. In addition, the article contains a software tools description for implementing information encryption and decryption, as well as a detailed overview of the possibilities of using programming languages to solve such problems. Key encryption algorithms and methods are considered, assessing their effectiveness and implementation possibilities in real information protection systems. Thanks to the conducted research, various approaches to data protection were analyzed and the visual cryptography advantages compared to other methods were identified. The results of the study demonstrate the visual cryptography effectiveness as a information protection method, especially in cases where it is necessary to avoid dependence on complex digital technologies. Prospects for further research include the development of more advanced visual encryption algorithms, adaptive to different conditions of use, as well as the implementation of technology for protecting critical data in various industries.

Downloads

Download data is not yet available.

References

Kafri, O., & Keren, E. (1987). Encryption of pictures and shapes by random grids. Optics Letters, 12(6). https://doi.org/10.1364/ol.12.000377

Naor, M., & Shamir, A. (1995). Visual cryptography. Advances in Cryptology – EUROCRYPT'94, 1–12. https://doi.org/10.1007/bfb0053419

Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613. https://doi.org/10.1145/359168.359176

Horng, G., Chen, T., & Tsai D.-S. (2006). Cheating in Visual Cryptography. Designs, Codes and Cryptography, 38(2), 219–236. https://doi.org/10.1007/s10623-005-6342-0

Gnanaguruparan, M., & Kak, S. (2002). Recursive hiding of secrets in visual cryptography. Cryptologia, 26(1), 68–76. https://doi.org/10.1080/0161-110291890768

Parakh, A., & Kak, S. (2010). A Tree Based Recursive Information Hiding Scheme. ICC 2010 - 2010 IEEE International Conference on Communications. https://doi.org/10.1109/icc.2010.5502430

Yang C.-N., Chen T.-S. (2005). Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters. 26(2), 193–206. https://doi.org/10.1016/j.patrec.2004.08.025

Cryptography: Theory and practice. (1995). Computers & Mathematics with Applications, 30(9). https://doi.org/10.1016/0898-1221(95)90225-2

Katoh, T., & Imai, H. (1998). An extended construction method for visual secret sharing schemes. Electronics and Communications in Japan (Part III: Fundamental Electronic Science), 81(7), 55–63. https://doi.org/10.1002/(sici)1520-6440(199807)81:7%3C55::aid-ecjc7%3E3.0.co;2-#

Verheul, E. R., & van Tilborg, H. C. A. (1997). Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes and Cryptography, 11(2), 179–196. https://doi.org/10.1023/a:1008280705142

Hryniuk, S., & Polishchuk, M. (2020). Use information encryption technology for secure network transmission. Computer-integrated technologies: education, science, production, 39, 122–126. https://doi.org/10.36910/6775-2524-0560-2020-39-21

Polishchuk, M., Semenyuk, O., Polishchuk, L., & Lomakin, M. (2023). Possibilities of authorization and protection of user data during the development of cloud web applications for IoT. Computer-integrated technologies: education, science, production, (52), 94–103. https://doi.org/10.36910/6775-2524-0560-2023-52-12

Cherniashchuk, N., & Kostiuchko, S. (2022). Detection of attacks based on compromise marks. 12th International Conference on Dependable Systems, Services and Technologies (DESSERT). https://doi.org/10.1109/dessert58054.2022.10018583

Downloads


Abstract views: 1

Published

2024-12-19

How to Cite

Rymchuk, I., Kostiuchko, S., Polishchuk, M., Hryniuk, S., & Konkevych, L. (2024). COMMUNICATION PROCESSES SECURITY USING VISUAL CRYPTOGRAPHY . Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(26), 258–267. https://doi.org/10.28925/2663-4023.2024.26.677