Browse Prior Art Database

Hierarchical Authentication with Steganography and Visual Cryptography

IP.com Disclosure Number: IPCOM000237535D
Publication Date: 2014-Jun-20
Document File: 5 page(s) / 360K

Publishing Venue

The IP.com Prior Art Database

Related People

Toro Kao: INVENTOR [+3]

Abstract

A method and system is disclosed for using steganography and visual cryptography to establish a hierarchical authentication structure.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 53% of the total text.

Hierarchical Authentication with Steganography and Visual Cryptography

Abstract

A method and system is disclosed for using steganography and visual cryptography to establish a hierarchical authentication structure.

Description

Disclosed is a method and system for using steganography and visual cryptography to establish a hierarchical authentication structure.

In accordance with the method and system, multiple one time passwords are generated and transferred to a readable data format such as a Quick Response code (QR code).  For example, 61098, Abcde, Ab5463 are multiple one rime passwords that are generated.  One or more images are generated for each one time password of the multiple one time passwords.  Thereafter, an image of the one or more images is assigned the highest permission and encrypted using visual cryptography into two ciphers.  For example, an image of 61098, a one-time password, is assigned the highest permission and encrypted into two ciphers as illustrated in Fig. 1.

Figure 1

One of the password images obtained using visual cryptography is stored in the system.  The method and system thereafter establishes the number of user groups ‘G’ based on the types of participants.  For example, if there are team buyers and team buying initiators, then G is equal to 2.  A readable data format for G is chosen with a level of permission lower than that of the password image.  The other cipher obtained during the visual cryptography is separately stored in the readable data format. 

Steganography is applied on the remaining one-time password to hide and separate one of the two ciphers in G readable data as illustrated in Fig. 2.

Figure 2

In an embodiment, if an approver such as a team buying initiator exists, then the readable data is issued to the approver.  Otherwise, the readable data is saved in the system for further verification.

The method and system disclosed herein also determines the number of participators ‘P’.  For example, if the number of team buyers is 350, then the method and system determines the number of participators P to be 350.  Further, a threshold T is set on P for determining if a requisite number of users have provided authentication for decrypting the readable data.  For example, if the threshold T is 80% for the case where there are 350 participators, then the readable data is decrypted only after 280 or more participators provide the cip...