Information Security

Visual Cryptography

We propose a new model that encrypts the public key in the form of an image that is further split into various shares. These shares are distributed among the trustworthy parties. Only when all these shares are overlaid, the original image is formed. The public key can then be retrieved from the original image and it can be used to decrypt the cipher text. This approach give more security to the existing symmetric key algorithm.