<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="16734" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/16734?output=omeka-xml" accessDate="2026-04-06T01:35:39+00:00">
  <collection collectionId="5">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="64">
                <text>Articles</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="19">
    <name>Article</name>
    <description>Faculty Publications -Articles</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130926">
              <text>Secure provenance-based communication using visual encryption</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130927">
              <text>Communication; Cyber security; Data provenance; Shares; Visual cryptography</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130928">
              <text>Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are good number of security mechanisms in place to withstand the cyber-attacks. Almost all of these algorithms uses complex mathematical calculations in providing security for the systems. Visual cryptography is a peculiar approach which uses concept of secret sharing by dividing the message into transparencies as encryption process. Upon superimposing transparencies one obtains the original message. In this paper, we propose secret sharing as a notion of security onto data provenance. Main inference of this writing is to throw a model combining above two mentioned aspects which gives away an indigenous solution in the area of information security. This proposed model is implemented with specific use case scenarios for substantiation and related analysis. Simulated results and discussion of the same is presented in the paper.  2019 Inderscience Enterprises Ltd.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130929">
              <text>Kumar K.P.; Cherukuri R.C.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="130930">
              <text>International Journal of Innovative Computing and Applications, Vol-10, No. 45750, pp. 194-206.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="130931">
              <text>Inderscience Publishers</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130932">
              <text>2019-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="130933">
              <text>&lt;a href="https://doi.org/10.1504/IJICA.2019.103294" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1504/IJICA.2019.103294&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85074542170&amp;amp;doi=10.1504%2FIJICA.2019.103294&amp;amp;partnerID=40&amp;amp;md5=bba896243b58590df1dbd8b236a6ad7b" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85074542170&amp;amp;doi=10.1504%2fIJICA.2019.103294&amp;amp;partnerID=40&amp;amp;md5=bba896243b58590df1dbd8b236a6ad7b&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130934">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="130935">
              <text>ISSN: 1751648X</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130936">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130937">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130938">
              <text>Article</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="130939">
              <text>Kumar K.P., Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Karnataka, Bangalore, 560074, India, Electrical and Electronics Engineering and Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Karnataka, Bangalore, 560074, India; Cherukuri R.C., Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Karnataka, Bangalore, 560074, India, Electrical and Electronics Engineering and Computer Science and Engineering, Faculty of Engineering, CHRIST (Deemed to be University), Karnataka, Bangalore, 560074, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
