@article{MAKHILLRJAS2014989415, title = {A Novel Visual Image Confirmation (VIC) Protocol Using Visual Cryptography for Securing Ubiquitous Bluetooth Mobile Communications}, journal = {Research Journal of Applied Sciences}, volume = {9}, number = {8}, pages = {503-510}, year = {2014}, issn = {1815-932x}, doi = {rjasci.2014.503.510}, url = {https://makhillpublications.co/view-article.php?issn=1815-932x&doi=rjasci.2014.503.510}, author = {A. John and}, keywords = {Popularity,Bluetooth Technology (BT),requirments,Visual Cryptography (VC),efficiency}, abstract = {In the last few years with the increasing popularity of the Bluetooth Technology (BT) also the interest in robbing the personal information has arisen. Bluetooth is a connection oriented service. To communicate with one another, one of them needs to initiate the connection. In July 2007, Bluetooth Special Interest Group (SIG) introduces a new method called Simple Secure Pairing (SSP). It uses Visual Number Confirmation (VNC) to meet the highest security requirements. If a malicious intruder error occurs while performing Visual Number Confirmation (VNC) verification then security could be violated. This study introduces a novel Visual Image Confirmation (VIC) protocol uses Visual Cryptography (VC) to address this problem. The proposed VIC protocol not only secures the data transmission but also increases operational efficiency.} }