Skip to main content

Cerebral Cryptography

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

In this paper we present a new “hiding” scheme. Our method uses pictures and secret sharing. The approach is completely different from the one suggested by Kurak-McHugh. We use two pictures as in visual cryptography and each picture corresponds to a secret share of the message. Our scheme differs from visual cryptography. First, while visual cryptography is a cryptosystem, our scheme is both a cryptosystem as well as a hiding system. Our images are not random, but correspond to real photographs randomly altered. This modification of the original image is quite invisible to the naked eye. Secondly, our decryption method does not use the subtractive properties of light. The decryption is done by our brain using the perceived 3-D properties of the human visual system. A 3-D viewer is the only decryption hardware needed.

A part of this research has been supported by NSF Grant NCR-9106327.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham, E.: September 21–26, 1997. Lecture given at Daghstuhl, Germany

    Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc. 1979 pp. 313–317

    Google Scholar 

  3. A proposed federal information processing standard for an escrowed encryption standard (EES). Federal Register July 30, 1993

    Google Scholar 

  4. Kahn, D.: The Codebreakers. Sphere Books Limited London Great Britain

    Google Scholar 

  5. Kilian J., Leighton, T.: Failsafe key escrow, revisited. In Advances in Cryptology-Crypto’ 95, Proceedings (Lecture Notes in Computer Science 963) 1995 D. Coppersmith, Ed. Springer-Verlag pp. 208–221

    Google Scholar 

  6. Kurak, C. McHugh J.: A cautionary note on image downgrading. In Proceedings of the 8th Computer Security Applications Conference December 1992

    Google Scholar 

  7. Micali S.: Fair public-key cryptosystems. In Advances in Cryptology-Crypto’ 92, Proceedings (Lecture Notes in Computer Science 740) (1993) E. F. Brickell, Ed. Springer-Verlag pp. 113–138

    Google Scholar 

  8. Naor, M. Shamir, A.: Visual cryptography. In Advances in Cryptology-Eurocrypt’ 94, Proceedings (Lecture Notes in Computer Science 950) (May 9–12, 1995) A. D. Santis, Ed. Springer-Verlag pp. 1–12

    Google Scholar 

  9. Shamir, A.: How to share a secret. Commun. ACM 22 1979 612–613

    Article  MathSciNet  MATH  Google Scholar 

  10. Simmons, G.J.: An introduction to shared secret and/or shared control schemes and their application. In Contemporary Cryptology, G. J. Simmons, Ed. IEEE Press New York 1992 pp. 441–497

    Google Scholar 

  11. Stinson D.R.: Cryptography: Theory and Practice. CRC Boca Raton 1995

    MATH  Google Scholar 

  12. MacMahan, Horace: Stereogram book of contours, illustrating selected landforms. Hubbard Press 1972.

    Google Scholar 

  13. Desmedt, Y. and G. Di Crescenzo and Burmester, M.: Multiplicative non-abelian sharing schemes and their application to threshold cryptography. In Advances in Cryptology-Asiacrypt’ 94, Proceedings (Lecture Notes in Computer Science 917), pp. 21–32.

    Google Scholar 

  14. Shannon, C.E.: Communication theory of secrecy systems. Bell systems technical journal, 28 1949, 656–715

    Article  MathSciNet  MATH  Google Scholar 

  15. Vernam, G.S.: Secret signaling system. U.S. Patent # 1,310,719, 22 Jul 1919

    Google Scholar 

  16. The New York Times, April 14, 1998, pp. C1.

    Google Scholar 

  17. 3-D Adventure, Starsis, Berkeley, CA.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Desmedt, Y.G., Hou, S., Quisquater, JJ. (1998). Cerebral Cryptography. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics