Abstract
In this paper we present a new “hiding” scheme. Our method uses pictures and secret sharing. The approach is completely different from the one suggested by Kurak-McHugh. We use two pictures as in visual cryptography and each picture corresponds to a secret share of the message. Our scheme differs from visual cryptography. First, while visual cryptography is a cryptosystem, our scheme is both a cryptosystem as well as a hiding system. Our images are not random, but correspond to real photographs randomly altered. This modification of the original image is quite invisible to the naked eye. Secondly, our decryption method does not use the subtractive properties of light. The decryption is done by our brain using the perceived 3-D properties of the human visual system. A 3-D viewer is the only decryption hardware needed.
A part of this research has been supported by NSF Grant NCR-9106327.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Biham, E.: September 21–26, 1997. Lecture given at Daghstuhl, Germany
Blakley, G.R.: Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc. 1979 pp. 313–317
A proposed federal information processing standard for an escrowed encryption standard (EES). Federal Register July 30, 1993
Kahn, D.: The Codebreakers. Sphere Books Limited London Great Britain
Kilian J., Leighton, T.: Failsafe key escrow, revisited. In Advances in Cryptology-Crypto’ 95, Proceedings (Lecture Notes in Computer Science 963) 1995 D. Coppersmith, Ed. Springer-Verlag pp. 208–221
Kurak, C. McHugh J.: A cautionary note on image downgrading. In Proceedings of the 8th Computer Security Applications Conference December 1992
Micali S.: Fair public-key cryptosystems. In Advances in Cryptology-Crypto’ 92, Proceedings (Lecture Notes in Computer Science 740) (1993) E. F. Brickell, Ed. Springer-Verlag pp. 113–138
Naor, M. Shamir, A.: Visual cryptography. In Advances in Cryptology-Eurocrypt’ 94, Proceedings (Lecture Notes in Computer Science 950) (May 9–12, 1995) A. D. Santis, Ed. Springer-Verlag pp. 1–12
Shamir, A.: How to share a secret. Commun. ACM 22 1979 612–613
Simmons, G.J.: An introduction to shared secret and/or shared control schemes and their application. In Contemporary Cryptology, G. J. Simmons, Ed. IEEE Press New York 1992 pp. 441–497
Stinson D.R.: Cryptography: Theory and Practice. CRC Boca Raton 1995
MacMahan, Horace: Stereogram book of contours, illustrating selected landforms. Hubbard Press 1972.
Desmedt, Y. and G. Di Crescenzo and Burmester, M.: Multiplicative non-abelian sharing schemes and their application to threshold cryptography. In Advances in Cryptology-Asiacrypt’ 94, Proceedings (Lecture Notes in Computer Science 917), pp. 21–32.
Shannon, C.E.: Communication theory of secrecy systems. Bell systems technical journal, 28 1949, 656–715
Vernam, G.S.: Secret signaling system. U.S. Patent # 1,310,719, 22 Jul 1919
The New York Times, April 14, 1998, pp. C1.
3-D Adventure, Starsis, Berkeley, CA.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y.G., Hou, S., Quisquater, JJ. (1998). Cerebral Cryptography. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_5
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive