Advertisement

Cerebral Cryptography

  • Yvo G. Desmedt
  • Shuang Hou
  • Jean-Jacques Quisquater
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

In this paper we present a new “hiding” scheme. Our method uses pictures and secret sharing. The approach is completely different from the one suggested by Kurak-McHugh. We use two pictures as in visual cryptography and each picture corresponds to a secret share of the message. Our scheme differs from visual cryptography. First, while visual cryptography is a cryptosystem, our scheme is both a cryptosystem as well as a hiding system. Our images are not random, but correspond to real photographs randomly altered. This modification of the original image is quite invisible to the naked eye. Secondly, our decryption method does not use the subtractive properties of light. The decryption is done by our brain using the perceived 3-D properties of the human visual system. A 3-D viewer is the only decryption hardware needed.

Keywords

Secret Sharing Human Visual System Secret Message Secret Share Scheme Visual Cryptography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Biham, E.: September 21–26, 1997. Lecture given at Daghstuhl, GermanyGoogle Scholar
  2. 2.
    Blakley, G.R.: Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc. 1979 pp. 313–317Google Scholar
  3. 3.
    A proposed federal information processing standard for an escrowed encryption standard (EES). Federal Register July 30, 1993Google Scholar
  4. 4.
    Kahn, D.: The Codebreakers. Sphere Books Limited London Great BritainGoogle Scholar
  5. 5.
    Kilian J., Leighton, T.: Failsafe key escrow, revisited. In Advances in Cryptology-Crypto’ 95, Proceedings (Lecture Notes in Computer Science 963) 1995 D. Coppersmith, Ed. Springer-Verlag pp. 208–221Google Scholar
  6. 6.
    Kurak, C. McHugh J.: A cautionary note on image downgrading. In Proceedings of the 8th Computer Security Applications Conference December 1992Google Scholar
  7. 7.
    Micali S.: Fair public-key cryptosystems. In Advances in Cryptology-Crypto’ 92, Proceedings (Lecture Notes in Computer Science 740) (1993) E. F. Brickell, Ed. Springer-Verlag pp. 113–138Google Scholar
  8. 8.
    Naor, M. Shamir, A.: Visual cryptography. In Advances in Cryptology-Eurocrypt’ 94, Proceedings (Lecture Notes in Computer Science 950) (May 9–12, 1995) A. D. Santis, Ed. Springer-Verlag pp. 1–12Google Scholar
  9. 9.
    Shamir, A.: How to share a secret. Commun. ACM 22 1979 612–613CrossRefMathSciNetzbMATHGoogle Scholar
  10. 10.
    Simmons, G.J.: An introduction to shared secret and/or shared control schemes and their application. In Contemporary Cryptology, G. J. Simmons, Ed. IEEE Press New York 1992 pp. 441–497Google Scholar
  11. 11.
    Stinson D.R.: Cryptography: Theory and Practice. CRC Boca Raton 1995zbMATHGoogle Scholar
  12. 12.
    MacMahan, Horace: Stereogram book of contours, illustrating selected landforms. Hubbard Press 1972.Google Scholar
  13. 13.
    Desmedt, Y. and G. Di Crescenzo and Burmester, M.: Multiplicative non-abelian sharing schemes and their application to threshold cryptography. In Advances in Cryptology-Asiacrypt’ 94, Proceedings (Lecture Notes in Computer Science 917), pp. 21–32.Google Scholar
  14. 14.
    Shannon, C.E.: Communication theory of secrecy systems. Bell systems technical journal, 28 1949, 656–715CrossRefMathSciNetzbMATHGoogle Scholar
  15. 15.
    Vernam, G.S.: Secret signaling system. U.S. Patent # 1,310,719, 22 Jul 1919 Google Scholar
  16. 16.
    The New York Times, April 14, 1998, pp. C1.Google Scholar
  17. 17.
    3-D Adventure, Starsis, Berkeley, CA.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Yvo G. Desmedt
    • 1
    • 2
  • Shuang Hou
    • 3
  • Jean-Jacques Quisquater
    • 4
  1. 1.EE & CS, and the Center of Cryptography, Computer and Network SecurityUniversity of WisconsinMilwaukeeUSA
  2. 2.Dept. of Mathematics, Royal HollowayUniversity of LondonUK
  3. 3.Department of EE & CSUniversity of Wisconsin, MilwaukeeUSA
  4. 4.Dept of Electrical Eng. (DICE) UCL Crypto Group, Place du Levant 3Université Catholique de LouvainLouvain-la-NeuveBelgium

Personalised recommendations