Abstract
Visual cryptography depends on two shares. The initial configuration, extra security bits and the number of the rule for the CA along with the number of computed steps serve as a password for a visually encrypted image. The second share could contain a predefined pattern; the developed algorithm uses a snapshot of a CA after a certain number of steps to generate the predefined share. Only one of these shares has to be random. The developed encryption system is a hybrid between visual and classical cryptographic approaches. It requires less storage space compared to a standalone visual encryption system and relies on Rule 30’s tested statistically significant randomness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Rong-Jian, C., Yuan-Hsin, C., Chao-Shen, C., Jui-Lin, L.: Image Encryption/Decryption System using 2-D Cellular Automata. In: Proceedings of the IEEE Tenth International Symposium on Consumer Electronics (ISCE 2006), St. Petersburg, Russia, pp. 1–6 (2006)
Abboud, G., Marean, J., Yampolskiy, R.V.: Steganography and Visual Cryptography in Computer Forensics. In: Proceedings of the Fifth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, USA, pp. 25–32 (2010)
Losavio, M., Hindi, M., Yampolskiy, R., Wilson Keeling, D.: Boundary Conditions for the Digital Forensic Use of Electronic Evidence and the Need for Forensic Counter-Analysis. In: Proceedings of the Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), in Conjunction with IEEE Security and Privacy Symposium, Oakland, USA, pp. 1–6 (2010)
Arazi, B., Dinstein, I.H., Kafri, O.: Intuition, perception, and secure communication. IEEE Transactions on Systems, Man and Cybernetics 19(5), 1016–1020 (1989)
Spanos, G.A., Maples, T.B.: Security for real-time MPEG compressed video in distributed multimedia applications. In: Proceedings of the IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Scottsdale, USA, pp. 72–78 (1996)
O’Gorman, L., Rabinovich, I.: Photo-image authentication by pattern recognition and cryptography. In: Proceedings of the 13th International Conference on Pattern Recognition, Vienna, Austria, vol. 3, pp. 949–953 (1996)
Piva, A., Barni, M., Bartolini, F., Cappellini, V.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of the International Conference on Image Processing, Santa Barbara, USA, vol. 1, pp. 520–523 (1997)
Main, P.M.: Extension of secure audio and video data from the NTC through the public switched telephone network. In: MILCOM 1997, Monterrey, USA, vol. 1, pp. 228–231 (1997)
O’Ruanaidh, J.J.K., Pun, T.: Rotation, scale and translation invariant digital image watermarking. In: Proceedings of the International Conference on Image Processing, Santa Barbara, USA, vol. 1, pp. 536–539 (1997)
Dugad, R., Ratakonda, K., Ahuja, N.: A new wavelet-based scheme for watermarking images. In: Proceedings of the International Conference on Image Processing 1998 (ICIP 1998), Chicago, USA, vol. 2, pp. 419–423 (1998)
O’Gorman, L., Rabinovich, I.: Secure identification documents via pattern recognition and public-key cryptography. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(10), 1097–1102 (1998)
Sang-Yi, Y., Kyo-II, C., Chung-Sang, R., Kwang-Hoon, C.: Encryption of cell-oriented computer generated hologram by using visual cryptography. In: The Pacific Rim Conference on Lasers and Electro-Optics (CLEO/Pacific Rim 1999), Seoul, South Korea, vol. 3, pp. 817–818 (1999)
Stinson, D.: Visual cryptography and threshold schemes. IEEE Potentials 18(1), 13–16 (1999)
Fridrich, J.: Applications of data hiding in digital images. In: Proceedings of the Fifth International Symposium on Signal Processing and its Applications (ISSPA 1999), Brisbane, Australia (1999)
Ran-Zan, W., Chi-Fang, L., Ja-Chen, L.: Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters 36(25), 2069–2070 (2000)
Anbarasi, L.J., Vincent, M.J., Mala, G.S.A.: A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India, pp. 129–133 (2011)
Zhi, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)
Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Information Security 2(4), 151–165 (2008)
Jaya, M.S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Proceedings of the World Congress on Information and Communication Technologies (WICT), Mumbai, India, pp. 1181–1186 (2011)
Chavan, P.V., Atique, M.: Design of hierarchical visual cryptography. In: Proceedings of the 2012 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, pp. 1–3 (2012)
Monoth, T., Babu, A.P.: Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns. In: Proceedings of the International Conference on Cyberworlds (CW), Singapore, pp. 171–178 (2010)
Prema, G., Natarajan, S.: Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application. In: Proceedings of the International Conference on Information Communication and Embedded Systems 2013 (ICICES), Chennai, India, pp. 727–730 (2013)
Ismail, I.A., Abdo, A.A., Amin, M., Diab, H.: Self-Adaptive Image Encryption Based on Memory Cellular Automata. Proceedings of the International Journal of Information Acquisition 8(3), 227–241 (2011)
Kari, J.: Cryptosystems based on reversible cellular automata (1992)
Machhout, M., Guitouni, Z., Zeghid, M., Tourki, R.: Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator. International Journal of Computer Science & Applications 6(1), 43–62 (2009)
Seredynski, F., Bouvry, P.P., Zomaya, A.Y.: Cellular automata computations and secret key cryptography. Parallel Computing 30(5-6), 753–766 (2004)
Hernández Encinas, L., Martín del Rey, Á., Hernández Encinas, A.: Encryption of Images with 2-dimensional Celluar Automata. In: Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics and 8th International Conference on Information System Analysis and Synthesis (SCI/ISAS 2002). International Institute of Informatics and Systemics (IIIS), Orlando (2002)
Álvarez Marañón, G., Hernández Encinas, L., Martín del Rey, Á.: A new secret sharing scheme for images based on additive 2-dimensional cellular automata. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005. LNCS, vol. 3522, pp. 411–418. Springer, Heidelberg (2005)
Guan, P.: Cellular Automaton Public-Key Cryptosystem. Complex Systems 1, 51–57 (1987)
Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)
Trostle, J.T.: Timing attacks against trusted path. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, pp. 125–134 (1998)
Weir, M., Aggarwal, S., deMedeiros, B., Glodek, B.: Password Cracking Using Probabilistic Context-Free Grammars. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, Berkeley, USA, pp. 391–405 (2009)
Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 364–372 (2005)
Klein, D.V.: Foiling the cracker: A survey of and improvements to password security. In: Proceedings of the USENIX UNIX Security Workshopp, Portland, USA (1990)
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Security & Privacy 2(5), 25–31 (2004)
Kessler, G.C.: Passwords - Strengths and weaknesses. Gary Kessler Associates (1996), http://www.garykessler.net/library/password.html (January 4, 2013)
Yampolskiy, R.V.: Analyzing User Password Selection Behavior for Reduction of Password Space. In: Proceedings of the 40th Annual IEEE International Carnahan Conferences Security Technology, Lexington, USA, pp. 109–115 (2006)
Mann, I.: Hacking the human (IT - Security). Engineering & Technology 3(1), 62–63 (2008)
Wolfram, S.: A New Kind of Science. Wolfram Media, Inc., Champaign (2002)
Wolfram, S.: Random sequence generation by cellular automata. Advances in Applied Mathematics 7(2), 123–169 (1986)
Gage, D., Laub, E., McGarry, B.: Cellular Automata: Is Rule 30 Random? In: Proceedings of the Midwest NKS Conference, Indiana University (2005)
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A.I., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptologic Applications. NIST Special Publication 800–822. NIST (2001)
Yampolskiy, R.V.: Single-Share Password-Protected Visual Cryptography via Cellular Automata (2011), http://demonstrations.wolfram.com/SingleSharePasswordProtectedVisualCryptographyViaCellularAut/ (cited January 15, 2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yampolskiy, R.V., Rebolledo-Mendez, J.D., Hindi, M.M. (2014). Password Protected Visual Cryptography via Cellular Automaton Rule 30. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-55046-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55045-4
Online ISBN: 978-3-642-55046-1
eBook Packages: Computer ScienceComputer Science (R0)