Skip to main content

Password Protected Visual Cryptography via Cellular Automaton Rule 30

  • Chapter
Transactions on Data Hiding and Multimedia Security IX

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 8363))

Abstract

Visual cryptography depends on two shares. The initial configuration, extra security bits and the number of the rule for the CA along with the number of computed steps serve as a password for a visually encrypted image. The second share could contain a predefined pattern; the developed algorithm uses a snapshot of a CA after a certain number of steps to generate the predefined share. Only one of these shares has to be random. The developed encryption system is a hybrid between visual and classical cryptographic approaches. It requires less storage space compared to a standalone visual encryption system and relies on Rule 30’s tested statistically significant randomness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Rong-Jian, C., Yuan-Hsin, C., Chao-Shen, C., Jui-Lin, L.: Image Encryption/Decryption System using 2-D Cellular Automata. In: Proceedings of the IEEE Tenth International Symposium on Consumer Electronics (ISCE 2006), St. Petersburg, Russia, pp. 1–6 (2006)

    Google Scholar 

  3. Abboud, G., Marean, J., Yampolskiy, R.V.: Steganography and Visual Cryptography in Computer Forensics. In: Proceedings of the Fifth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, USA, pp. 25–32 (2010)

    Google Scholar 

  4. Losavio, M., Hindi, M., Yampolskiy, R., Wilson Keeling, D.: Boundary Conditions for the Digital Forensic Use of Electronic Evidence and the Need for Forensic Counter-Analysis. In: Proceedings of the Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), in Conjunction with IEEE Security and Privacy Symposium, Oakland, USA, pp. 1–6 (2010)

    Google Scholar 

  5. Arazi, B., Dinstein, I.H., Kafri, O.: Intuition, perception, and secure communication. IEEE Transactions on Systems, Man and Cybernetics 19(5), 1016–1020 (1989)

    Article  Google Scholar 

  6. Spanos, G.A., Maples, T.B.: Security for real-time MPEG compressed video in distributed multimedia applications. In: Proceedings of the IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Scottsdale, USA, pp. 72–78 (1996)

    Google Scholar 

  7. O’Gorman, L., Rabinovich, I.: Photo-image authentication by pattern recognition and cryptography. In: Proceedings of the 13th International Conference on Pattern Recognition, Vienna, Austria, vol. 3, pp. 949–953 (1996)

    Google Scholar 

  8. Piva, A., Barni, M., Bartolini, F., Cappellini, V.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of the International Conference on Image Processing, Santa Barbara, USA, vol. 1, pp. 520–523 (1997)

    Google Scholar 

  9. Main, P.M.: Extension of secure audio and video data from the NTC through the public switched telephone network. In: MILCOM 1997, Monterrey, USA, vol. 1, pp. 228–231 (1997)

    Google Scholar 

  10. O’Ruanaidh, J.J.K., Pun, T.: Rotation, scale and translation invariant digital image watermarking. In: Proceedings of the International Conference on Image Processing, Santa Barbara, USA, vol. 1, pp. 536–539 (1997)

    Google Scholar 

  11. Dugad, R., Ratakonda, K., Ahuja, N.: A new wavelet-based scheme for watermarking images. In: Proceedings of the International Conference on Image Processing 1998 (ICIP 1998), Chicago, USA, vol. 2, pp. 419–423 (1998)

    Google Scholar 

  12. O’Gorman, L., Rabinovich, I.: Secure identification documents via pattern recognition and public-key cryptography. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(10), 1097–1102 (1998)

    Article  Google Scholar 

  13. Sang-Yi, Y., Kyo-II, C., Chung-Sang, R., Kwang-Hoon, C.: Encryption of cell-oriented computer generated hologram by using visual cryptography. In: The Pacific Rim Conference on Lasers and Electro-Optics (CLEO/Pacific Rim 1999), Seoul, South Korea, vol. 3, pp. 817–818 (1999)

    Google Scholar 

  14. Stinson, D.: Visual cryptography and threshold schemes. IEEE Potentials 18(1), 13–16 (1999)

    Article  Google Scholar 

  15. Fridrich, J.: Applications of data hiding in digital images. In: Proceedings of the Fifth International Symposium on Signal Processing and its Applications (ISSPA 1999), Brisbane, Australia (1999)

    Google Scholar 

  16. Ran-Zan, W., Chi-Fang, L., Ja-Chen, L.: Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters 36(25), 2069–2070 (2000)

    Article  Google Scholar 

  17. Anbarasi, L.J., Vincent, M.J., Mala, G.S.A.: A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India, pp. 129–133 (2011)

    Google Scholar 

  18. Zhi, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  19. Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Information Security 2(4), 151–165 (2008)

    Article  Google Scholar 

  20. Jaya, M.S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Proceedings of the World Congress on Information and Communication Technologies (WICT), Mumbai, India, pp. 1181–1186 (2011)

    Google Scholar 

  21. Chavan, P.V., Atique, M.: Design of hierarchical visual cryptography. In: Proceedings of the 2012 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, pp. 1–3 (2012)

    Google Scholar 

  22. Monoth, T., Babu, A.P.: Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns. In: Proceedings of the International Conference on Cyberworlds (CW), Singapore, pp. 171–178 (2010)

    Google Scholar 

  23. Prema, G., Natarajan, S.: Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application. In: Proceedings of the International Conference on Information Communication and Embedded Systems 2013 (ICICES), Chennai, India, pp. 727–730 (2013)

    Google Scholar 

  24. Ismail, I.A., Abdo, A.A., Amin, M., Diab, H.: Self-Adaptive Image Encryption Based on Memory Cellular Automata. Proceedings of the International Journal of Information Acquisition 8(3), 227–241 (2011)

    Article  Google Scholar 

  25. Kari, J.: Cryptosystems based on reversible cellular automata (1992)

    Google Scholar 

  26. Machhout, M., Guitouni, Z., Zeghid, M., Tourki, R.: Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator. International Journal of Computer Science & Applications 6(1), 43–62 (2009)

    Google Scholar 

  27. Seredynski, F., Bouvry, P.P., Zomaya, A.Y.: Cellular automata computations and secret key cryptography. Parallel Computing 30(5-6), 753–766 (2004)

    Article  MathSciNet  Google Scholar 

  28. Hernández Encinas, L., Martín del Rey, Á., Hernández Encinas, A.: Encryption of Images with 2-dimensional Celluar Automata. In: Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics and 8th International Conference on Information System Analysis and Synthesis (SCI/ISAS 2002). International Institute of Informatics and Systemics (IIIS), Orlando (2002)

    Google Scholar 

  29. Álvarez Marañón, G., Hernández Encinas, L., Martín del Rey, Á.: A new secret sharing scheme for images based on additive 2-dimensional cellular automata. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005. LNCS, vol. 3522, pp. 411–418. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  30. Guan, P.: Cellular Automaton Public-Key Cryptosystem. Complex Systems 1, 51–57 (1987)

    MATH  MathSciNet  Google Scholar 

  31. Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)

    Google Scholar 

  32. Trostle, J.T.: Timing attacks against trusted path. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, pp. 125–134 (1998)

    Google Scholar 

  33. Weir, M., Aggarwal, S., deMedeiros, B., Glodek, B.: Password Cracking Using Probabilistic Context-Free Grammars. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, Berkeley, USA, pp. 391–405 (2009)

    Google Scholar 

  34. Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 364–372 (2005)

    Google Scholar 

  35. Klein, D.V.: Foiling the cracker: A survey of and improvements to password security. In: Proceedings of the USENIX UNIX Security Workshopp, Portland, USA (1990)

    Google Scholar 

  36. Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Security & Privacy 2(5), 25–31 (2004)

    Article  Google Scholar 

  37. Kessler, G.C.: Passwords - Strengths and weaknesses. Gary Kessler Associates (1996), http://www.garykessler.net/library/password.html (January 4, 2013)

  38. Yampolskiy, R.V.: Analyzing User Password Selection Behavior for Reduction of Password Space. In: Proceedings of the 40th Annual IEEE International Carnahan Conferences Security Technology, Lexington, USA, pp. 109–115 (2006)

    Google Scholar 

  39. Mann, I.: Hacking the human (IT - Security). Engineering & Technology 3(1), 62–63 (2008)

    Article  Google Scholar 

  40. Wolfram, S.: A New Kind of Science. Wolfram Media, Inc., Champaign (2002)

    Google Scholar 

  41. Wolfram, S.: Random sequence generation by cellular automata. Advances in Applied Mathematics 7(2), 123–169 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  42. Gage, D., Laub, E., McGarry, B.: Cellular Automata: Is Rule 30 Random? In: Proceedings of the Midwest NKS Conference, Indiana University (2005)

    Google Scholar 

  43. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A.I., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptologic Applications. NIST Special Publication 800–822. NIST (2001)

    Google Scholar 

  44. Yampolskiy, R.V.: Single-Share Password-Protected Visual Cryptography via Cellular Automata (2011), http://demonstrations.wolfram.com/SingleSharePasswordProtectedVisualCryptographyViaCellularAut/ (cited January 15, 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yampolskiy, R.V., Rebolledo-Mendez, J.D., Hindi, M.M. (2014). Password Protected Visual Cryptography via Cellular Automaton Rule 30. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55046-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55045-4

  • Online ISBN: 978-3-642-55046-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics