Advances in Cryptology

N/ACitations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In visual cryptography the additive property of light is used. Also the shares are random and therefore suspect to a censor. In this paper we present two new cryptographic schemes which use music and the wave properties of light. Both schemes are also secret sharing schemes in which shares are music or images and are not suspect to a human censor. Our scheme guarantees perfect privacy as well as high quality. To decrypt the message, one just plays two shares on a stereo system. There are two decryption methods which are either based on the interference property of sound or based on the stereo perception of the human hearing system. In optical cryptography, we use pictures as covers and the wave interference property of light. The privacy is perfect and the modified images are non-suspicious. The Mach-Zehnder interferometer is used as the decryption machine.

Cite

CITATION STYLE

APA

Advances in Cryptology. (1984). Advances in Cryptology. Springer US. https://doi.org/10.1007/978-1-4684-4730-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free