In this paper we present a new “hiding” scheme. Our method uses pictures and secret sharing. The approach is completely different from the one suggested by Kurak-McHugh. We use two pictures as in visual cryptography and each picture corresponds to a secret share of the message. Our scheme differs from visual cryptography. First, while visual cryptography is a cryptosystem, our scheme is both a cryptosystem as well as a hiding system. Our images are not random, but correspond to real photographs randomly altered. This modification of the original image is quite invisible to the naked eye. Secondly, our decryption method does not use the subtractive properties of light. The decryption is done by our brain using the perceived 3-D properties of the human visual system. A 3-D viewer is the only decryption hardware needed.
CITATION STYLE
Desmedt, Y. G., Hou, S., & Quisquater, J. J. (1998). Cerebral cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1525, pp. 62–72). Springer Verlag. https://doi.org/10.1007/3-540-49380-8_5
Mendeley helps you to discover research relevant for your work.