A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme

†Summary This paper presents a new visual cryptography scheme for secure digital transmission. Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. In this paper, we apply Diffie and Hellman (D-H) key agreement method and toral automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications.

[1]  Rastislav Lukac,et al.  Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.

[2]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[3]  Adi Shamir,et al.  How to expose an eavesdropper , 1984, CACM.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[6]  Alfred Menezes,et al.  Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.

[7]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[8]  Chin-Chen Chang,et al.  Sharing a Secret Two-Tone Image in Two Gray-Level Images , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[9]  L. Hernández Encinas,et al.  A secure scheme to share secret color images , 2005, Comput. Phys. Commun..

[10]  Ueli Maurer,et al.  Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.