Audio and Optical Cryptography

In visual cryptography the additive property of light is used. Also the shares are random and therefore suspect to a censor. In this paper we present two new cryptographic schemes which use music and the wave properties of light. Both schemes are also secret sharing schemes in which shares are music or images and are not suspect to a human censor. Our scheme guarantees perfect privacy as well as high quality. To decrypt the message, one just plays two shares on a stereo system. There are two decryption methods which are either based on the interference property of sound or based on the stereo perception of the human hearing system. In optical cryptography, we use pictures as covers and the wave interference property of light. The privacy is perfect and the modified images are non-suspicious. The Mach-Zehnder interferometer is used as the decryption machine.

[1]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Giovanni Di Crescenzo,et al.  Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.

[4]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[6]  S.J. Elliott,et al.  Active noise control , 1993, IEEE Signal Processing Magazine.

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  R. A. Phillips,et al.  Contemporary Optics for Scientists and Engineers , 1977 .

[9]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.