Password Protected Visual Cryptography via Cellular Automaton Rule 30

Visual cryptography depends on two shares. The initial configuration, extra security bits and the number of the rule for the CA along with the number of computed steps serve as a password for a visually encrypted image. The second share could contain a predefined pattern; the developed algorithm uses a snap- shot of a CA after a certain number of steps to generate the predefined share. Only one of these shares has to be random. The developed encryption system is a hybrid between visual and classical cryptographic approaches. It requires less storage space compared to a standalone visual encryption system and relies on Rule 30's tested statistically significant randomness.

[1]  Sang-Yi Yi,et al.  Encryption of cell-oriented computer generated hologram by using visual cryptography , 1999, Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464).

[2]  Roman V. Yampolskiy,et al.  Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[3]  Ángel Martín del Rey,et al.  Encryption of Images with 2-dimensional Cellular Automata , 2002 .

[4]  Rached Tourki,et al.  Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator , 2009, Int. J. Comput. Sci. Appl..

[5]  G. Prema,et al.  Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[6]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[7]  D. Stinson Visual cryptography and threshold schemes , 1999 .

[8]  Lawrence O'Gorman,et al.  Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[10]  G. S. Anandha Mala,et al.  A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[11]  Jui-Lin Lai,et al.  Image Encryption/Decryption System using 2-D Cellular Automata , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[12]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[13]  P. M. Main Extension of secure audio and video data from the NTC through the public switched telephone network , 1997, MILCOM 97 MILCOM 97 Proceedings.

[14]  Albert Y. Zomaya,et al.  Cellular automata computations and secret key cryptography , 2004, Parallel Comput..

[15]  Vitaly Shmatikov,et al.  Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.

[16]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[17]  Lawrence O'Gorman,et al.  Photo-image authentication by pattern recognition and cryptography , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[18]  Jarkko Kari Cryptosystems Based on Reversible Cellular Automata , 1992 .

[19]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[20]  DUSTIN GAGE CELLULAR AUTOMATA : IS RULE 30 RANDOM ? , 2005 .

[21]  G. A. Spanos,et al.  Security for real-time MPEG compressed video in distributed multimedia applications , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.

[22]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[23]  Sudhir Aggarwal,et al.  Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[24]  Abhinav Aggarwal,et al.  Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.

[25]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[26]  P. Babu Anto,et al.  Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns , 2010, 2010 International Conference on Cyberworlds.

[27]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[28]  I. Mann Hacking the human [IT security] , 2008 .

[29]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .

[30]  Ángel Martín del Rey,et al.  A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata , 2005, IbPRIA.

[31]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[32]  Puhua Guan,et al.  Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..

[33]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[34]  J. Yan,et al.  Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.

[35]  Eun-Soo Kim,et al.  Encryption of cell-oriented computer generated hologram by using visual cryptography , 1999 .

[36]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[37]  Kijoon Chae,et al.  DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR , 2009 .

[38]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[39]  Jonathan T. Trostle,et al.  Timing attacks against trusted path , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[40]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[41]  Mohammad Atique,et al.  Design of hierarchical visual cryptography , 2012, 2012 Nirma University International Conference on Engineering (NUiCONE).

[42]  Ismail Amr Ismail,et al.  Self-Adaptive Image Encryption Based on Memory Cellular Automata , 2011, Int. J. Inf. Acquis..

[43]  Its'hak Dinstein,et al.  Intuition, perception, and secure communication , 1989, IEEE Trans. Syst. Man Cybern..

[44]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[45]  R.V. Yampolskiy Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[46]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[47]  Stephen Wolfram,et al.  A New Kind of Science , 2003, Artificial Life.