Single-Share Password-Protected Visual Cryptography via Cellular Automata

Drag the image at the bottom-right corner to the left. This shows how manually overlapping the two shares can be used in visual cryptography. This novelty of this Demonstration is that one of the shares is a snapshot of a rule-30 cellular automaton (CA) evolved from a set of predefined conditions making up a password that needs to be used to decrypt an encrypted share.
Visual cryptography depends on two shares, only one of which has to be random. The second share can contain a predefined pattern. In the algorithm presented here, a snapshot of a CA after a certain number of steps is used to generate the predefined share. The initial configuration, extra security bits, the number of the rule for the CA, and the number of computed steps serve as a password for a visually encrypted image. This encryption system is a hybrid between visual and classical cryptographic approaches. It requires less storage space compared to a standalone visual encryption system.

SNAPSHOTS

  • [Snapshot]
  • [Snapshot]
  • [Snapshot]
    • Share:

Embed Interactive Demonstration New!

Just copy and paste this snippet of JavaScript code into your website or blog to put the live Demonstration on your site. More details »

Files require Wolfram CDF Player or Mathematica.