Single-Share Password-Protected Visual Cryptography via Cellular Automata
Initializing live version

Requires a Wolfram Notebook System
Interact on desktop, mobile and cloud with the free Wolfram Player or other Wolfram Language products.
Drag the image at the bottom-right corner to the left. This shows how manually overlapping the two shares can be used in visual cryptography. This novelty of this Demonstration is that one of the shares is a snapshot of a rule-30 cellular automaton (CA) evolved from a set of predefined conditions making up a password that needs to be used to decrypt an encrypted share.
[more]
Contributed by: Roman V. Yampolskiy (August 2011)
Additional contributions by: Vitaliy Kaurov
Based on a program by: Paul van der Schaaf
Open content licensed under CC BY-NC-SA