Example of Pixel-Based Visual Cryptography in Detail

Total Page:16

File Type:pdf, Size:1020Kb

Example of Pixel-Based Visual Cryptography in Detail Example of Pixel-based Visual Cryptography in Detail All that is not perfect down to the smallest detail is doomed to perish. Gustav Mahler 266 Example of Pixel-based Visual Cryptography Figure 1: Example: Pixel-based Visual Cryptography, Original Picture S. Pape, Authentication in Insecure Environments, DOI 10.1007/978-3-658-07116-5, © Springer Fachmedien Wiesbaden 2014 Example of Pixel-based Visual Cryptography 267 Figure 2: Example: Pixel-based Visual Cryptography, Transparency 1 268 Example of Pixel-based Visual Cryptography Figure 3: Example: Pixel-based Visual Cryptography, Transparency 2 Example of Pixel-based Visual Cryptography 269 Figure 4: Example: Pixel-based Visual Cryptography, Overlay Auxiliary Tables and Proofs Consistency is found in that work whose whole and detail are suitable to the occasion. It arises from circumstance, custom, and nature. Marcus Vitruvius Pollio 272 Auxiliary Tables and Proofs Lemmas ( )= − 2 n Lemma 11.1. The derivative of f n 1 n+1 is positive for all n>1. v v Proof. By applying the chain rule for df f(n)=du du + du dv dn du dn dv dn v v with u = 1 − 2 , v = n, du = vuv−1, and du = log(u)uv it follows: n+1 du dv − df 2 n 1 df 2 f(n)=n 1 − 1 − dn n + 1 dn n + 1 2 n 2 df + 1 − log 1 − (n) n + 1 n + 1 dn − 2 n 1 2 2 2 = 1 − n + 1 − log 1 − n + 1 (n + 1)2 n + 1 n + 1 2 n 2n n − 1 = 1 − + log n + 1 n2 − 1 n + 1 n Since for all n>1it holds that 1 − 2 >0it remains to show that T(n)= n+1 2n + n−1 >0 n = 2 T(2)= n2−1 log n+1 . We start with an evaluation for and get 4 − ( ) ( ) 3 log 3 >0. Next, we regard the derivative of T n : dT dT 2n dT n − 1 T(n)= + log dn dn n2 − 1 dn n + 1 − ( 2 − ) − ( ) (n + 1) dT n 1 = n 1 2 2n 2n + dn n+1 (n2 − 1)2 n − 1 − 2 − ( + )(( + ) −( − ) ) = 2n 2 + n 1 n 1 1 n 1 1 (n2 − 1)2 (n − 1)(n + 1)2 − 2 − ( 2 − ) = 2n 2 + 2 n 1 (n2 − 1)2 (n2 − 1)2 − = 4 (n2 − 1)2 S. Pape, Authentication in Insecure Environments, DOI 10.1007/978-3-658-07116-5, © Springer Fachmedien Wiesbaden 2014 Auxiliary Tables and Proofs 273 This means that T(n) is stricly monotonically decreasing. Next, we consider the second derivative: d2T dT −4 T(n)= dn2 dn (n2 − 1)2 4 dT n4 − 2n2 + 1 = dn (n2 − 1)4 3 − = 16n 16n (n2 − 1)4 = 16n (n2 − 1)3 Since the second derivative is non-negative, T(n) is strictly convex. Furthermore, since the the limit of both summands as n approaches infinity is zero, the limit of T(n) as n approaches infinity is also zero: 2n n − 1 lim + log = 0 n→∞ n2 − 1 n + 1 This means that T(n) decreases slower and slower, but is always positive until − 2 n n approaches infinity. Hence, the derivative of 1 n+1 is also positive and n therefore we showed that df 1 − 2 >0for all n>1. dn n+1 274 Auxiliary Tables and Proofs Tables Table 1: Possible Pairs of Dice Codings with n = 9 for a Given Number of Different Dots difference possible pairs 0 (0,0); (1,1); (2,2); (3,3); (4,4); (5,5); (6,6); (7,7); (8,8); (9,9) 1 (0,1); (1,0); (1,2); (2,1); (2,3); (3,2); (3,4); (4,3); (4,5); (5,4); (5,6); (6,5); (6,7); (7,6); (7,8); (8,7); (8,9); (9,8) 2 (0,2); (1,1); (1,3); (2,0); (2,2); (2,4); (3,1); (3,3); (3,5); (4,2); (4,4); (4,6); (5,3); (5,5); (5,7); (6,4); (6,6); (6,8); (7,5); (7,7); (7,9); (8,6); (8,8); (9,7) 3 (0,3); (1,2); (1,4); (2,1); (2,3); (2,5); (3,0); (3,2); (3,4); (3,6); (4,1); (4,3); (4,5); (4,7); (5,2); (5,4); (5,6); (5,8); (6,3); (6,5); (6,7); (6,9); (7,4); (7,6); (7,8); (8,5); (8,7); (9,6) 4 (0,4); (1,3); (1,5); (2,2); (2,4); (2,6); (3,1); (3,3); (3,5); (3,7); (4,0); (4,2); (4,4); (4,6); (4,8); (5,1); (5,3); (5,5); (5,7); (5,9); (6,2); (6,4); (6,6); (6,8); (7,3); (7,5); (7,7); (8,4); (8,6); (9,5) 5 (0,5); (1,4); (1,6); (2,3); (2,5); (2,7); (3,2); (3,4); (3,6); (3,8); (4,1); (4,3); (4,5); (4,7); (4,9); (5,0); (5,2); (5,4); (5,6); (5,8); (6,1); (6,3); (6,5); (6,7); (7,2); (7,4); (7,6); (8,3); (8,5); (9,4) 6 (0,6); (1,5); (1,7); (2,4); (2,6); (2,8); (3,3); (3,5); (3,7); (3,9); (4,2); (4,4); (4,6); (4,8); (5,1); (5,3); (5,5); (5,7); (6,0); (6,2); (6,4); (6,6); (7,1); (7,3); (7,5); (8,2); (8,4); (9,3) 7 (0,7); (1,6); (1,8); (2,5); (2,7); (2,9); (3,4); (3,6); (3,8); (4,3); (4,5); (4,7); (5,2); (5,4); (5,6); (6,1); (6,3); (6,5); (7,0); (7,2); (7,4); (8,1); (8,3); (9,2) 8 (0,8); (1,7); (1,9); (2,6); (2,8); (3,5); (3,7); (4,4); (4,6); (5,3); (5,5); (6,2); (6,4); (7,1); (7,3); (8,0); (8,2); (9,1) 9 (0,9); (1,8); (2,7); (3,6); (4,5); (5,4); (6,3); (7,2); (8,1); (9,0) Auxiliary Tables and Proofs 275 Table 2: Upper Bounds of Probabilities (in %) that k Matching Ciphertexts Occur Given ∗ N1∗ Ciphertexts of 1 and n = 9 (cf. Term 5.8) ⎧ ⎪0, if N ∗ <k ⎪ 1 ⎨⎪ 1, if N1∗ > (k − 1)n P (∃c.#c = k|N1∗ ) = n! 1 ⎪1 − N , if k N ∗ (k − 1)n,k = 2 ⎪ (n−N1∗ )! 1 ⎪ n1∗ ⎪ N1∗ −1 ⎩ N1∗ N1∗ −k ≈ 1 ( − ) ∗ ( − ) k n n 1 , if k N1 k 1 n,k > 2 k 23456 N1∗ 2 11.1 0 0.0 0.0 0.0 3 30.9 1.2 0.0 0.0 0.0 4 53.9 4.4 0.1 0.0 0.0 5 74.4 9.8 0.6 1.5 · 10−2 0.0 6 88.6 17.3 1.6 8.1 · 10−2 1.7 · 10−3 7 96.2 27.0 3.4 0.3 1.1 · 10−2 8 99.2 38.4 6.0 0.6 3.7 · 10−2 9 99.9 51.2 9.6 1.2 0.1 10 100.0 65.0 14.2 2.1 0.2 k 78 910 N1∗ 2 0.0 0.0 0.0 0.0 3 0.0 0.0 0.0 0.0 4 0.0 0.0 0.0 0.0 5 0.0 0.0 0.0 0.0 6 0.0 0.0 0.0 0.0 7 1.9·10−4 0.0 0.0 0.0 8 1.3·10−3 2.1 · 10−5 0.0 0.0 9 5.4·10−3 1.6 · 10−4 2.3 · 10−6 0.0 10 1.6·10−2 7.4 · 10−4 2.1 · 10−5 2.6 · 10−7 276 Auxiliary Tables and Proofs ∗ Table 3: Probabilities (in %) that Ni∗ Ciphertexts of i out of N Ciphertexts Occur with n = 9 if i Follows a Uniform Distribution − N 2 Ni∗ 2 N Ni∗ P (#i = Ni∗ |N) = + 1 − + Ni∗ n 1 n 1 N ∗ i 012345 N 1 80.0 20.0 0.0 0.0 0.0 0.0 2 64.0 32.0 4.0 0.0 0.0 0.0 3 51.2 38.4 9.6 0.8 0.0 0.0 4 41.0 41.0 15.3 2.6 0.2 0.0 5 32.8 41.0 20.5 5.1 0.6 3.2·10−2 6 26.2 39.3 24.5 8.2 1.5 0.2 7 21.0 36.7 27.5 11.5 2.9 0.4 8 16.8 33.6 29.4 14.7 4.6 0.9 9 13.4 30.2 30.2 17.6 6.6 1.6 10 10.7 26.8 30.2 20.1 8.8 2.6 11 8.6 23.6 29.5 22.2 11.1 3.9 12 6.9 20.6 28.4 23.6 13.3 5.3 13 5.5 17.9 26.8 24.6 15.4 6.9 14 4.3 15.4 25.0 25.0 17.2 8.6 15 3.5 13.2 23.1 25.0 18.8 10.3 16 2.8 11.2 21.1 24.6 20.0 12.0 17 2.3 9.6 19.1 23.9 20.9 13.6 18 1.8 8.1 17.2 23.0 21.5 15.1 19 1.4 6.8 15.4 21.8 21.8 16.4 20 1.2 5.8 13.7 20.5 21.8 17.5 N ∗ i 678910 N 1 to 5 0.0 0.0 0.0 0.0 0.0 6 6.4·10−3 0.0 0.0 0.0 0.0 7 3.5·10−2 1.2·10−3 0.0 0.0 0.0 8 0.1 8.2·10−3 2.6·10−4 0.0 0.0 9 0.3 2.9·10−2 1.8·10−3 5.1·10−5 0.0 10 0.6 7.8·10−2 7.3·10−3 4.1·10−4 1.0·10−5 11 1.0 0.2 2.1·10−2 1.8·10−3 9.0·10−5 12 1.6 0.3 5.2·10−2 5.8·10−3 4.3·10−4 13 2.3 0.6 0.1 1.5·10−2 1.5·10−3 14 3.2 0.9 0.2 3.3·10−2 4.2·10−3 15 4.3 1.4 0.3 6.7·10−2 1.0·10−2 16 5.5 2.0 0.6 0.1 2.1·10−2 17 6.8 2.7 0.8 0.2 4.2·10−2 18 8.2 3.5 1.2 0.3 7.5·10−2 19 9.5 4.4 1.7 0.5 0.1 20 10.9 5.5 2.2 0.7 0.2 Auxiliary Tables and Proofs 277 ∗ Table 4: Probabilities (in %) that N1∗ Ciphertexts of 1 out of N Ciphertexts Occur with N0∗ = 2 and n = 9 if i Follows a Uniform Distribution (cf.
Recommended publications
  • Attestation Using Visual Cryptography (3,3) Scheme International Journal
    ISSN 2347 - 3983 Volume 8. No. 3, March 2020 Dodda Pratap Roy et al., International Journal of Emerging Trends in Engineering Research, 8(3), March 2020, 645- 651 International Journal of Emerging Trends in Engineering Research Available Online at http://www.warse.org/IJETER/static/pdf/file/ijeter06832020.pdf https://doi.org/10.30534/ijeter/2020/06832020 Attestation Using Visual Cryptography (3,3) Scheme Dodda Pratap Roy1, Dr. M Jaya Bhaskar2 1 M. Tech Student, Department of CSE (Cyber Security and digital Forensics), KLEF, Vaddeswaram, A.P, India, [email protected] 2 Professor, Department of CSE, KLEF, Vaddeswaram, A.P, India, [email protected] ABSTRACT Visual Cryptography is a technique in cryptography which is In Symmetric Key cryptography both the sender and receiver used to encrypt the images and all other visual information. use same key and it is a single key to do both encrypt and And this cryptography is different from all other decrypt operation on the message which was shared between cryptographic techniques, because of its decryption process them and in asymmetric key cryptography both the sender and it is done mechanically. In general, visual cryptography and receiver uses different keys. image is encryption is limited up to two shares only. In this paper we propose a complete new and different way of In those two keys one key is used to perform encryption and authentication(attestation) which helps to provide more another key is used to perform decryption operation on the security than other authentication systems by using the secret data. And in hash functions, instead of keys hash value Visual Cryptography (3,3) Scheme.
    [Show full text]
  • Secure Physical System Design Leveraging Puf Technology
    SECURE PHYSICAL SYSTEM DESIGN LEVERAGING PUF TECHNOLOGY A Thesis Submitted to the Faculty of Purdue University by Samuel T. Kerr In Partial Fulfillment of the Requirements for the Degree of Master of Science May 2012 Purdue University West Lafayette, Indiana ii ACKNOWLEDGMENTS A lot of people have had an impact in my life, both academic and personal. I wish to thank all of you that have influenced it in a positive way. I would like to especially thank Professor Elisa Bertino. She took a risk on me as a freshmen and allowed me to get into research. I have greatly enjoyed learning and growing under her direction these past few years. Without such a great mentor, I don’t think I would be where I am today. Michael Kirkpatrick also deserves a lot of thanks. He helped guide some of my ini­ tial work with PUF devices, pointing out things I missed and helping me mature as a researcher. His lessons were invaluable, not only about the research topic themselves, but also about how research is done. Sypris Electronics and its staff were also an invaluable asset to have during my course of study as well. They funded many of the projects that I worked on as well as made engineers available to help me learn and move forward with my work. Finally, my parents deserve a special thanks. Without the wonderful upbringing and strong sense of values they instilled in me, none of this would have been possible. I love you Mom and Dad, thanks for pushing me. iii TABLE OF CONTENTS Page LIST OF TABLES :::::::::::::::::::::::::::::::: vi LIST OF FIGURES :::::::::::::::::::::::::::::::
    [Show full text]
  • Visual Cryptography Based Secret Sharing System
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 Visual Cryptography based Secret Sharing System Nidhi Chauhan 1, Rajat Singhal2, Shweta Maurya3, Himanshu Pandey4, Prof. G.V. Bhole5 1,2,3,4Student, Dept. of Information Technology, Bharati Vidyapeeth College of Engineering, Maharashtra, India 5Professor, Dept. of Information Technology, Bharati Vidyapeeth College of Engineering, Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Visual Cryptography is an efficient encryption Visual cryptography is a prominent solution for image method to conceal information in images so that it very well encryption by isolating the original image into may be decrypted by the human visual framework. The benefit transparencies. Visual cryptography was proposed in 1994 of the visual secret sharing can be achieved by utilizing its by Naor and Shamir who presented a basic however secure decryption procedure where with no complex cryptographic way that permits secret sharing with no cryptographic calculation encoded secret information is decoded by Human calculation, which they named as Visual Cryptography Visual System (HVS). Be that as it may, the encryption strategy Scheme (VCS) [1]. Utilizing secret sharing ideas, the needs cryptographic calculation to partition the image into encryption system encrypt a secret image into the various parts for sharing (let n). k-n secret sharing plan is an shares(printed on transparencies) which are commotion like exceptional sort of Visual Cryptographic procedure where secure images which can be transmitted or dispersed over gathering of k shares is required out of n shares to uncover the an unbound correspondence channel.
    [Show full text]
  • Secure Data Sharing Using Visual Cryptography
    International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY V.Vaishnavi1, B.Shanthi2 and S. Sophia Rani3 1,2 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous), Periyakulam, Theni (Dt) 3Assistant Professor, Dept. of Computer Science Jayaraj Annapackiam College for Women(Autonomous), Periyakulam, Theni(Dt) ABSTRACT The Secure Data Sharing Using Visual Cryptography Scheme is a kind of secret sharing scheme that fixates on sharing secret data. The fundamental conception of the visual cryptography scheme is to split a secret data into number of desultory shares which discretely reveals no information about the secret data other than the size of the secret data. The AES algorithm used for secret key .The secret data can be reconstructed by stacking the portions. In the multimedia steganocryptic system, the message will first be encrypted utilizing public key encryption algorithm, and then this encrypted data will be obnubilated into an image file thus accomplishing both data encoding and obnubilating. The multimedia data will be acclimated to provide the cover for the information. Visual steganography is one of the most secure forms of steganography available today. It is most commonly implemented in image files. In this application concept of visual cryptography is the legal distribution of multimedia contents with copyright protection whilst preserving the privacy of user, whose identities are only revealed in case of illegal re-distribution. This application to apply sharing of single secrete data and multiple secrete data on ebony and white as well as on colour images but withal a comparative analysis on visual cryptography schemes is with all performed.
    [Show full text]
  • Implementation of Visual and Quantum Cryptography Techniques for Secure Information Flow in Content Delivery Networks
    Implementation of Visual and Quantum Cryptography techniques for Secure Information Flow in Content Delivery Networks P. JAGADEESWARA RAO1, P. SUNITHA2, CH. RUPA3, V. SANDHYA4 1 2Assistant Professor, Department of computer science & engineering, 2 Scholars, JNTUK 2 3 4 Dhanekula Institute of Engineering & Technology, Vijayawada. 3Professor, VR Siddhartha Engineering College, Vijayawada. Abstract— Steganography, a science of visual 1. INTRODUCTION cryptography, was historically originated to write Steganography is the field of research that utilizes a secret message and it was impossible to be the insensitivity of the human sense organs revealed, Though Steganography is an old (sensory redundancy) and multimedia signal concept it is a powerful one and can be practiced inherent redundancy (data redundancy) to hide where long classical secret keys need to be the secret message in a carrier signal. avoided and sense of simplicity while strong Steganography hides the fact of communicating cryptography is vital. One of the biggest and therefore it is a good choice of secure challenges of Steganography and other Visual communication. Steganography message can be Cryptography techniques is that an attacker in the retrieved by reverse Steganography middle can hijack the image and forward a fake image. This again means that we need large However one problem of Steganography and classical keys or so to secure the channel. other visual cryptography techniques [3] is that However large keys are no longer going to be there can be an eavesdropper Eve between two suitable for future next generation networks as users, Alice and Bob, and Eve can hijack the they require light weight key distribution systems image taken from Alice and forward a fake image which are also free from eavesdropping.
    [Show full text]
  • Threshold Quantum Cryptography
    Threshold Quantum Cryptography Subhash Kak Abstract: Most current research on quantum cryptography requires transmission and reception of single photons that creates severe implementation challenges and limits range. This paper argues for the development of threshold quantum cryptography protocols in which the system is secure so long as the number of photons being exchanged between Alice and Bob is below a specified threshold. We speak of a (p-k-n) threshold system where if the number of photons exchanged is less than p, the system is completely secure, when it is between p and k, the system is partially secure, and when it exceeds k, the system is insecure. The BB84 protocol is (1-1-1) whereas the three-stage protocol appears to be (p-4p-n), where p is the least number of photons necessary to determine the polarization state of identically prepared photons. New quantum cryptography systems should be sought that provide greater flexibility in the choice of p and k. INTODUCTION The BB84 protocol of quantum cryptography is based on transmission of single photons carrying one-bit of information defined with respect to two sets of orthogonal bases [1]. This creates many engineering challenges and limits the applicability of quantum cryptography. Due to the Heisenberg Uncertainty Relations, the energy of photons, or equivalently their number, and the times at which they are emitted cannot be simultaneously fixed. To produce photons that appear singly in the specified time window with high probability requires the use of extremely low power lasers which, in turn, brings down the effective clock rate to just a few thousand bits per second making BB84 useless as a method of quantum communication (for which the modem bit rates can be hundreds of millions of bits per second).
    [Show full text]
  • Cryptographic Hash Functions for Image Processing
    CRYPTOGRAPHIC HASH FUNCTIONS FOR IMAGE PROCESSING by Shafaq Iftikhar B.S(ENG)., COMSATS Institute of IT, Pakistan, 2007 A project presented to Ryerson University in partial fulfillment of the requirements for the degree of Master of Engineering in the Program of Electrical and Computer Engineering Toronto, Ontario, Canada, June 2015 ©Shafaq Iftikhar 2015 AUTHOR'S DECLARATION I hereby declare that I am the sole author of this MEng Project. This is a true copy of the MEng Project, including any required final revisions, as accepted by my examiners. I authorize Ryerson University to lend this MEng Project to other institutions or individuals for the purpose of scholarly research. I further authorize Ryerson University to reproduce this MEng Project by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. I understand that MEng Project may be made electronically available to the public. ii Cryptographic Hash Functions for Image Processing, M.Eng. 2015, Shafaq Iftikhar, Program of Electrical and Computer Engineering, Ryerson Universty ABSTRACT In this paper, a novel algorithm based on hash function for image cryptography is proposed. In this algorithm, the key idea is to encrypt half of the image using data from the second half of the image and then apply it to each other. This scheme can achieve high sensitivity, high complexity, and high security. The sole purpose is to improve the image entropy. iii ACKNOWLEDGEMENTS I am using this opportunity to express my gratitude to everyone who supported me throughout the course of this M.Eng project.
    [Show full text]
  • A Visual Cryptographic Encryption Technique for Securing Medical
    International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 6, June (2013) A Visual Cryptographic Encryption Technique for Securing Medical Images Quist-Aphetsi Kester, MIEEE Faculty of Informatics, Ghana Technology University College, PMB 100 Accra-Norths, Tesano, Accra, Ghana Abstract— The increased growth in the use of transmission They demonstrated a visual secret sharing scheme, of multimedia medical contents over unsecured and open where an image was broken up into n shares so that only networks provides insecurity for confidential patient someone with all n shares could decrypt the image, while information over these networks. Digital encryption of any n − 1 shares revealed no information about the original medical images before transmission and storage is proposed image. Each share was printed on a separate transparency, as a way to effectively provide protection of patient information. Encryption before watermarking of these images and decryption was performed by overlaying the shares. is necessary in order to ensure inaccessibility of information to When all n shares were overlaid, the original image would unauthorized personnel with patient. appear [5]. This paper presented a visual cryptographic technique for Visual cryptography encodes a secret binary image into encrypting of medical images before transmission or storage n shares of random binary patterns. The secret image can of them. This will make such images inaccessible by be visually decoded by superimposing a qualified subset of unauthorized personnel and also ensures confidentiality. The transparencies, but no secret information can be obtained process made use of an encryption technique that is based on from the superposition of a forbidden subset [6].
    [Show full text]
  • The Cyber-Performative in Second Life
    The Cyber-Performative in Second Life by Meindert Nicholas van Orden B.A., University of Victoria, 2007 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS in the Department of English, with a specialization in Cultural, Social, and Political Thought © Meindert Nicholas van Orden, 2010 University of Victoria All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. ii The Cyber-Performative in Second Life by Meindert Nicholas van Orden B.A., University of Victoria, 2007 Supervisory Committee Dr. Evelyn Cobley, Supervisor (Department of English) Dr. Ray Siemens, Departmental Member (Department of English) Dr. Arthur Kroker, Outside Member (Department of Political Science) iii Supervisory Committee Dr. Evelyn Cobley, Supervisor (Department of English) Dr. Ray Siemens, Departmental Member (Department of English) Dr. Arthur Kroker, Outside Member (Department of Political Science) Abstract I argue that current descriptions of the ways that language and computer code effect change (are “performative”) oversimplify the effects that utterances made in and through virtual spaces have on the real world. Building on J.L. Austin’s speech-act theory and Jacques Derrida’s deconstruction of Austin’s notion of performative language, I develop the theory of cyber-performativity. Though Katherine Hayles argues that “code” is more strongly performative than the utterances Austin focused on, Hayles’ analysis is founded on her problematic distinction between the logical computational worldview and the slippery natural-languages worldview. Cyber-performative theory builds on Hayles’ argument by showing that computational processes are as uncertain as natural languages: like human languages, “code” might always signify more and other than is intended.
    [Show full text]
  • Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography
    Computers, Materials & Continua Tech Science Press DOI:10.32604/cmc.2021.014293 Article Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3 and Dac-Nhuong Le4,5,* 1JIS College of Engineering, Kalyani, West Bengal, 741235, India 2Global Institute of Management and Technology, Nadia, West Bengal, 741102, India 3Department of Mechanical Engineering, College of Engineering, Taif University, Taif, 21944, Saudi Arabia 4Institute of Research and Development, Duy Tan University, Danang, 550000, Vietnam 5Faculty of Information Technology, Duy Tan University, Danang, 550000, Vietnam *Corresponding Author: Dac-Nhuong Le. Email: [email protected] Received: 11 September 2020; Accepted: 10 November 2020 Abstract: With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganog- raphy are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of infor- mation security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual cover audio filessing u audio steganographic techniques. The cover audios are then sent to the required destinations where reverse steganography schemes are applied to them to get the incomprehensible com- ponent images back. At last, all the sub-images are superimposed to get the actual secret image.
    [Show full text]
  • Secure Visual Cryptography Scheme with Meaningful
    e-ISSN : 0976-5166 p-ISSN : 2231-3850 Jinu Mohan et al. / Indian Journal of Computer Science and Engineering (IJCSE) SECURE VISUAL CRYPTOGRAPHY SCHEME WITH MEANINGFUL SHARES Jinu Mohan Research Scholar, Bharathiar University, India [email protected] Rajesh R Associate Professor, CHRIST (Deemed to be University), India [email protected] Abstract - Visual cryptography is an outstanding design, which is also known as visual secret sharing. It used to encode a secret portrait into various pointless share images. Normally, item bossed on transparencies and decrypts as loading one or two or the entire share images by means of the human visual system. Suppose, if we encompass great sets of secret shares then the pointless shares are complicated to handle. In this paper, a meaningful secret sharing algorithm and a modified Signcryption algorithm is used to enhance the security of the Visual Cryptography encryption schemes. The foremost intend of the anticipated format is to extend consequential shares and similarly make sure the isolation on conveying the secret data. The anticipated process is executed in the functioning platform of MATLAB and the presentation results are investigated. Keywords: Visual Cryptography, Elliptic Curve Cryptography (ECC), Signcryption algorithm, Password based Authentication. 1. Introduction Nowadays, the multimedia information is quickly and simply conveyed by internet in the quick expansion of network technology. Even the private information like military maps are also conveyed by the networks. Cryptography is the analysis of constructing symbols to protect the privacy and data reliability [1]. Visual cryptography is a cryptographic procedure which is used to permit visual information (pictures, text, etc) as encrypted and that the decryption is carried out by means of the human visual system, devoid of the computer support.
    [Show full text]
  • A Comprehensive Study of Visual Cryptography
    A Comprehensive Study of Visual Cryptography Jonathan Weir and WeiQi Yan Queen’s University Belfast, Belfast, BT7 1NN, UK Abstract. Visual cryptography (VC) is a powerful technique that com- bines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides it into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed, the secret can be recovered. No computer participation is required, thus demonstrat- ing one of the distinguishing features of VC. VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system (HVS). In this survey, we will summarize the latest developments of visual cryptography since its inception in 1994, introduce the main research topics in this area and outline the current problems and possible solutions. Directions and trends for future VC work shall also be examined along with possible VC applications. 1 Introduction Visual cryptography is a powerful technique which combines the notions of per- fect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares which can be stacked together to approx- imately recover the original image. A secret sharing scheme enables distribution of a secret amongst n parties, such that only predefined authorized sets will be able to reconstruct the secret. The secret, in terms of visual cryptography can be reconstructed visually by superimposing shares. Visual cryptography allows the transmission of visual information and many aspects of this area are covered, including its inception to the current techniques being employed and actively researched today.
    [Show full text]