Open Access
Visual Cryptography
Moni Naor,Adi Shamir +1 more
Reads0
Chats0
TLDR
In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.Abstract:
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant of the k out of n secret sharing problem, in which a dealer provides a transparency to each one of the n users; any k of them can see the image by stacking their transparencies, but any k-1 of them gain no information about it.read more
Citations
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
TL;DR: It is concluded that many academic proposals to replace text passwords for general-purpose user authentication on the web have failed to gain traction because researchers rarely consider a sufficiently wide range of real-world constraints.
Book ChapterDOI
An Information-Theoretic Model for Steganography
TL;DR: An information-theoretic model for steganography with passive adversaries is proposed and several secure steganographic schemes are presented; one of them is a universal information hiding scheme based on universal data compression techniques that requires no knowledge of the covertext statistics.
Proceedings Article
Déjà Vu: a user study using images for authentication
Rachna Dhamija,Adrian Perrig +1 more
TL;DR: Deja Vu is a recognition-based authentication system, which authenticates a user through her ability to recognize previously seen images, which is more reliable and easier to use than traditional recall-based schemes, which require the user to precisely recall passwords or PINs.
Journal ArticleDOI
Secret-ballot receipts: True voter-verifiable elections
TL;DR: A new kind of receipt sets a far higher standard of security by letting voters verify the election outcome - even if all election computers and records were compromised.