Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Louisville

Series

2014

One Time Pad

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Password Protected Visual Cryptography Via Cellular Automaton Rule 30, Roman V. Yampolskiy, Jovan D. Rebolledo-Mendez, Musa M. Hindi Jan 2014

Password Protected Visual Cryptography Via Cellular Automaton Rule 30, Roman V. Yampolskiy, Jovan D. Rebolledo-Mendez, Musa M. Hindi

Faculty Scholarship

Visual cryptography depends on two shares. The initial configuration, extra security bits and the number of the rule for the CA along with the number of computed steps serve as a password for a visually encrypted image. The second share could contain a predefined pattern; the developed algorithm uses a snapshot of a CA after a certain number of steps to generate the predefined share. Only one of these shares has to be random. The developed encryption system is a hybrid between visual and classical cryptographic approaches. It requires less storage space compared to a standalone visual encryption system and …