Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Posted on
- Visual Cryptography
November 9, 2005, 2:16 pm
rate this thread
I have read in "Visual Cryptography", how an image can be reconstructed
"visually" by superimposing two shares. But I have not understood how
this can help in authenticating a user?
Are there any practical implementations of this technique? If so, how do
they deal with the probelm of sending the image across the wire, securely?
Can someone explain this.
Thanks in advance.
Re: Visual Cryptography
see PDF: http://www.voterverifiable.com/article.pdf
This doesn't actually authenticate the user but it shows a good
implementation... this is secure because even if you send the image
across the wire it is only half of of the image. you need the other
half to understand it.
look into xor encryption for more information on the security of that..
it's basically just a visual xor encryption
- Juergen Nieveler
November 9, 2005, 10:58 pm