A Novel Visual Cryptography Coding System for Jam Resistant Communication

By Baird, Leemon C.,, III; Schweitzer, Dino et al. | Issues in Informing Science & Information Technology, Annual 2010 | Go to article overview

A Novel Visual Cryptography Coding System for Jam Resistant Communication


Baird, Leemon C.,, III, Schweitzer, Dino, Bahn, William L., Sambasivam, Sam, Issues in Informing Science & Information Technology


Introduction

Cryptography is a complex and difficult subject for students to learn: a message is scrambled using a key and an algorithm that tends to be highly abstract. That is why many different uses of technology have been explored to make it more concrete and easier to understand. One of these is visual cryptography. In visual cryptography, the "key" is simply a sheet of clear plastic with apparently-random dots printed on it. The "encrypted message" is another such sheet, which also appears to be random. But when the two sheets are set on top of each other, a hidden message appears. There is an enormous literature on visual cryptography (see all of the References section below, other than the first four). It was originally invented and developed for cryptographic reasons, but the pedagogical uses are clear. It allows the student to physically manipulate the elements of the system, and visually see the decryption process in action. Although a computer must still be involved to create the two images, the student can carry out the decryption step without a computer. For example, the reader is invited to experiment with the visual cryptography system online at Baird (2000).

The more recent field of concurrent codes is even more abstract and difficult for students to grasp. The original code developed in that field is the Baird Bahn Collins (BBC) algorithm (Baird, Bahn, & Collins, 2007), which is complex enough that students may have difficulty grasping it at first. This suggests that it would be useful to have something analogous to visual cryptography for BBC codes. This paper proposes the first such Visual BBC system, and gives several variants.

In BBC, an algorithm is used to convert a message into a binary string of mostly zeros with only a few ones. This string is the codeword for that message. For example, Figure 1 shows how the three messages "Red", "Green" and "Blue" might be encoded as BBC codewords.

[FIGURE 1 OMITTED]

This is just a simple example. In an actual implementation, the codewords would be much longer, and would be generated in a more complex way.

[FIGURE 2 OMITTED]

In cryptography, encryption is used to hide messages. In BBC coding, the goal is the opposite: to make the messages clear, even when they are superimposed. Two messages are superimposed by taking a bitwise OR of their bits. For example, the "Red" and "Green" messages can be superimposed as in Figure 2. Both messages can be transmitted simultaneously by transmitting their superimposed codeword.

Note that there is a 1 in the "Red, Green" result in every position where there is a 1 in "Red" or "Green" or both. It is clear by inspection that given the "Red+Green" string, it can be seen to contain "Red" and "Green", but not "Blue". This decoding can be done easily when there are only 3 possible messages. But it is tedious to do without a computer when there are, say, [2.sup.100]0 possible messages.

A superimposed combination of BBC codewords can be separated back into their original messages through a very simple algorithm. Although the BBC decoding algorithm will not be given here, it is a linear-time algorithm that separates images with very low error rates, as long as the combination of codewords has more 0 bits than 1 bits.

At this point, it would be natural to go on and show the students the details behind encoding and decoding. But first, it would be useful to put the above examples in a form that the students can understand more easily. In the example above, each string contains 25 bits, and is written as a long row of bits. The example might be clearer if they were instead written as a 5 by 5 array of bits. In that case, the example would look like Figure 3.

[FIGURE 3 OMITTED]

This might be clearer if the digits 1 and 0 were replaced with black and white squares, respectively, as in Figure 4.

[FIGURE 4 OMITTED]

In this form, a type of visual BBC system could be created. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

A Novel Visual Cryptography Coding System for Jam Resistant Communication
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.