Результаты (
английский) 2:
[копия]Скопировано!
Currently, there are many methods of data encryption. In general, they are based on the Data Encryption Algorithm, namely symmetric and asymmetric algorithms for hybrid. But in this article we will talk about the method of encryption graphic information. '' 'Visual Cryptography' '' - encryption technique that allows you to encrypt the visual information (pictures, texts, etc.), in such a way that the transcript becomes a mechanical operation that does not require a computer . To carry out the decoding in this case, can be performed using the human visual system. == Statement of the problem to be solved with the help of visual cryptography == Visual cryptography was first introduced M.Naorom and A.Shamirom on EUROCRYPT in 1994. They examined the possibility of developing an encryption scheme in which the resulting image can only be obtained by applying it all N layers. Thus, each layer will consist of black and white (transparent) pixel. It is worth noting an important fact, the imposition of N-1 layers on top of each other can not give any information on the resulting image. === Common encryption scheme using visual cryptography === Naor and Shamir demonstrated his idea with the help of transparencies, which are layers original image. Each layer of the image printed on transparent film. To decrypt the image is complete superimposition of all layers on one surface. In a similar manner one can use visual cryptography in computer systems. In this case, layers of images superimposed on each other with the help of graphic editors. [[Main_Page | Back to the Table of Contents]] === === Example of the use of technology '' 'An example of technology:' '' [[File: visual_cryptowiki1.jpg | frame | 1 layer | left]] [[File: visual_cryptowiki2.jpg | frame | 2 layer | right]] [[File: visual_cryptowiki3.jpg | frame | Overlay | center]] [[File: visual_cryptowiki4.jpg | frame | The resulting image | center]] In this example, the image is divided into 2 layers, which do not represent nothing but "noise". To decrypt the original image is necessary to impose the 2 layers on top of each other. After this operation, the decoded image is obtained. The same principle comes deciphering image with lots of layers. That is, we have the original image and then divide it into a plurality of layers, each layer is a strange noise. In order to decipher simply impose ALL (ALL is !!!) available layers on top of each other and get the picture. In case of shortage of at least one layer of an attacker can not get the original picture. From the example above you can see that in this scheme, there is no encryption key and it is not expected. However, the algorithm can be improved by adding to each participant one layer of the exchange of information to be kept by them initially, and will not be shared. With this layer (which will act as a key) will form the other layers. Thus, members can not worry about the consequences of exchange layers of the image, as the attacker even after receiving all the layers will not be able to obtain the original image without the "layer-key." In theory, this encryption method can be effectively used for secure messaging on the network, if the set of possible posts are not very large (e.g., a plurality of different alarm signals). To implement such an exchange may be as follows. Let the source side Once all messages are first of a pair of shadow images (Image 1), and at the receiver of messages - only every second image of a pair of shadow image (image 2). Each shadow image - quite by accident, and when released into the wrong hands alone (without the second image of the pair) does not give any information. If one of the shadow image 1 receiver consistently applies it to the image of his set, and finds the first semantically loaded picture message (coming from the source of the messages a particular alarm). '' With this technology, you can hide bmp image using three containers. ' 'BMP-file consists of header and data area of the palette. The data area contains the description of all the color components of each pixel in the RGB format (ie the quantitative values of red, green and blue). ‴ BMP image encryption method '' 'The source image is a 24-bit bmp drawings. For each color represents 8 bits of information. The essence of the algorithm is that the secret image is divided into shades of red, green and blue, and then each primitive stored in the least significant bits of one of the image containers. Those. encrypt the image after each container (R, G, B) will contain one component of the secret image. Encrypting image
переводится, пожалуйста, подождите..