background preloader

Security Matters

Facebook Twitter

What Secrets Your Phone Is Sharing About You. Visual Cryptography. What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994.

Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. How Visual Cryptography works Each pixel of the images is divided into smaller blocks. In the table on the right we can see that a pixel, divided into four parts, can have six different states.If a pixel on layer 1 has a given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1.

We can now create the two layers. Additional information. Researchers Analyze Brainwaves To Authenticate Users - Passwords may not need to be made of numbers and letters after all It sounds like something straight out of science fiction: brainwaves taking the place of passwords in the name of authentication. But a new study by researchers from the U.C. Berkeley School of Information is turning fiction into reality. The study (PDF) examined the brainwave signals of individuals performing specific actions to see whether they can be consistently matched to the right individual.

In the tasks where participants could choose a personal secret, they were asked to imagine performing a repetitive motion from a sport of their choice, singing a song of their choice, watching a series of on-screen images and silently counting the objects that match a color of their choice, or choose their own thought and focus on it for 10 seconds. To measure the subjects' brainwaves, the team used the NeuroSky Mindset, a Bluetooth headset that records Electroencephalographic (EEG) activity.

Have a comment on this story? Petraeus and Broadwell should have used PGP encryption and Tor, not dead dropping, to secure affair emails. Make The Call: Even More Suspicious Terrorist Behaviors To Look Out For. The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival Samples - McArdle - 2012 - Risk Analysis. Ranch Gate Access. Schneier on Security.