{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:40:03Z","timestamp":1746160803405,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550454"},{"type":"electronic","value":"9783642550461"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55046-1_4","type":"book-chapter","created":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T10:49:12Z","timestamp":1395658152000},"page":"57-67","source":"Crossref","is-referenced-by-count":8,"title":["Password Protected Visual Cryptography via Cellular Automaton Rule 30"],"prefix":"10.1007","author":[{"given":"Roman V.","family":"Yampolskiy","sequence":"first","affiliation":[]},{"given":"Jovan D.","family":"Rebolledo-Mendez","sequence":"additional","affiliation":[]},{"given":"Musa M.","family":"Hindi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Rong-Jian, C., Yuan-Hsin, C., Chao-Shen, C., Jui-Lin, L.: Image Encryption\/Decryption System using 2-D Cellular Automata. In: Proceedings of the IEEE Tenth International Symposium on Consumer Electronics (ISCE 2006), St. Petersburg, Russia, pp. 1\u20136 (2006)","DOI":"10.1109\/ISCE.2006.1689421"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Abboud, G., Marean, J., Yampolskiy, R.V.: Steganography and Visual Cryptography in Computer Forensics. In: Proceedings of the Fifth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, USA, pp. 25\u201332 (2010)","DOI":"10.1109\/SADFE.2010.14"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Losavio, M., Hindi, M., Yampolskiy, R., Wilson Keeling, D.: Boundary Conditions for the Digital Forensic Use of Electronic Evidence and the Need for Forensic Counter-Analysis. In: Proceedings of the Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), in Conjunction with IEEE Security and Privacy Symposium, Oakland, USA, pp. 1\u20136 (2010)","DOI":"10.1109\/SADFE.2011.2"},{"issue":"5","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1109\/21.44016","volume":"19","author":"B. Arazi","year":"1989","unstructured":"Arazi, B., Dinstein, I.H., Kafri, O.: Intuition, perception, and secure communication. IEEE Transactions on Systems, Man and Cybernetics\u00a019(5), 1016\u20131020 (1989)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Spanos, G.A., Maples, T.B.: Security for real-time MPEG compressed video in distributed multimedia applications. In: Proceedings of the IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Scottsdale, USA, pp. 72\u201378 (1996)","DOI":"10.1109\/PCCC.1996.493615"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"O\u2019Gorman, L., Rabinovich, I.: Photo-image authentication by pattern recognition and cryptography. In: Proceedings of the 13th International Conference on Pattern Recognition, Vienna, Austria, vol.\u00a03, pp. 949\u2013953 (1996)","DOI":"10.1109\/ICPR.1996.547308"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Piva, A., Barni, M., Bartolini, F., Cappellini, V.: DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of the International Conference on Image Processing, Santa Barbara, USA, vol.\u00a01, pp. 520\u2013523 (1997)","DOI":"10.1109\/ICIP.1997.647964"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Main, P.M.: Extension of secure audio and video data from the NTC through the public switched telephone network. In: MILCOM 1997, Monterrey, USA, vol.\u00a01, pp. 228\u2013231 (1997)","DOI":"10.1109\/MILCOM.1997.648707"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"O\u2019Ruanaidh, J.J.K., Pun, T.: Rotation, scale and translation invariant digital image watermarking. In: Proceedings of the International Conference on Image Processing, Santa Barbara, USA, vol.\u00a01, pp. 536\u2013539 (1997)","DOI":"10.1109\/ICIP.1997.647968"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Dugad, R., Ratakonda, K., Ahuja, N.: A new wavelet-based scheme for watermarking images. In: Proceedings of the International Conference on Image Processing 1998 (ICIP 1998), Chicago, USA, vol.\u00a02, pp. 419\u2013423 (1998)","DOI":"10.1109\/ICIP.1998.723406"},{"issue":"10","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/34.722623","volume":"20","author":"L. O\u2019Gorman","year":"1998","unstructured":"O\u2019Gorman, L., Rabinovich, I.: Secure identification documents via pattern recognition and public-key cryptography. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a020(10), 1097\u20131102 (1998)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Sang-Yi, Y., Kyo-II, C., Chung-Sang, R., Kwang-Hoon, C.: Encryption of cell-oriented computer generated hologram by using visual cryptography. In: The Pacific Rim Conference on Lasers and Electro-Optics (CLEO\/Pacific Rim 1999), Seoul, South Korea, vol.\u00a03, pp. 817\u2013818 (1999)","DOI":"10.1109\/CLEOPR.1999.817849"},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/45.747238","volume":"18","author":"D. Stinson","year":"1999","unstructured":"Stinson, D.: Visual cryptography and threshold schemes. IEEE Potentials\u00a018(1), 13\u201316 (1999)","journal-title":"IEEE Potentials"},{"key":"4_CR15","unstructured":"Fridrich, J.: Applications of data hiding in digital images. In: Proceedings of the Fifth International Symposium on Signal Processing and its Applications (ISSPA 1999), Brisbane, Australia (1999)"},{"issue":"25","key":"4_CR16","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1049\/el:20001429","volume":"36","author":"W. Ran-Zan","year":"2000","unstructured":"Ran-Zan, W., Chi-Fang, L., Ja-Chen, L.: Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters\u00a036(25), 2069\u20132070 (2000)","journal-title":"Electronics Letters"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Anbarasi, L.J., Vincent, M.J., Mala, G.S.A.: A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India, pp. 129\u2013133 (2011)","DOI":"10.1109\/ICRTIT.2011.5972436"},{"issue":"8","key":"4_CR18","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhi","year":"2006","unstructured":"Zhi, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing\u00a015(8), 2441\u20132453 (2006)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"4_CR19","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F. Liu","year":"2008","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Information Security\u00a02(4), 151\u2013165 (2008)","journal-title":"IET Information Security"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Jaya, M.S., Aggarwal, A., Sardana, A.: Novel authentication system using visual cryptography. In: Proceedings of the World Congress on Information and Communication Technologies (WICT), Mumbai, India, pp. 1181\u20131186 (2011)","DOI":"10.1109\/WICT.2011.6141416"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Chavan, P.V., Atique, M.: Design of hierarchical visual cryptography. In: Proceedings of the 2012 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, pp. 1\u20133 (2012)","DOI":"10.1109\/NUICONE.2012.6493182"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Monoth, T., Babu, A.P.: Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns. In: Proceedings of the International Conference on Cyberworlds (CW), Singapore, pp. 171\u2013178 (2010)","DOI":"10.1109\/CW.2010.39"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Prema, G., Natarajan, S.: Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application. In: Proceedings of the International Conference on Information Communication and Embedded Systems 2013 (ICICES), Chennai, India, pp. 727\u2013730 (2013)","DOI":"10.1109\/ICICES.2013.6508373"},{"issue":"3","key":"4_CR24","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1142\/S0219878911002434","volume":"8","author":"I.A. Ismail","year":"2011","unstructured":"Ismail, I.A., Abdo, A.A., Amin, M., Diab, H.: Self-Adaptive Image Encryption Based on Memory Cellular Automata. Proceedings of the International Journal of Information Acquisition\u00a08(3), 227\u2013241 (2011)","journal-title":"Proceedings of the International Journal of Information Acquisition"},{"key":"4_CR25","unstructured":"Kari, J.: Cryptosystems based on reversible cellular automata (1992)"},{"issue":"1","key":"4_CR26","first-page":"43","volume":"6","author":"M. Machhout","year":"2009","unstructured":"Machhout, M., Guitouni, Z., Zeghid, M., Tourki, R.: Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator. International Journal of Computer Science & Applications\u00a06(1), 43\u201362 (2009)","journal-title":"International Journal of Computer Science & Applications"},{"issue":"5-6","key":"4_CR27","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.parco.2003.12.014","volume":"30","author":"F. Seredynski","year":"2004","unstructured":"Seredynski, F., Bouvry, P.P., Zomaya, A.Y.: Cellular automata computations and secret key cryptography. Parallel Computing\u00a030(5-6), 753\u2013766 (2004)","journal-title":"Parallel Computing"},{"key":"4_CR28","unstructured":"Hern\u00e1ndez Encinas, L., Mart\u00edn del Rey, \u00c1., Hern\u00e1ndez Encinas, A.: Encryption of Images with 2-dimensional Celluar Automata. In: Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics and 8th International Conference on Information System Analysis and Synthesis (SCI\/ISAS 2002). International Institute of Informatics and Systemics (IIIS), Orlando (2002)"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/11492429_50","volume-title":"Pattern Recognition and Image Analysis","author":"G. \u00c1lvarez Mara\u00f1\u00f3n","year":"2005","unstructured":"\u00c1lvarez Mara\u00f1\u00f3n, G., Hern\u00e1ndez Encinas, L., Mart\u00edn del Rey, \u00c1.: A new secret sharing scheme for images based on additive 2-dimensional cellular automata. In: Marques, J.S., P\u00e9rez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005. LNCS, vol.\u00a03522, pp. 411\u2013418. Springer, Heidelberg (2005)"},{"key":"4_CR30","first-page":"51","volume":"1","author":"P. Guan","year":"1987","unstructured":"Guan, P.: Cellular Automaton Public-Key Cryptosystem. Complex Systems\u00a01, 51\u201357 (1987)","journal-title":"Complex Systems"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 429\u2013432. Springer, Heidelberg (1986)"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Trostle, J.T.: Timing attacks against trusted path. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, pp. 125\u2013134 (1998)","DOI":"10.1109\/SECPRI.1998.674829"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., deMedeiros, B., Glodek, B.: Password Cracking Using Probabilistic Context-Free Grammars. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, Berkeley, USA, pp. 391\u2013405 (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 364\u2013372 (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"4_CR35","unstructured":"Klein, D.V.: Foiling the cracker: A survey of and improvements to password security. In: Proceedings of the USENIX UNIX Security Workshopp, Portland, USA (1990)"},{"issue":"5","key":"4_CR36","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Security & Privacy\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"4_CR37","unstructured":"Kessler, G.C.: Passwords - Strengths and weaknesses. Gary Kessler Associates (1996), http:\/\/www.garykessler.net\/library\/password.html (January 4, 2013)"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Yampolskiy, R.V.: Analyzing User Password Selection Behavior for Reduction of Password Space. In: Proceedings of the 40th Annual IEEE International Carnahan Conferences Security Technology, Lexington, USA, pp. 109\u2013115 (2006)","DOI":"10.1109\/CCST.2006.313438"},{"issue":"1","key":"4_CR39","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1049\/et:20080119","volume":"3","author":"I. Mann","year":"2008","unstructured":"Mann, I.: Hacking the human (IT - Security). Engineering & Technology\u00a03(1), 62\u201363 (2008)","journal-title":"Engineering & Technology"},{"key":"4_CR40","unstructured":"Wolfram, S.: A New Kind of Science. Wolfram Media, Inc., Champaign (2002)"},{"issue":"2","key":"4_CR41","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Random sequence generation by cellular automata. Advances in Applied Mathematics\u00a07(2), 123\u2013169 (1986)","journal-title":"Advances in Applied Mathematics"},{"key":"4_CR42","unstructured":"Gage, D., Laub, E., McGarry, B.: Cellular Automata: Is Rule 30 Random? In: Proceedings of the Midwest NKS Conference, Indiana University (2005)"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A.I., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptologic Applications. NIST Special Publication 800\u2013822. NIST (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"key":"4_CR44","unstructured":"Yampolskiy, R.V.: Single-Share Password-Protected Visual Cryptography via Cellular Automata (2011), http:\/\/demonstrations.wolfram.com\/SingleSharePasswordProtectedVisualCryptographyViaCellularAut\/ (cited January 15, 2013)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security IX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55046-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:47Z","timestamp":1746159347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55046-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550454","9783642550461"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55046-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}