Intuition, Perception, and Secure Communication

Research output: Contribution to journalArticlepeer-review

9 Scopus citations


The possibility of integrating human visual intelligence into the process of encrypting sensitive information by presenting certain visual information to the recipient's eye is discussed. This adds a new dimension to the crypto complexity of such a process. Two implementations, based on this principle, are described. The first shows how keys used for encryption can be randomly generated by the transmitter, without the necessity of exchanging them with the legitimate recipient. The keys are “embedded” in a master key and are recovered from it by the intelligence of the legitimate recipient after she uses the master key. No human intelligence can be helpful to a user who does not possess the master key. The second implementation concerns the possibility of creating a secret connection between a numerical key and a specific image (e.g., a face). Such a scheme can be used, for example, in validating the identity of the users of credit cards.

Original languageEnglish
Pages (from-to)1016-1020
Number of pages5
JournalIEEE Transactions on Systems, Man and Cybernetics
Issue number5
StatePublished - 1 Jan 1989

ASJC Scopus subject areas

  • General Engineering


Dive into the research topics of 'Intuition, Perception, and Secure Communication'. Together they form a unique fingerprint.

Cite this