Visual Cryptography
What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. How Visual Cryptography works Each pixel of the images is divided into smaller blocks. In the table on the right we can see that a pixel, divided into four parts, can have six different states.If a pixel on layer 1 has a given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1. We can now create the two layers. Additional information
Lucid Dreaming
By lucid dreaming, you can gain complete control over the one place that no one will ever care about: your imagination. Just The Facts Lucid dreaming is a scientifically proven phenomenon. How to Take Control of Your Dreams: So, you've doubled your weight over the past five years, you own a record-shattering collection of greasy pizza boxes and broken aspirations, and you're beginning to consider installing a toilet bowl in the place of your computer chair? In order to even begin to get control over your dreams, there are a few preliminary tasks you must complete. Your fake and imagined rendition of Yvonne won't care how much your cry before, during, and afterward! The Tasks: The first step is mentioned in another Cracked article (5 Ways To Hack Your Brain Into Awesomeness), but here's a quick long and wordy rundown. 1. "What?" Calm down! Important tip: Do not use your dream journal as an excuse to tell co-workers about "that weird/bizarre/scary dream you had last night." 2.
Related:
Related: