You are on page 1of 4

2018 IEEE 32nd International Conference on Advanced Information Networking and Applications

Cognitive Cryptography in Advanced Data Security

Marek R. Ogiela1, Lidia Ogiela2


1
AGH University of Science and Technology
Faculty of Electrical Engineering, Automatics
Computer Science and Biomedical Engineering
30 Mickiewicza Ave., 30-059 Krakow, Poland
e-mail: mogiela@agh.edu.pl
2
AGH University of Science and Technology
Cryptography and Cognitive Informatics Research Group
30 Mickiewicza Ave., 30-059 Krakow, Poland
e-mail: logiela@agh.edu.pl

Abstract—In this paper will be described the new way of using patterns and biometric characteristics, hand and finger
cognitive cryptography in data security applications. Cognitive movements, body motions or very specific gestures [3][7].
features and personal information may be used in creation of It is also possible to define management procedures based on
advanced data security techniques, and communication the perception abilities, or the specific knowledge of a
protocols. Such personally oriented procedures may play particular person. Such knowledge-based approach may be
important role in advanced secure management applications
realized in visual captcha creation. Captcha codes in such
and authentication tasks. Additionally some perception and
behavioral features allow to generate unique sequences, which procedures may be oriented on specific group of users, which
also may be used in modern cryptographic application. Such possess specific knowledge and can properly use it during
possibilities will be described in this paper. verification processes.
Such protocols can also be connected with creation of
Keywords—cryptographic protocols; cognitive cryptography; individual perception thresholds associated with the
data security; recognition and interpretation of specific visual data.
Personally oriented technologies can also play an important
I. INTRODUCTION role in future IoT technologies.
Cognitive cryptography is a novel computational The goal of this paper is to present selected ideas of
paradigm proposed by authors of this paper a few years ago in application of personal features and cognitive cryptography
[5][11][12]. The main idea of this computational approach is solutions for security purposes. Such solutions seem to be very
to join together classic cryptographic algorithms with promising for developing advanced cryptographic
cognitive approaches or cognitive systems [4][6]. technologies, especially those based on visual patterns, which
Cryptographic procedures allow to guarantee security and can also evaluate specific human habits, features, and
integrity of encoded information, but additionally application perception capabilities.
of cognitive systems, allow to involve in the encryption stage
or distribution protocol some personal feature, what finally II. KNOWLEDGE-BASED HIERARCHICAL CAPTCHA IN
cause that security procedure is dependent on personal SECURITY APPLICATIONS
characteristic. Additionally application of cognitive systems In this section will be presented hierarchical captcha
allow to evaluate the semantic meaning of encrypted codes, which require specific or expert knowledge during
information, which also could be applied in the whole security verification processes. In general captcha is a special type of
procedure i.e. ciphertext may be dependent on the content of coded dedicated for user verification, which confirm that a
encrypted information. task was executed by a humans, not a computer systems or
Such cognitive cryptography solutions may have different Internet robot. Such verification procedures can also be
applications. It may be used for creation of behavioral locks, applied for information management tasks in distributed
personalized keys, threshold procedures with personal infrastructures like Cloud or Fog computer systems.
perception levels, or even advanced information management The verification procedures performed with captcha
protocols [9][10]. consist of different stages, at which different verification
This paper will describe example applications of cognitive techniques may be executed. Visual codes allow access to data
cryptography solutions in the form of personal and perceptual or computer systems to participants who answered a question
features in developing management protocols and visual correctly or select captcha parts in proper manner. In case of
cryptography procedures [2][13]. improper answer captcha techniques can prevent to access to
Personal characteristics can be extracted or evaluated by secret information or web services. In this solution, it is
cognitive vision systems, which support extraction of personal necessary to correctly select any combination of elements

1550-445X/18/$31.00 ©2018 IEEE 740


DOI 10.1109/AINA.2018.00111
which fulfil particular conditions or have a particular In verification procedures, it is also possible to specify the
meaning. For example, we can select all or only a small more complex answers, which required expert knowledge or
number of visual parts representing specific information. combination of answers.
Figure 1 presents possible solutions in which users are verified Figure 2 present an example with multi-level captcha
with different combinations of correct captchas. answers. Depending on the whole image division on parts it is
possible to find different proper answers. When we consider
only biggest parts of this image it is possible to find only one
answer (red part). For more detailed division it is also possible
to find other solutions based on yellow net or green one.
Different parts selection may be required for different users,
but we can also consider the verification process, which will
have several stages for the same user.

Figure 1. Examples of visual captcha for a verification procedure with the


question: where is a parrot (left), or where do you see parrots (right).

Figure 2. Examples of visual captcha with multi-level answers for the question: on which part(s) do you see fish? Depending on the image division for
particular parts it is possible to find only one answer (the red rectangle), four (yellow parts) or sixteen (green parts).

Figure 3. Examples of captcha which required expert medical knowledge.

741
Considering captcha visual codes, it is also possible to III. COGNITIVE KEYS IN SECURITY PROTOCOLS
create a verification procedure which required some expert Application of cognitive cryptography for security
knowledge, connected with used images. In Figure 3 is purposes can also be connected with creation of personal
presented an example of such solution, based on medical cognitive keys.
visualization. Of course the meaning of captcha can be Such keys must be dependent on visual perception abilities
different when using other visual content, but for presented of particular person or user [8][11]. In such protocols, we can
example the proper answer for authenticating users can be establish individual perceptual thresholds for each
connected with selection of images which: participants of protocol. Protocol can operate properly
• Presents brain structures (image A) because often different details on images are noticed while we
• Abdominal organs (B) gain enough information to recognize it or guess invisible
• Chest structures (D) details. In this procedure, it is possible to define personal
• Heart (C) perception thresholds at which particular user can properly
It may also depend on examination modality like: recognize the original pattern, but other individuals cannot do
• USG examination (B) this in the same way. Such threshold depends on the
• RTG (D) expectations and knowledge of the content of original images.
• CT or MRI (A & C) Fig. 4 presents an example of such threshold. Users
Similar solutions can presents selected medical structure without any knowledge or expectation about the content of
with different lesions or disease stages. The proper answer in this image have to collect all secret parts to recognize it.
such cases can be find only by people having experiences or However those who have some additional knowledge (e.g.
expert knowledge. individuals who knows how looks sharked-shaped submarine)
can recognize it at an early stage.

Figure 4. An example of image reconstruction based on a different number of secret parts. On the right column visible images restored from different
numbers of visual parts. Top image and the middle may suggest that the object is the shark. The bottom shows details and allow to recognize submarine
(shark-shaped).

All such cognitive cryptography procedures combine the


IV. FEATURES OF COGNITIVE-BASED CRYPTOGRAPHIC security features with personal parameters or semantic
SOLUTIONS meaning of encrypted information.
Presented in this paper security approaches which are Cognitive cryptography protocols should be secure due to
based on cognitive cryptography paradigm have several the security features of basic algorithms, which was expanded
important features. Application of perceptional abilities for to include of personal, or perceptual features.
creation of personalized keys allow to support the Personal parameters usually can be evaluated in real time
development of efficient and universal encryption procedures using appropriate sensors or biometric devices, what allow to
dedicated specifically to trusted users. Application of evaluate select personal features in a short time. Also the
cognitive systems allow to extract personal characteristics complexity of such protocols remains at the same level as
from traditional biometric patterns as well as other patterns complexity of simple procedures without cognitive
connected with morphometric parameters of human body extensions.
parts, or even behavioral features [1][12].

742
V. CONCLUSIONS [3] Z. Jin, A. B. J. Teoh, B.-M. Goi, Y.-H. Tay, “Biometric cryptosystems:
a new biometric key binding and its implementation for fingerprint
This paper describes application of cognitive minutiae-based representation,” Pattern Recognition, vol. 56, 2016, pp.
cryptography approaches in creation of secure captcha visual 50–62.
codes, and perceptual cryptographic keys. [4] L. Ogiela, “Cognitive information systems in management sciences,”
Personal characteristics used in such procedures can be Elsevier, Academic Press, 2017.
extracted from biometric pattern or movements sequences. It [5] L. Ogiela, M. R. Ogiela, “Data mining and semantic inference in
allows to create authorization protocols, and procedures, cognitive systems,” In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.)
2014 International Conference on Intelligent Networking and
which can be applied for visual information sharing. Collaborative Systems (IEEE INCoS 2014), Salerno, Italy, 10-12 Sep
Perceptual or behavioral features can be extracted by 2014, pp. 257-261.
cognitive vision systems, which allow to evaluate personal [6] L. Ogiela, M. R. Ogiela, “Management Information Systems,” LNEE
unique parameters. The main idea of applying the above 331, 2015, pp. 449-456.
features is to create personalized and secure authentication [7] L. Ogiela, M. R. Ogiela, “Insider Threats and Cryptographic
and verification procedures. The universality of such Techniques in Secure Information Management,”. IEEE Systems
protocols allows them to be used in different applications for Journal, vol. 11, 2017, pp. 405-414.
example data encryption, but also for information distribution [8] M. R. Ogiela, U. Ogiela, “Linguistic Approach to Cryptographic Data
in the Cloud. Presented approach can be also expanded to use Sharing,” In: FGCN 2008 – The 2nd International Conference on
Future Generation Communication and Networking, Hainan Island,
by individuals with different cognitive skills. In such cases it China, 13-15 Dec 2008, vol. 1, pp. 377–380.
is necessary to apply only such personal features, which not [9] M. R. Ogiela, U. Ogiela, “Grammar Encoding in DNA-Like Secret
change over time and are mainly linked to biometric patterns Sharing Infrastructure,” LNCS, 6059, 2010, pp. 175-182.
for security purposes. [10] M. R. Ogiela, U. Ogiela, “Secure Information Management using
Linguistic Threshold Approach,” Advanced Information and
ACKNOWLEDGMENT Knowledge Processing, Springer, London, 2014.
This work has been supported by the AGH University of [11] M. R. Ogiela, L. Ogiela, “On using Cognitive Models in
Cryptography,” IEEE AINA 2016 - The IEEE 30th International
Science and Technology research Grant No 11.11.120.329. Conference on Advanced Information Networking and Applications,
Crans-Montana, Switzerland, March 23-25, 2016, pp. 1055-1058.
REFERENCES
[12] M. R. Ogiela, L. Ogiela, “Cognitive Keys in Personalized
[1] M. Gomez-Barrero, E. Maiorana, J. Galbally, “Multi-biometric Cryptography,” IEEE AINA 2017 - The 31st IEEE International
template protection based on Homomorphic Encryption,” Pattern Conference on Advanced Information Networking and Applications,
Recognition, vol. 67, 2017, pp. 149–163. Taipei, Taiwan, March 27-29, 2017, pp. 1050-1054.
[2] Ch. Hahn, J. Hur, “Efficient and privacy-preserving biometric [13] F. Y. Shih, “Digital Watermarking and Steganography: Fundamentals
identification in cloud,” ICT Express, vol. 2, 2016, pp. 135–139. and Techniques,” CRC Press, Boca Raton, 2017.

743

You might also like