Article ID Journal Published Year Pages File Type
7428993 International Journal of Information Management 2018 7 Pages PDF
Abstract
This paper discusses the foundations of cognitive cryptography used to secure information by splitting it and distributing the split parts among selected groups of secret trustees. The process of concealing data by its splitting and distributing secret parts (shadows) with the use of cognitive techniques will be discussed. Cognitive cryptography describes the possibilities of using personal information contained in individual biometric traits. At the same time, it will be presented as an innovative solution allowing the holder of a secret shadow to be identified based on their characteristic biometrics and their semantic features. Cognitive cryptography is used to manage strategic information. By using techniques for splitting and sharing this type of data as well as utilising individual biometric traits in the entire process of distributing all shadows of the concealed and split information makes the proposed cognitive cryptography techniques an innovative, extremely useful tool for securing data of major importance.
Keywords
Related Topics
Social Sciences and Humanities Business, Management and Accounting Management Information Systems
Authors
, ,