| Article ID | Journal | Published Year | Pages | File Type | 
|---|---|---|---|---|
| 7428993 | International Journal of Information Management | 2018 | 7 Pages | 
Abstract
												This paper discusses the foundations of cognitive cryptography used to secure information by splitting it and distributing the split parts among selected groups of secret trustees. The process of concealing data by its splitting and distributing secret parts (shadows) with the use of cognitive techniques will be discussed. Cognitive cryptography describes the possibilities of using personal information contained in individual biometric traits. At the same time, it will be presented as an innovative solution allowing the holder of a secret shadow to be identified based on their characteristic biometrics and their semantic features. Cognitive cryptography is used to manage strategic information. By using techniques for splitting and sharing this type of data as well as utilising individual biometric traits in the entire process of distributing all shadows of the concealed and split information makes the proposed cognitive cryptography techniques an innovative, extremely useful tool for securing data of major importance.
											Keywords
												
											Related Topics
												
													Social Sciences and Humanities
													Business, Management and Accounting
													Management Information Systems
												
											Authors
												Marek R. Ogiela, Lidia Ogiela, 
											