Abstract
Visual cryptography scheme (VCS) is an encryption technique that utilizes the human visual system in recovering of the secret image and does not require any cryptographic computation. Autostereogram is a single two dimensional image which becomes a virtual three dimensional image when viewed with proper eye convergence or divergence. Combing the two technologies via human vision, this paper presents a new scheme called (k, n)-VCS with autostereogram. In the scheme, a secret image is encrypted into n images called shares, each of which can function as an autostereogram. By stacking any k shares, the secret image is recovered visually without any equipment, whereas no secret information is obtained with less than k shares.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Alteniese, G., Blundo, C., De Santis, A., Sinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)
Wang, D.S., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42(11), 3071–3082 (2009)
Wheastone, C.: contributions to the physiology of vision, part i: on some remarkable and hitherto unobserved, phenomena of binocular vision. Philos. Trans. R. Soc. Lond. 128, 371–394 (1838)
Wheastone, C.: Contributions to the physiology of vision, Part II: On some remarkable and hitherto unobserved, phenomena of binocular vision (continued). The London, Edinburgh and Dublin Phil. Mag. J. Sci. 4(3), 504–523 (1852)
Julesz, B.: Binocular depth perception of computer generated patterns. The Bell Syst. Tech. J. 39, 1125–1162 (1960)
Tyler, C.W., Clarke, M.B.: The autostereogram. SPIE Stereoscopic Displays Appl. 1256, 182–196 (1990)
Thimbleby, H.W., Inglis, S., Witten, I.H.: Displaying 3D images: algorithms for single-image random-dot stereograms. COMPUTER 27(10), 38–48 (1994)
Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Cerebral cryptography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 62–72. Springer, Heidelberg (1998)
Minh, S.T., Fazekas, K., Gschwindt, A.: The presentation of three-dimensional objects with single image stereogram. IEEE Trans. Instrum. Meas. 51(5), 955–961 (2002)
Papas, M., Houit, T., Nowrouzezahrai, D., Gross, M., Jarosz, Wo.: The magic lens: refractive steganography. ACM SIGGRANPH Asia 2012. (2012) Available at http://www.disneyresearch.com/wp-content/uploads/project_magiclens_paper.pdf
Tsai, S.-L., Wen, C.-H.: Towards a design guideline of visual cryptography on stereoscopic displays. In: Kurosu, M. (ed.) HCII/HCI 2013, Part III. LNCS, vol. 8006, pp. 78–84. Springer, Heidelberg (2013)
Yamamoto H., Tada S., Suyama S.: Use of DFD (depth-fused 3-D) perception for visual cryptography. Available at http://www.perceptionweb.com/abstract.cgi?id=v110728
Acknowledgements
This research was supported in part by the National Natural Science Foundation of China (Grant Nos. 61170032 and 61373020), and was also supported by the Testbed@TWISC, National Science Council under the Grant NSC 100-2219-E-006-001.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wang, DS., Yi, F., Yang, CN. (2015). Visual Cryptography Scheme with Autostereogram. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)