Skip to main content

Hiding a Second Appearance in a Physical Relief Surface

  • Conference paper
Information Hiding (IH 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7692))

Included in the following conference series:

Abstract

We present a novel information hiding process that couples geometrical modeling with automated 3D fabrication for creating hidden-appearance reliefs. Our relief surface produces a first grayscale appearance visible by simple direct illumination and a second grayscale appearance ensured to be visible when the relief is lit by a digital projector with a specifically designed pattern and from a particular direction. The two appearances/images can be different yet embedded in the same physical relief. Since the second appearance appears only on demand, it could be used to hide a second image, a company logo, or a watermark image, for instance. Our novel method calculates a relief surface that maintains the properties needed for producing a second (hidden) appearance while also ensuring the first appearance is visible under normal direct illumination. Our experiments show that our method robustly produces reliefs with two arbitrary desired appearances.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexa, M., Matusik, W.: Reliefs as Images. ACM Trans. on Graphics 29(4) (2010)

    Google Scholar 

  2. Wang, K., Lavoué, G., Denis, F., Baskurt, A.: Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 50–64. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Aliaga, D., Atallah, M.: Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. Computer Graphics Forum (Eurographics) 28(2), 437–446 (2009)

    Article  Google Scholar 

  4. Volpe, H.R.: Printing method and copy-evident secure document. US Patent 5487567 (January 1996)

    Google Scholar 

  5. Weyrich, T., Peers, P., Matusik, W., Rusinkiewicz, S.: Fabricating Microgeometry for Custom Surface Reflectance. ACM Transactions on Graphics 28(3) (2009)

    Google Scholar 

  6. Weyrich, T., Deng, J., Barnes, C., Rusinkiewicz, S., Finkelstein, A.: Digital Bas-Relief from 3D Scenes. ACM Trans. on Graphics 26(3) (2007)

    Google Scholar 

  7. Chen, H., Belhumeur, P., Jacobs, D.: In search of illumination invariants. In: IEEE CVPR, pp. 254–261 (2000)

    Google Scholar 

  8. Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of Copy-Rotate-Move Forgery Using Zernike Moments. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51–65. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Schwamberger, V., Le, P.H.D., Schölkopf, B., Franz, M.O.: The Influence of the Image Basis on Modeling and Steganalysis Performance. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 133–144. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Arnold, M., Chen, X.-M., Baum, P.G., Doërr, G.: Improving Tonality Measures for Audio Watermarking. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 223–237. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Kim, K., Barni, M., Tan, H.Z.: Roughness-Adaptive 3D Watermarking of Polygonal Meshes. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 191–205. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Cao, Y., Zhao, X., Feng, D., Sheng, R.: Video Steganography with Perturbed Motion Estimation. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 193–207. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. Kerckhoffs, A.: La Cryptographie Militaire (Military Cryptography). le Journal Des Sciences Militaires (Journal of Military Science) IX, 5–38 (1883)

    Google Scholar 

  14. Oliva, A., Torralba, A., Schyns, P.: Hybrid Images. ACM Trans. on Graphics 25(3) (2006)

    Google Scholar 

  15. Horn, B., Szeliski, R., Yuille, A.: Impossible shaded images. IEEE Transactions on PAMI 15(2), 166–170 (1993)

    Article  Google Scholar 

  16. Bimber O., Iwai D., Wetzstein G., Grundhofer A.: The Visual Computing of Projector-Camera Systems. In Eurographics. STAR, pp. 23–46 (2007); also CGF 27(8), 2219–2245 (2008)

    Google Scholar 

  17. Grossberg, M., Peri, H., Nayar, S., Belhumeur, P.: Making One Object Look Like Another: Controlling Appearance using a Projector-Camera System. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 452–459 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chao, YL., Aliaga, D.G. (2013). Hiding a Second Appearance in a Physical Relief Surface. In: Kirchner, M., Ghosal, D. (eds) Information Hiding. IH 2012. Lecture Notes in Computer Science, vol 7692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36373-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36373-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36372-6

  • Online ISBN: 978-3-642-36373-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics