Abstract
Visual cryptography is expected to have various applications since it has potential for visual decoding. However, there are still few practical applications. One reason for this is the difficulty of superposition to decode. To solve the alignment difficulty, we propose an information hiding method which can be physically decode by superimposing a checkered pattern. Superimposing a checkered pattern can also be considered as a kind of image sampling process, and a decoding experiment using an ordinary compact digital camera is presented.
Similar content being viewed by others
References
P. Refregier and B. Javidi: Opt. Lett. 20 (1995) 767.
P. C. Mogensen and J. Glückstad: Appl. Opt. 40 (2001) 1226.
J. Rosen and B. Javidi: Appl. Opt. 40 (2001) 3346.
J. Ohtsubo and A. Fujimoto: Appl. Opt. 41 (2002) 4848.
H. Yamamoto, Y. Hayasaki, and N. Nishida: Opt. Express 12 (2004) 1258.
R. L. van Renesse: Optical Document Security (Artech House, Norwood, MA, 2005) 3rd ed., p. 129.
M. Naor and A. Shamir: Advances in Cryptography—EUROCRYPT’94 (Springer, Heidelberg, 1995) p. 1.
M. Iwamoto and H. Yamamoto: IEICE Trans. Fundam. E85-A (2002) 2238.
M. Nakajima and Y. Yamaguchi: Proc. WSCG02, 2002, p. 303.
E. Myodo, S. Sakazawa, and Y. Takishima: Proc. ICIP2006, 2006, p. 97.
C. Chang, C. Chan, and W. Tai: Pattern Recognition Image Anal. 16 (2006) 486.
H. Koga and H. Yamamoto: IEICE Trans. Fundam. E81-A (1998) 1262.
C.-N. Yang and T.-S. Chen: Pattern Recognition 41 (2008) 3114.
C.-C. Wang, S.-C. Tai, and C.-S. Yu: IEICE Trans. Fundam. E83-A (2000) 1589.
R. Hwang: Tambang J. Sci. Eng. 3 (2000) 97.
M. A. Hassan and M. A. Khalili: Proc. 8th WASET, 2005, p. 159.
R. I. Zaghloul and E. F. Al-Rawashdeh: Proc. 44th WASET, 2008, p. 482.
S.-C. Pei and J.-M. Guo: IEEE Signal Process. Lett. 10 (2003) 349.
F. Liu, C. K. Wu, and X. J. Lin: Des. Codes Cryptography 50 (2009) 215.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shogenji, R., Ohtsubo, J. Hiding information using a checkered pattern. OPT REV 16, 517–520 (2009). https://doi.org/10.1007/s10043-009-0101-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10043-009-0101-9