Skip to main content
Log in

Hiding information using a checkered pattern

  • Regular Papers
  • Published:
Optical Review Aims and scope Submit manuscript

Abstract

Visual cryptography is expected to have various applications since it has potential for visual decoding. However, there are still few practical applications. One reason for this is the difficulty of superposition to decode. To solve the alignment difficulty, we propose an information hiding method which can be physically decode by superimposing a checkered pattern. Superimposing a checkered pattern can also be considered as a kind of image sampling process, and a decoding experiment using an ordinary compact digital camera is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. P. Refregier and B. Javidi: Opt. Lett. 20 (1995) 767.

    Article  ADS  Google Scholar 

  2. P. C. Mogensen and J. Glückstad: Appl. Opt. 40 (2001) 1226.

    Article  ADS  Google Scholar 

  3. J. Rosen and B. Javidi: Appl. Opt. 40 (2001) 3346.

    Article  ADS  Google Scholar 

  4. J. Ohtsubo and A. Fujimoto: Appl. Opt. 41 (2002) 4848.

    Article  ADS  Google Scholar 

  5. H. Yamamoto, Y. Hayasaki, and N. Nishida: Opt. Express 12 (2004) 1258.

    Article  ADS  Google Scholar 

  6. R. L. van Renesse: Optical Document Security (Artech House, Norwood, MA, 2005) 3rd ed., p. 129.

    Google Scholar 

  7. M. Naor and A. Shamir: Advances in Cryptography—EUROCRYPT’94 (Springer, Heidelberg, 1995) p. 1.

    Google Scholar 

  8. M. Iwamoto and H. Yamamoto: IEICE Trans. Fundam. E85-A (2002) 2238.

    Google Scholar 

  9. M. Nakajima and Y. Yamaguchi: Proc. WSCG02, 2002, p. 303.

  10. E. Myodo, S. Sakazawa, and Y. Takishima: Proc. ICIP2006, 2006, p. 97.

  11. C. Chang, C. Chan, and W. Tai: Pattern Recognition Image Anal. 16 (2006) 486.

    Article  Google Scholar 

  12. H. Koga and H. Yamamoto: IEICE Trans. Fundam. E81-A (1998) 1262.

    Google Scholar 

  13. C.-N. Yang and T.-S. Chen: Pattern Recognition 41 (2008) 3114.

    Article  MATH  Google Scholar 

  14. C.-C. Wang, S.-C. Tai, and C.-S. Yu: IEICE Trans. Fundam. E83-A (2000) 1589.

    Google Scholar 

  15. R. Hwang: Tambang J. Sci. Eng. 3 (2000) 97.

    Google Scholar 

  16. M. A. Hassan and M. A. Khalili: Proc. 8th WASET, 2005, p. 159.

  17. R. I. Zaghloul and E. F. Al-Rawashdeh: Proc. 44th WASET, 2008, p. 482.

  18. S.-C. Pei and J.-M. Guo: IEEE Signal Process. Lett. 10 (2003) 349.

    Article  ADS  Google Scholar 

  19. F. Liu, C. K. Wu, and X. J. Lin: Des. Codes Cryptography 50 (2009) 215.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Shogenji.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shogenji, R., Ohtsubo, J. Hiding information using a checkered pattern. OPT REV 16, 517–520 (2009). https://doi.org/10.1007/s10043-009-0101-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10043-009-0101-9

Keywords

Navigation