Abstract
Visual cryptography scheme (VCS) is an image secret sharing method which exploits the spatial responds characteristics of Human visual system (HVS). Applications of traditional OR and XOR based VCSs are seriously limited by the implementation carrier in practice. In this paper, we proposed a new kind of VCS which is implemented on modern display terminal of high refresh rates. Our approach exploits the temporal responds characteristics of HVS that light signals are temporal integrated into a single steady continuous one if the frequency exceeds critical fusion frequency (CFF). Furthermore, basing on the proposed VCS, we implement an information security display technology that can prevent unauthorized photography. Only authorized viewers can recover the secret information with the help of synchronized glass. While unauthorized viewers with naked eye or camera get nothing about the secret information. Experimental results show the effectiveness of proposed temporal integration based VCS and information security display technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
BenEzra, O., Herzog, R., Cohen, E., Karshai, I., BenEzra, D.: Liquid crystal glasses: feasibility and safety of a new modality for treating amblyopia. Arch. Ophthalmol. 125(4), 580–581 (2007)
Biham, E., Itzkovitz, A.: Visual cryptography with polarization (1998)
Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999)
Galifret, Y.: Visual persistence and cinema? Comptes Rendus Biologies 329(5), 369–385 (2006)
Gao, Z., Zhai, G., Min, X.: Information security display system based on temporal psychovisual modulation. In: 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 449–452. IEEE (2014)
Kalloniatis, M., Luu, C.: Temporal resolution. www.webvision.med.utah.edu/temporal.html
Lee, P.-M., Chen, H.-Y.: Adjustable gamma correction circuit for TFT LCD. In: 2005 IEEE International Symposium on Circuits and Systems, pp. 780–783. IEEE (2005)
Liu, F., Wu, C.: Optimal XOR based (2, n)-visual cryptography schemes. In: International Workshop on Digital Watermarking, pp. 333–349. Springer, Heidelberg (2014)
Liu, F., Wu, C., Qian, L., et al.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Representation 23(2), 331–342 (2012)
Liu, F., Yan, W.Q.: Visual Cryptography for Image Processing and Security, vol. 2. Springer, New York (2014)
Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419
Parraga, C.A., Roca-Vila, J., Karatzas, D., Wuerger, S.M.: Limitations of visual gamma corrections in LCD displays. Displays 35(5), 227–239 (2014)
Porter, T.: Contributions to the study of flicker, paper iii. Proc. R. Soc. London Ser. A Containing Papers Math. Phys. Charact. 86(590), 495–513 (1912)
Porter, T.C.: Contributions to the study of flicker. Paper ii. Proc. R. Soc. London 70(459–466), 313–329 (1902)
Shi, L., Yu, B.: Optimization of XOR visual cryptography scheme. In: 2011 International Conference on Computer Science and Network Technology (ICCSNT), vol. 1, pp. 297–301. IEEE (2011)
Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3), 960–969 (2011)
Shyu, S.J., Jiang, H.-W.: General constructions for threshold multiple-secret visual cryptographic schemes. IEEE Trans. Inf. Forensics Secur. 8(5), 733–743 (2013)
Spierer, A., Raz, J., BenEzra, O., Herzog, R., Cohen, E., Karshai, I., BenEzra, D.: Treating amblyopia with liquid crystal glasses: a pilot study. Invest. Ophthalmol. Vis. Sci. 51(7), 3395–3398 (2010)
Talbot, H.F.: Experiments on light. Lond. Edinb. Philos. Mag. J. Sci. 5(29), 321–334 (1834)
Tuyls, P., Hollmann, H., Lint, H., Tolhuizen, L.: A polarisation based visual crypto system and its secret sharing schemes (2002)
Tuyls, P., Hollmann, H.D., Lint, J.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Crypt. 37(1), 169–186 (2005)
Walton, H.G., Brownlow, M., Lock, J., Rahal, M., Zebedee, P.: LCD gamma correction by nonlinear digital-to-analogue converter. In: Electronic Imaging 2003, pp. 170–178. International Society for Optics and Photonics (2003)
Wang, W., Liu, F., Guo, T., Ren, Y., Shen, G.: Information security display technology with multi-view effect. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 198–208. Springer, Cham (2017). doi:10.1007/978-3-319-53465-7_15
Wang, W., Liu, F., Yan, W., Shen, G., Guo, T.: An improved aspect ratio invariant visual cryptography scheme with flexible pixel expansion. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 418–432. Springer, Cham (2016). doi:10.1007/978-3-319-31960-5_34
Woo, J.-H., Lee, J.-G., Jun, Y.-H., Kong, B.-S.: Accurate quadruple-gamma-curve correction for line inversion-based mobile tft-lcd driver ics. IEEE Transactions on Consumer Electronics 59(3), 443–451 (2013)
Xiao, K., Fu, C., Karatzas, D., Wuerger, S.: Visual gamma correction for LCD displays. Displays 32(1), 17–23 (2011)
Yang, C.-N., Wang, D.-S.: Property analysis of XOR-based visual cryptography. IEEE Trans. Circ. Syst. Video Technol. 24(2), 189–197 (2014)
Acknowledgments
Many thanks to the anonymous reviewers for their valuable comments to improve our work. This work was supported by the National Key R&D Program of China with No. 2016YFB0800100, NSFC No. 61671448 and the Scientific Research Project of Beijing Municipal Educational Committee Grant No. 71E1610972.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, W., Liu, F., Guo, T., Ren, Y. (2017). Temporal Integration Based Visual Cryptography Scheme and Its Application. In: Kraetzer, C., Shi, YQ., Dittmann, J., Kim, H. (eds) Digital Forensics and Watermarking. IWDW 2017. Lecture Notes in Computer Science(), vol 10431. Springer, Cham. https://doi.org/10.1007/978-3-319-64185-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-64185-0_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64184-3
Online ISBN: 978-3-319-64185-0
eBook Packages: Computer ScienceComputer Science (R0)