Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

We propose a new protection scheme for displaying a static binary image on a screen. The protection is achieved by a visual cryptography algorithm that divides the target images into several divisions. The visual difference between the text and the background is induced by exploiting the temporal responsibilities of the human eye. With the results of our user study, we demonstrate that encrypted visual information was mentally recovered by the human visual system. Moreover, the images captured from our scheme do not provide any meaningful information to the human eye, so that our method provides a strong security measure against screenshot piracy.

[1]  Mark Stamp,et al.  Digital Rights Management: The Technology Behidn The Hype , 2003 .

[2]  David M. Nicol,et al.  TrustGraph: Trusted Graphics Subsystem for High Assurance Systems , 2009, 2009 Annual Computer Security Applications Conference.

[3]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[4]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  J Reimer Wolter,et al.  Adler's Physiology of the Eye , 1971 .

[7]  Ton Kalker,et al.  Chapter 12 – Steganography , 2008 .

[8]  Mark Stamp,et al.  Digital Rights Management: The Technology Behind the Hype , 2003, J. Electron. Commer. Res..

[9]  Francis Heed Adler,et al.  Adler's Physiology of the eye;: Clinical application , 1976 .

[10]  Hirotsugu Yamamoto,et al.  Secure information display with limited viewing zone by use of multi-color visual cryptography. , 2004, Optics express.

[11]  H Kolb,et al.  Temporal Resolution -- Webvision: The Organization of the Retina and Visual System , 1995 .

[12]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[13]  A. D. Santis Advances in cryptology, EUROCRYPT '94 : Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings , 1995 .

[14]  Eduardo Fernández,et al.  Webvision: The Organization of the Retina and Visual System , 1995 .

[15]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[16]  Heung-Kyu Lee,et al.  Screenshot identification by analysis of directional inequality of interlaced video , 2012, EURASIP J. Image Video Process..

[17]  H DE LANGE DZN,et al.  Research into the dynamic nature of the human fovea-cortex systems with intermittent and modulated light. I. Attenuation characteristics with white and colored light. , 1958, Journal of the Optical Society of America.

[18]  Xiangyu Wang,et al.  Protecting against screenshots: An image processing approach , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[19]  Sue Gregory,et al.  Snapchat 'selfies': The case of disappearing data , 2014 .

[20]  Craig Metz,et al.  A One-Time Password System , 1996, RFC.