Image hiding based on time-averaged fringes produced by non-harmonic oscillations

Image hiding based on time-averaged fringes produced by non-harmonic oscillations is presented in this paper. The secret image is embedded into the background moire grating. Phase matching and initial stochastic phase deflection algorithms are used to encrypt the image. The decoding of the image is completely visual. The secret embedded image appears when the encrypted image is oscillated according to a predefined law of motion. No secret is leaked when the encrypted image is oscillated harmonically. Numerical experiments are used to illustrate the functionality of the method.

[1]  Z. Navickas,et al.  Representation of Time Averaged Vibrating Images in the Operator Format , 2007 .

[2]  Sanjay Kumar Jena,et al.  A Novel Visual Cryptography Scheme , 2009, 2009 International Conference on Advanced Computer Control.

[3]  Alfred M. Bruckstein,et al.  On Designing Moiré Patterns , 2002 .

[4]  Ja-Chen Lin,et al.  VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches , 2007, Pattern Recognit..

[5]  Minvydas Ragulskis,et al.  Applicability of time-average moiré techniques for chaotic oscillations. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Alfred M. Bruckstein,et al.  A Variational Approach to Moir E Pattern Synthesis , 2011 .

[7]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Ching-Nung Yang,et al.  Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality , 2007, Int. J. Pattern Recognit. Artif. Intell..

[10]  Stelvio Cimato,et al.  Colored visual cryptography without color darkening , 2004, Theor. Comput. Sci..

[11]  Jen-Bang Feng,et al.  Visual secret sharing for multiple secrets , 2008, Pattern Recognit..

[12]  Robert Goutte,et al.  Digital deconvolution of degraded images by a space-invariant motion blur , 1980 .

[13]  Alfred M. Bruckstein,et al.  Designing Moiré Patterns , 2001, EMMCVPR.

[14]  Ching-Nung Yang,et al.  Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast , 2007 .

[15]  Zenonas Navickas,et al.  Hash function construction based on time average moiré , 2007 .

[16]  P. Ifju,et al.  High Sensitivity Moiré: Experimental Analysis for Mechanics and Materials , 1995 .

[17]  Ramón Rodríguez-Vera,et al.  Image encryption based on moiré pattern performed by computational algorithms , 2004 .

[18]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[19]  Fulong Dai,et al.  Geometric micron-moiré , 1999 .

[20]  David Pearce MacAdam,et al.  Digital Image Restoration by Constrained Deconvolution , 1970 .

[21]  L. Milne‐Thomson A Treatise on the Theory of Bessel Functions , 1945, Nature.

[22]  Shang Kuan Chen Friendly progressive visual secret sharing using generalized random grids , 2009 .

[23]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[24]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[25]  Minvydas Ragulskis,et al.  The structure of moiré grating lines and its influence to time-averaged fringes , 2009 .

[26]  Krzysztof Patorski,et al.  Handbook of the moiré fringe technique , 1993 .

[27]  Tse-Shih Chen,et al.  Special type of circular visual cryptography for multiple secret hiding , 2007 .

[28]  Albert S. Kobayashi,et al.  Handbook on experimental mechanics , 1987 .

[29]  Tse-Shih Chen,et al.  Using multi-ringed shadow image of visual cryptography to hide more secret messages , 2009 .

[30]  Minvydas Ragulskis,et al.  Improved algorithm for image encryption based on stochastic geometric moiré and its application , 2007 .

[31]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[32]  Yvo Desmedt,et al.  Moiré cryptography , 2000, CCS.

[33]  G. A. Watson A treatise on the theory of Bessel functions , 1944 .

[34]  Minvydas Ragulskis,et al.  Image hiding based on time-averaging moiré , 2009 .

[35]  Shyong Jian Shyu,et al.  Efficient visual secret sharing scheme for color images , 2006, Pattern Recognit..