iccv iccv2013 iccv2013-413 iccv2013-413-reference knowledge-graph by maker-knowledge-mining
Source: pdf
Author: Pei-Hen Tsai, Yung-Yu Chuang
Abstract: This paper investigates an approach for generating two grating images so that the moir e´ pattern of their superposition resembles the target image. Our method is grounded on the fundamental moir e´ theorem. By focusing on the visually most dominant (1, −1)-moir e´ component, we obtain the phase smto ddoumlaintiaonnt c (o1n,s−tr1a)in-mt on the phase shifts bee otwbteaeinn the two grating images. For improving visual appearance of the grating images and hiding capability the embedded image, a smoothness term is added to spread information between the two grating images and an appearance phase function is used to add irregular structures into grating images. The grating images can be printed on transparencies and the hidden image decoding can be performed optically by overlaying them together. The proposed method enables the creation of moir e´ art and allows visual decoding without computers.
[1] I. Amidror. The Theory of the Moir `e Phenomenon, volume I: Periodic Layers. Springer, second edition, 2009. 1, 2, 3
[2] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson. Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2): 134–161, 2001. 2
[3] R. D. Hersch and S. Chosson. Band moir e` images. ACM Transactions on Graphics (Proceedings of ACM SIGGRAPH 2004), 23(3):239–247, 2004. 2
[4] S. Huang and J. K. Wu. Optical watermarking for printed document authentication. IEEE Transactions on Information
[5]
[6]
[7]
[8]
[9]
[10]
[11] Forensics and Security, 2(2): 164–173, 2007. 2 R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82A(10):2172–2177, 1999. 2 G. Lebanon and A. M. Bruckstein. Variational approach to moir e` pattern synthesis. Journal of the Optical Society of America, 18(6): 1371–1382, 2001. 2 M. Naor and A. Shamir. Visual cryptography. In Proceedings of EUROCRYPT 1994, pages 1–12, 1995. 2 K. Perlin. Improving noise. ACM Transactions on Graphics (Proceedings of ACM SIGGRAPH 2002), 21(3):681–682, 2002. 7 M. Ragulskis and A. Aleksa. Image hiding based on timeaveraging moir e`. Optics Communications, 282(14):2752– 2759, 2009. 2 E. Sakyte, R. Palivonaite, A. Aleksa, and M. Ragulskis. Image hiding based on near-optimal moir e` gratings. Optics Communications, 284(1617):3954–3964, 2011. 2 J. Weir and W. Yan. A comprehensive study of visual cryptography. In Y. Shi, editor, Transactions on Data Hiding and Multimedia Security V, pages 70–105. Springer-Verlag, 2010. 2 11991199