Dynamic visual cryptography scheme on the surface of a vibrating structure

被引:0
|
作者
Vaidelys, Martynas [1 ]
Aleksiene, Sandra [1 ]
Ragulskiene, Jurate [1 ]
机构
[1] Kaunas Univ Technol, Res Grp Math & Numer Anal Dynam Syst, LT-51368 Kaunas, Lithuania
关键词
Dynamic visual cryptography; time-averaged moire; Ronchi grating; cover image;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Dynamic visual cryptography scheme based on time-averaged fringes generated by Ronchi-type geometric moire gratings on finite element grids is proposed in this paper. A single cover image is used to encode the secret image and is formed on the surface of a deformable structure. Time-averaged moire fringes leak the secret when the structure is oscillated according to a predefined Eigen-shape. The envelope functions determining the motion induced blur of the Ronchi-type moire grating depend on the characteristic features of the motion. And though harmonic oscillations do not result into a completely uniform time-averaged image of the Ronchi-moire grating, initial phase scrambling and phase normalization algorithms are used to encode the secret in the cover image. Theoretical relationships between the amplitude of the Eigen-shape, the order of the not completely developed time-averaged fringe and the pitch of the deformable one-dimensional Ronchi-type moire grating are derived.
引用
收藏
页码:4142 / 4152
页数:11
相关论文
共 50 条
  • [1] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [2] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    [J]. AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675
  • [3] On the randomness of visual cryptography scheme
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    Ren, YaWei
    Wang, Wen
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394
  • [4] Nested visual cryptography scheme
    Yuan Zhonglan
    Xia Guangsheng
    Du Ye
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03) : 459 - 463
  • [5] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [6] Color visual cryptography scheme
    Yi, Feng
    Wang, Daoshun
    Dai, Yiqi
    [J]. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2006, 18 (11): : 1770 - 1775
  • [7] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [8] Visual Cryptography Scheme with Autostereogram
    Wang, Dao-Shun
    Yi, Feng
    Yang, Ching-Nung
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 364 - 375
  • [9] A Probabilistic Model of (t, n) Visual Cryptography Scheme With Dynamic Group
    Lin, Sian-Jheng
    Chung, Wei-Ho
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 197 - 207
  • [10] Image communication scheme based on dynamic visual cryptography and computer generated holography
    Palevicius, Paulius
    Ragulskis, Minvydas
    [J]. OPTICS COMMUNICATIONS, 2015, 335 : 161 - 167