[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2909827.2930805acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Published: 20 June 2016 Publication History

Abstract

We propose a new protection scheme for displaying a static binary image on a screen. The protection is achieved by a visual cryptography algorithm that divides the target images into several divisions. The visual difference between the text and the background is induced by exploiting the temporal responsibilities of the human eye. With the results of our user study, we demonstrate that encrypted visual information was mentally recovered by the human visual system. Moreover, the images captured from our scheme do not provide any meaningful information to the human eye, so that our method provides a strong security measure against screenshot piracy.

References

[1]
J. Charteris, S. Gregory, and Y. Masters. Snapchat 'selfies': The case of disappearing data'. Rhetoric and Reality: Critical perspectives on educational technology, pages 389--393, 2014.
[2]
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2 edition, 2008.
[3]
H. De Lange Dzn. Research into the dynamic nature of the human fovea-cortex systems with intermittent and modulated light. i. attenuation characteristics with white and colored light. The Journal of the Optical Society of America, 48(11):777--783, 1958.
[4]
N. Haller, C. Metz, P. Nesser, and M. Straw. A one-time password system. Technical report, 1998.
[5]
W. J. Hart. The temporal responsiveness of vision. Adler's physiology of the eye, Clinical application, 1987.
[6]
R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences, 82(10):2172--2177, 1999.
[7]
M. Kalloniatis and C. Luu. Temporal resolution. Webvision: The Organization of the Retina and Visual System, 2005.
[8]
H. Kolb, E. Fernandez, and R. Nelson. Webvision: The organization of the retina and visual system. 1995.
[9]
J.-W. Lee, M.-J. Lee, H.-Y. Lee, and H.-K. Lee. Screenshot identification by analysis of directional inequality of interlaced video. EURASIP Journal on Image and Video Processing, 2012(1):1--15, 2012.
[10]
M. Naor and A. Shamir. Advances in Cryptology -- EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9-12, 1994 Proceedings, chapter Visual cryptography, pages 1--12. Springer Berlin Heidelberg, Berlin, Heidelberg, 1995.
[11]
H. Okhravi and D. M. Nicol. Trustgraph: Trusted graphics subsystem for high assurance systems. In Computer Security Applications Conference, 2009. ACSAC'09. Annual, pages 254--265. IEEE, 2009.
[12]
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612--613, 1979.
[13]
M. Stamp. Digital rights management: The technology behind the hype. J. Electron. Commerce Res., 4(3):102--112, 2003.
[14]
C.-C. Thien and J.-C. Lin. Secret image sharing. Computers & Graphics, 26(5):765--770, 2002.
[15]
G. J. Tomko and A. Stoianov. Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques, Jan. 27 1998. US Patent 5,712,912.
[16]
L. Von Ahn, M. Blum, N. J. Hopper, and J. Langford. Captcha: Using hard ai problems for security. In Advances in Cryptology-EUROCRYPT 2003, pages 294--311. Springer, 2003.
[17]
H. Yamamoto, Y. Hayasaki, and N. Nishida. Secure information display with limited viewing zone by use of multi-color visual cryptography. Optics express, 12(7):1258--1270, 2004.
[18]
A. Yong-Sang Chia, U. Bandara, X. Wang, and H. Hirano. Protecting against screenshots: An image processing approach. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1437--1445, 2015.

Cited By

View all
  • (2019)Image Recapture Prevention Using Secure Display Schemes on Polarized 3D SystemIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2018.286602129:8(2296-2309)Online publication date: Aug-2019

Index Terms

  1. Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
      June 2016
      200 pages
      ISBN:9781450342902
      DOI:10.1145/2909827
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 June 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. copyright protection
      2. display algorithms
      3. screenshot
      4. visual cryptography

      Qualifiers

      • Short-paper

      Funding Sources

      • Ministry of Culture Sports and Tourism(MCST) and from Korea Copyright Commission

      Conference

      IH&MMSec '16
      Sponsor:

      Acceptance Rates

      IH&MMSec '16 Paper Acceptance Rate 21 of 61 submissions, 34%;
      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Image Recapture Prevention Using Secure Display Schemes on Polarized 3D SystemIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2018.286602129:8(2296-2309)Online publication date: Aug-2019

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media