[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-642-36373-3_7guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Hiding a second appearance in a physical relief surface

Published: 15 May 2012 Publication History

Abstract

We present a novel information hiding process that couples geometrical modeling with automated 3D fabrication for creating hidden-appearance reliefs. Our relief surface produces a first grayscale appearance visible by simple direct illumination and a second grayscale appearance ensured to be visible when the relief is lit by a digital projector with a specifically designed pattern and from a particular direction. The two appearances/images can be different yet embedded in the same physical relief. Since the second appearance appears only on demand, it could be used to hide a second image, a company logo, or a watermark image, for instance. Our novel method calculates a relief surface that maintains the properties needed for producing a second (hidden) appearance while also ensuring the first appearance is visible under normal direct illumination. Our experiments show that our method robustly produces reliefs with two arbitrary desired appearances.

References

[1]
Alexa, M., Matusik, W.: Reliefs as Images. ACM Trans. on Graphics 29(4) (2010)
[2]
Wang, K., Lavoué, G., Denis, F., Baskurt, A.: Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 50-64. Springer, Heidelberg (2008)
[3]
Aliaga, D., Atallah, M.: Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. Computer Graphics Forum (Eurographics) 28(2), 437-446 (2009)
[4]
Volpe, H. R.: Printing method and copy-evident secure document. US Patent 5487567 (January 1996)
[5]
Weyrich, T., Peers, P., Matusik, W., Rusinkiewicz, S.: Fabricating Microgeometry for Custom Surface Reflectance. ACM Transactions on Graphics 28(3) (2009)
[6]
Weyrich, T., Deng, J., Barnes, C., Rusinkiewicz, S., Finkelstein, A.: Digital Bas-Relief from 3D Scenes. ACM Trans. on Graphics 26(3) (2007)
[7]
Chen, H., Belhumeur, P., Jacobs, D.: In search of illumination invariants. In: IEEE CVPR, pp. 254-261 (2000)
[8]
Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of Copy-Rotate-Move Forgery Using Zernike Moments. In: Böhme, R., Fong, P. W. L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51-65. Springer, Heidelberg (2010)
[9]
Schwamberger, V., Le, P. H. D., Schölkopf, B., Franz, M. O.: The Influence of the Image Basis on Modeling and Steganalysis Performance. In: Böhme, R., Fong, P. W. L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 133-144. Springer, Heidelberg (2010)
[10]
Arnold, M., Chen, X.-M., Baum, P. G., Doërr, G.: Improving Tonality Measures for Audio Watermarking. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 223-237. Springer, Heidelberg (2011)
[11]
Kim, K., Barni, M., Tan, H. Z.: Roughness-Adaptive 3D Watermarking of Polygonal Meshes. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 191- 205. Springer, Heidelberg (2009)
[12]
Cao, Y., Zhao, X., Feng, D., Sheng, R.: Video Steganography with Perturbed Motion Estimation. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 193-207. Springer, Heidelberg (2011)
[13]
Kerckhoffs, A.: La Cryptographie Militaire (Military Cryptography). le Journal Des Sciences Militaires (Journal of Military Science) IX, 5-38 (1883)
[14]
Oliva, A., Torralba, A., Schyns, P.: Hybrid Images. ACM Trans. on Graphics 25(3) (2006)
[15]
Horn, B., Szeliski, R., Yuille, A.: Impossible shaded images. IEEE Transactions on PAMI 15(2), 166-170 (1993)
[16]
Bimber O., Iwai D., Wetzstein G., Grundhofer A.: The Visual Computing of Projector-Camera Systems. In Eurographics. STAR, pp. 23-46 (2007); also CGF 27(8), 2219-2245 (2008)
[17]
Grossberg, M., Peri, H., Nayar, S., Belhumeur, P.: Making One Object Look Like Another: Controlling Appearance using a Projector-Camera System. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 452-459 (2004)

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
IH'12: Proceedings of the 14th international conference on Information Hiding
May 2012
283 pages
ISBN:9783642363726
  • Editors:
  • Matthias Kirchner,
  • Dipak Ghosal

Sponsors

  • technicolor

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 15 May 2012

Author Tags

  1. 3D manufacturing
  2. images
  3. information hiding
  4. reliefs
  5. surfaces
  6. watermarks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media