ABSTRACT
We propose a new protection scheme for displaying a static binary image on a screen. The protection is achieved by a visual cryptography algorithm that divides the target images into several divisions. The visual difference between the text and the background is induced by exploiting the temporal responsibilities of the human eye. With the results of our user study, we demonstrate that encrypted visual information was mentally recovered by the human visual system. Moreover, the images captured from our scheme do not provide any meaningful information to the human eye, so that our method provides a strong security measure against screenshot piracy.
- J. Charteris, S. Gregory, and Y. Masters. Snapchat 'selfies': The case of disappearing data'. Rhetoric and Reality: Critical perspectives on educational technology, pages 389--393, 2014.Google Scholar
- I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2 edition, 2008. Google ScholarDigital Library
- H. De Lange Dzn. Research into the dynamic nature of the human fovea-cortex systems with intermittent and modulated light. i. attenuation characteristics with white and colored light. The Journal of the Optical Society of America, 48(11):777--783, 1958.Google ScholarCross Ref
- N. Haller, C. Metz, P. Nesser, and M. Straw. A one-time password system. Technical report, 1998. Google ScholarDigital Library
- W. J. Hart. The temporal responsiveness of vision. Adler's physiology of the eye, Clinical application, 1987.Google Scholar
- R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences, 82(10):2172--2177, 1999.Google Scholar
- M. Kalloniatis and C. Luu. Temporal resolution. Webvision: The Organization of the Retina and Visual System, 2005.Google Scholar
- H. Kolb, E. Fernandez, and R. Nelson. Webvision: The organization of the retina and visual system. 1995.Google Scholar
- J.-W. Lee, M.-J. Lee, H.-Y. Lee, and H.-K. Lee. Screenshot identification by analysis of directional inequality of interlaced video. EURASIP Journal on Image and Video Processing, 2012(1):1--15, 2012.Google ScholarCross Ref
- M. Naor and A. Shamir. Advances in Cryptology -- EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9-12, 1994 Proceedings, chapter Visual cryptography, pages 1--12. Springer Berlin Heidelberg, Berlin, Heidelberg, 1995.Google Scholar
- H. Okhravi and D. M. Nicol. Trustgraph: Trusted graphics subsystem for high assurance systems. In Computer Security Applications Conference, 2009. ACSAC'09. Annual, pages 254--265. IEEE, 2009. Google ScholarDigital Library
- A. Shamir. How to share a secret. Communications of the ACM, 22(11):612--613, 1979. Google ScholarDigital Library
- M. Stamp. Digital rights management: The technology behind the hype. J. Electron. Commerce Res., 4(3):102--112, 2003.Google Scholar
- C.-C. Thien and J.-C. Lin. Secret image sharing. Computers & Graphics, 26(5):765--770, 2002.Google ScholarCross Ref
- G. J. Tomko and A. Stoianov. Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques, Jan. 27 1998. US Patent 5,712,912.Google Scholar
- L. Von Ahn, M. Blum, N. J. Hopper, and J. Langford. Captcha: Using hard ai problems for security. In Advances in Cryptology-EUROCRYPT 2003, pages 294--311. Springer, 2003. Google ScholarCross Ref
- H. Yamamoto, Y. Hayasaki, and N. Nishida. Secure information display with limited viewing zone by use of multi-color visual cryptography. Optics express, 12(7):1258--1270, 2004.Google ScholarCross Ref
- A. Yong-Sang Chia, U. Bandara, X. Wang, and H. Hirano. Protecting against screenshots: An image processing approach. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1437--1445, 2015.Google Scholar
Index Terms
- Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye
Recommendations
Improving the visual quality of size invariant visual cryptography scheme
In order to reduce the pixel expansion of visual cryptography scheme (VCS), many size invariant visual cryptography schemes (SIVCS's) were proposed. However, most of the known SIVCS's have bad visual quality and thin line problems, hence the known SIVCS'...
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme
Information and Communications SecurityAbstractTwo of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares. This paper addresses both of these visual cryptography issues. First, a ...
Multi-pixel encryption visual cryptography
Inscrypt'11: Proceedings of the 7th international conference on Information Security and CryptologyA visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. In their pioneer work, Naor and Shamir mentioned that encrypting a block of ...
Comments