2001
DOI: 10.1364/ao.40.003346
|View full text |Cite
|
Sign up to set email alerts
|

Hidden images in halftone pictures

Abstract: A method of concealing an image in a different halftone image is proposed. Continuous-tone levels of the visible images are represented by the area of the halftone dots. However, the hidden image is encoded by the dots' positions inside their cells. Only a spatial correlator with a unique filter function can reveal the hidden image from the halftone picture. The technique and its robustness to noise and distortions are demonstrated.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2005
2005
2007
2007

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 63 publications
(28 citation statements)
references
References 9 publications
0
26
0
Order By: Relevance
“…However, this process does not play an important role in the security of the system. In a more recent paper, in which this algorithm is used for image hiding [11], it is simply represented using a random phase distribution.…”
Section: B LI Et Al Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this process does not play an important role in the security of the system. In a more recent paper, in which this algorithm is used for image hiding [11], it is simply represented using a random phase distribution.…”
Section: B LI Et Al Methodsmentioning
confidence: 99%
“…Various algorithms have been proposed for data encryption [1][2][3][4][5][6][7][8][9][10], information hiding [11][12][13][14], watermarking [15,16], and verification [17][18][19][20][21][22][23]. These algorithms can be implemented optically by taking advantage of both the natural two-dimensional imaging capabilities of optics and the parallelism achievable with optical processing.…”
Section: Introductionmentioning
confidence: 99%
“…This section is devoted to a new development in our general concept [3]. Not only the output but also the input signal contains a meaningful image.…”
Section: Concealogram: An Image Within An Imagementioning
confidence: 99%
“…The next generation of these security systems should offer a higher level of security and more sophisticated services than the simple verification offered by the existing systems. In this chapter, we survey three optical security systems [1][2][3] that are based on existing spatial correlators but have some additional benefits over those of the first generation. The common feature of all three systems is meaningful images on the output plane of the correlators.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking is an attractive information security technique, [1][2][3] which can hide authorized mark information in a cover image to achieve perceptual invisibility. The hidden watermark can be retrieved or detected for verification and authentication.…”
Section: Introductionmentioning
confidence: 99%