DOI QR코드

DOI QR Code

Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique

  • Park, Sanghyun (Department of Computer Science, Sangmyung University) ;
  • Kang, Sang-ug (Department of Computer Science, Sangmyung University)
  • 투고 : 2016.12.14
  • 심사 : 2017.04.18
  • 발행 : 2017.07.31

초록

Abrupt scene changes generally incur the afterimage effect. So, the unblocked image portion is still viewed by human eyes just after it is blocked by some pattern. Yovo's secure display method utilized this phenomenon and it is systematically analyzed using computational afterimage modeling by replacing the complex afterimage effect via simple low-pass filtering. With this approach, realistic images perceived by the human eye can be computationally generated at every single moment, especially reflecting the afterimage effect. The generated images are compared with the original images to determine the factors that affect the image quality of the secure display method. The simulation results demonstrate that the ratio of the unblocked portion to the blocked portion of an image and the playback rate are two primary factors related to the recognized image quality. We also found that the two factors are still effective for generalized secure display techniques.

키워드

과제정보

연구 과제 주관 기관 : National Research Foundation of Korea

참고문헌

  1. J. Lee, "Implementation of anti-screen capture modules for privacy protection," Journal of the Korea Institute of Information and Communication Engineering, vol. 18, no. 1, pp. 91-96, 2014. https://doi.org/10.6109/jkiice.2014.18.1.91
  2. M. Stamp, "Digital Rights Management: The Technology Behind the Hype," J. Electron. Commer. Res., vol. 4, no. 3, pp. 102-112, 2003.
  3. J. Charteris, S. Gregory, and Y. Masters, "Snapchat 'selfies': The case of disappearing data," eds.) Hegarty, B., McDonald, j., & Loke, S. K., Rhetoric and Reality: Crit. Perspect. Educ. Tehnol., pp. 389-393, 2014.
  4. W. Kim, S. Lee, and Y. Seo, "Image fingerprinting scheme for print-and-capture model," Pacific-Rim Conference on Multimedia. Springer Berlin Heidelberg, pp. 106-113, 2006.
  5. H. Yamamoto, Y. Hayasaki, and N. Nishida, "Secure information display with limited viewing zone by use of multi-color visual cryptography," Opt. Express, vol. 12, no. 7, pp. 1258-1270, 2004. https://doi.org/10.1364/OPEX.12.001258
  6. J. Hou, D. Kim, H. Song, and H. Lee, "Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye," in Proc. of the 4th ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 169-174, 2016.
  7. Yovo [Internet] Available at:http://yovo.me. [Accessed 14 Aug 2016].
  8. H. Kolb, E. Fernandez, and R. Nelson, "Webvision: the organization of the retina and visual system," Salt Lake City (UT): University of Utah Health Sciences Center, 1995.
  9. T. Ritschel, and E. Elmar, "A computational model of afterimages," in Proc. of Computer Graphics Forum. Blackwell Publishing Ltd, vol. 31. no. 2pt3, pp. 529-534, 2012.
  10. H. Brettel, L. Shi, and H. Strasburger, "Temporal image fusion in human vision," Vision Res., vol. 46, no. 6, pp. 774-781, 2006. https://doi.org/10.1016/j.visres.2005.07.005

피인용 문헌

  1. Subjective Imaging Effect Assessment for Intelligent Imaging Terminal Design: a Method for Engineering Site vol.14, pp.3, 2017, https://doi.org/10.3837/tiis.2020.03.008