IMAGE ENCRYPTION METHOD USING LINE INTERLACING AND IMAGE DECRYPTION APPARATUS THEREFOR
20220321736 · 2022-10-06
Assignee
Inventors
Cpc classification
International classification
Abstract
An image encryption method. The method includes generating an adjusted secret image by adjusting an intensity range to be the same for each RGB channel of a secret image; generating a modulated image by repeating pixel modulation in block units on the adjusted secret image; and generating an interlaced image by interlacing odd-numbered lines of the adjusted secret image with even-numbered lines of the modulated image or interlacing even-numbered lines of the adjusted secret image with odd-numbered lines with the modulated image.
Claims
1. An image encryption method, comprising: generating an adjusted secret image by adjusting an intensity range to be the same for each RGB channel of a secret image; generating a modulated image by repeating pixel modulation in block units on the adjusted secret image; and generating an interlaced image by interlacing odd-numbered lines of the adjusted secret image with even-numbered lines of the modulated image or interlacing even-numbered lines of the adjusted secret image with odd-numbered lines with the modulated image.
2. The method of claim 1, wherein the generating of the adjusted secret image by adjusting the intensity range adjusts the range of a pixel value to have the same distance of intensity strength from the expectation value of a probabilistic variable representing the pixel value of the secret image.
3. The method of claim 2, wherein the generating of the modulated image comprises: calculating pixel values of a particular block located within a preconfigured range in the adjusted secret image; and performing pixel modulation for each block of the adjusted secret image based on the pixel values of the particular block.
4. The method of claim 3, wherein the performing of pixel modulation for each block of the adjusted secret image performs pixel modulation on each block so that the average value of pixel values of any block located within a preconfigured range falls within a target average range.
5. The method of claim 1, further comprising generating an adjusted public image by adjusting an intensity range to be the same for each RGB channel of the public image, wherein the generating the modulated image generates the modulated image by repeating pixel modulation in block units on the adjusted secret image and the adjusted public image.
6. The method of claim 5, wherein the public image is an image to which an image enhancement scheme has been applied to enhance edge components.
7. The method of claim 5, wherein the generating of the modulated image comprises generating a second modulated image with enhanced image quality by applying an inverse error diffusion scheme to a previously generated, first modulated image.
8. The method of claim 5, wherein, when the intensity range is adjusted, the range of a pixel value is adjusted by considering correlation between intensity strength of the secret image and intensity strength of the public image.
9. The method of claim 5, wherein the generating the modulated image comprises: calculating pixel values of a particular block located within a preconfigured range in the adjusted secret image and the adjusted public image; and performing pixel modulation for each block of the adjusted secret image and the adjusted public image based on the pixel values of the particular block.
10. The method of claim 9, wherein the performing of pixel modulation for each block of the adjusted secret image and the adjusted public image performs pixel modulation on each block so that the average value of pixel values of any block located within a preconfigured range falls within a target average range.
11. An image decryption apparatus, comprising: a decryption screen disposed between an encryption object including an interlaced image and a viewing position, wherein the interlaced image is generated by generating an adjusted secret image by adjusting an intensity range to be the same for each RGB channel of a secret image; generating a modulated image by repeating pixel modulation in block units on the adjusted secret image; and interlacing odd-numbered lines of the adjusted secret image with even-numbered lines of the modulated image or interlacing even-numbered lines of the adjusted secret image with odd-numbered lines with the modulated image.
12. The apparatus of claim 11, wherein the decryption screen decrypts the adjusted secret image encrypted by even-numbered lines or odd-numbered lines of the interlaced image.
13. The apparatus of claim 12, wherein the decryption screen comprises a mask that prevents viewing at a position corresponding to an even-numbered line or an odd-numbered line of the interlaced image.
14. The apparatus of claim 13, wherein the mask comprises a polarization filter or a light blocking filter.
15. The apparatus of claim 11, wherein, after further generating an adjusted public image by adjusting an intensity range to be the same for each RGB channel of a public image, the modulated image is generated by repeating pixel modulation in block units on the adjusted secret image and the adjusted public image.
16. The apparatus of claim 15, wherein the decryption screen decrypts the adjusted secret image encrypted by even-numbered lines or odd-numbered lines of the interlaced image.
17. The apparatus of claim 16, wherein the decryption screen comprises a mask that prevents viewing at a position corresponding to an even-numbered line or an odd-numbered line of the interlaced image.
18. The apparatus of claim 17, wherein the mask comprises a polarization filter or a light blocking filter.
19. A non-transitory computer-readable storage medium storing a computer program, wherein the computer program, when being executed by a processor, comprises: generating an adjusted secret image by adjusting an intensity range to be the same for each RGB channel of a secret image; generating a modulated image by repeating pixel modulation in block units on the adjusted secret image; and generating an interlaced image by interlacing odd-numbered lines of the adjusted secret image with even-numbered lines of the modulated image or interlacing even-numbered lines of the adjusted secret image with odd-numbered lines with the modulated image.
20. The computer-readable recording medium of claim 19, wherein the image decryption method further comprises generating an adjusted public image by adjusting an intensity range to be the same for each RGB channel of a public image, wherein the generating the modulated image generates the modulated image by repeating pixel modulation in block units on the adjusted secret image and the adjusted public image.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
DETAILED DESCRIPTION
[0043] The advantages and features of the present disclosure and the methods of accomplishing these will be clearly understood from the following description taken in conjunction with the accompanying drawings. However, embodiments are not limited to those embodiments described, as embodiments may be implemented in various forms. It should be noted that the present embodiments are provided to make a full disclosure and also to allow those skilled in the art to know the full range of the embodiments. Therefore, the embodiments are to be defined only by the scope of the appended claims.
[0044] In describing the embodiments of the present disclosure, if it is determined that detailed description of related known components or functions unnecessarily obscures the gist of the present disclosure, the detailed description thereof will be omitted. Further, the terminologies to be described below are defined in consideration of functions of the embodiments of the present disclosure and may vary depending on a user's or an operator's intention or practice. Accordingly, the definition thereof may be made on a basis of the content throughout the specification.
[0045] To describe image encryption and decryption based on the line interlacing characteristics, the present disclosure exemplifies interlacing odd-numbered lines (or even-numbered lines) of the first image with even-numbered lines (or odd-numbered lines) of the second image. Here, the line may be any line that virtually extends at least part of pixels in the related image in a row direction, in a column direction, or in a diagonal direction. Among the lines, descriptions will be given primarily based on an example in which lines are virtually extending at least part of the pixels in the related image in a row direction.
[0046]
[0047] An image encryption method based on line interlacing characteristics according to one embodiment of the present disclosure relates to an image encryption method using line interlacing capable of preventing recapturing a color image. According to one embodiment of the present disclosure, the image encryption method may be implemented in a commercial polarized 3D system 1 without involving additional hardware and prevent illegal content leakage due to image recapture using an imaging device.
[0048] An image encryption method based on line interlacing characteristics according to one embodiment of the present disclosure may include two types of security display schemes: a restricted viewing scheme (RVS) and a selective viewing scheme (SVS).
[0049] Both schemes are pixel-level encryption schemes that incapacitate the Gestalt theory, making it impossible to extract information on a secret image from an image obtained by recapturing a display.
[0050] In the RVS, an interlaced image concealing a secret image therein is viewed as meaningless noise, while, in the SVS, an improved scheme of the RVS, an interlaced image is viewed as a meaningful public image. In both schemes, a concealed secret image is visible only to authorized users wearing polarized glasses. Unlike previous schemes that express only a limited number of colors, require a color analyzer, or generate a distortion such as noise, the proposed scheme is a software-based scheme capable of expressing a rich set of colors of an image while minimizing the quality deterioration of the secret image.
[0051] Through the proposed method, it is possible to visually and statistically conceal a secret image while distortions of the secret image are kept to a minimum and make it impossible to extract the secret image from a recaptured image. In addition, the image encryption method based on line interlacing characteristics according to one embodiment of the present disclosure may control the right of viewing a secret image using polarized glasses in a polarized 3D system and decrypt the secret image using masking even from paper such as an identification card, a banknote, and a document.
[0052] In the present disclosure, the restricted viewing scheme of the image encryption method based on line interlacing characteristics according to one embodiment of the present disclosure will be described with reference to
[0053] Referring to
[0054] The stereoscopic 3D (S3D) content 30 is composed of left-eye and right-eye images, and the two images are interlaced on a line-by-line basis and projected on a 3D display. The display area is divided into odd- and even-numbered rows, and a clockwise circular polarization filter and a counterclockwise circular polarization filter are disposed on the odd- and even-numbered rows, respectively. A circular polarization filter converts natural light into circularly polarized light, which blocks light waves of other polarization directions and lets light waves of the same polarization pass through. Finally, clockwise and counterclockwise circular polarization filters are disposed on the two lenses of the polarized glasses. Accordingly, the left- and right-eye images are circularly polarized in different directions through the two circular polarization filters to be projected on the display, and the projected images are separated onto both eyes through the polarized glasses 20.
[0055] The polarized glasses 20 according to one embodiment of the present disclosure include circular polarization filters in the same polarization direction. The polarized glasses 20 identify a secret image concealed in the odd-numbered rows of an interlaced image.
[0056] The polarized glasses 20 will be described in detail with reference to
[0057]
[0058] The existing image encryption methods based on line interlacing characteristics assume that two circular polarization filters in clockwise and counterclockwise directions are disposed in odd- and even-numbered rows of a display, respectively, as shown in
[0059] L and R are defined as left-eye and right-eye images having a size of (h×w), respectively. Also, L.sub.h and R.sub.h are defined as images with a size of (h/2×w) halved in the vertical direction from L and R, respectively. l is defined as an image in which L.sub.h, and R.sub.h are interlaced line by line in the vertical direction; I.sub.o and I.sub.e are defined as images composed of odd- and even-numbered rows of I, respectively. If the inter operator is denoted by //, I may be defined as shown in Eq. 1.
I=L.sub.h//R.sub.h=I.sub.o//I.sub.e. [Eq. 1]
[0060] f.sub.CW(I) and f.sub.CCW(I) are defined as views of I seen through the circular polarization filters f.sub.CW and f.sub.CCW in the clockwise and counterclockwise directions, respectively and are defined by Eq 2 below.
f.sub.cw(I)=I.sub.o//B≈L,
f.sub.ccw(I)=B//I.sub.e≈R, [Eq. 2]
[0061] In Eq. 2, B represents a black image with a size of (h/2×w). Therefore, a glasses view V.sub.g and a non-glasses view V.sub.ng of I may be expressed by Eq. 3 below.
V.sub.g={V.sub.g.sup.L,V.sub.g.sup.R}={f.sub.cw(I),f.sub.ccw(I)},
V.sub.ng=I, [Eq. 3]
[0062] In Eq. 3, V.sub.g.sup.L and V.sub.g.sup.R represent the views through the left and right lenses of the polarized glasses, respectively.
[0063] The polarized glasses 20 in the polarized 3D system for image recapture prevention according to one embodiment of the present disclosure modifies existing polarized 3D systems for viewing 3D content to prevent image recapture.
[0064] A polarized 3D system is used to conceal a secret image in the interlaced image and to view the secret image in the interlaced image through the polarized glasses 20. Therefore, the polarized 3D system is changed to be composed of circular polarization filters in the same polarization as shown in
[0065]
[0066] In a modified polarized 3D system, a glasses view, V.sub.g, may be expressed by Eq. 4.
V.sub.g=V.sub.g.sup.L=V.sub.g.sup.R=f.sub.cw(I). [Eq. 4]
[0067] Accordingly, as shown in
[0068] Although
[0069]
[0070]
[0071] Here, the generating an adjusted secret image S′ by adjusting the intensity range S1110 adjusts the range of a pixel value to have the same distance of intensity strength t from the expectation value E of a probabilistic variable representing the pixel value of the secret image S.
[0072] In the S120 step, pixel modulation is applied to the adjusted secret image S′ in block units to generate a modulated image M.
[0073] Here, the generating the modulated image M.sub.S S120 calculates pixel values of a particular block located within a preconfigured range in the adjusted secret image S′ and performs pixel modulation for each block of the adjusted secret image S′ based on the pixel values of the particular block.
[0074] Specifically, pixel modulation is performed on each block so that the average value of pixel values of any block located within a preconfigured range falls within a target average range.
[0075] In the S130 step, odd- or even-numbered rows of the adjusted secret image S′ are interlaced with even- or odd-numbered rows of the modulated image M.sub.S to generate an interlaced image I.
[0076] The restricted viewing scheme will be described in more detail with reference to
[0077]
[0078] In the RVS, when viewed without wearing glasses, an image concealing a secret image is seen as meaningless noise. In the RVS, the secret image is viewed restrictively through polarized glasses. Therefore, as shown below, a non-glasses view V.sub.ng approximates a random image R obtained by interlacing an adjusted secret image S′ and a modulated image M.sub.S, and a glasses view V.sub.g approximates the secret image S, which are expressed by Eq. 5 below.
V.sub.ng=S′//M.sub.s≈R,
V.sub.g=S′//B≈S, [Eq. 5]
[0079] In Eq. 5, R represents a random image in which pixel values follow the uniform distribution.
[0080] In a restricted viewing condition, the restricted viewing scheme assumes that the statistical characteristics of an interlaced image should be similar to those of a random image R following the uniform distribution. The average μ.sub.R and standard deviation σ.sub.R of a pixel value of R are calculated by Eq. 6.
[0081] In Eq. 6, x.sub.i represents the pixel value having a value of i. P.sub.r(x) represents the probability mass function of x, and since x.sub.i follows the uniform distribution, all of x.sub.i have the same value.
[0082] To adjust the distribution of the interlaced image I, I.sub.o and I.sub.e have to be adjusted. According to one embodiment of the present disclosure, the adjustment is performed in block units to follow the target distribution.
[0083] I having a size of (h×w) is divided into blocks of size (2m×n) in a non-overlapping fashion, which is denoted by B.sub.I. Blocks having a size of (m×n) composed of odd- and even-numbered rows out of B.sub.I are denoted by B.sub.o and B.sub.e, respectively. X is defined to be a probabilistic variable representing a pixel value ranging from 0 to 255, and pixel values of block B.sub.I, B.sub.o, and B.sub.e are denoted by X.sub.I, X.sub.o, and X.sub.e, respectively. Then the average of X.sub.I,
[0084] In Eq. 7,
X.sub.I˜(μ.sub.R,σ.sub.R.sup.2). [Eq. 8]
[0085] As described above, to adjust the distribution of X.sub.I, X.sub.o and X.sub.e have to be adjusted. Therefore, to conceal a secret image while minimizing modification of X.sub.o that expresses the secret image, X.sub.e has to be generated to construct X.sub.I.
[0086] To this purpose, the intensity range is adjusted to have the same range for each RGB channel of the secret image S through intensity adjustment.
[0087] The lower bound of the standard deviation of pixel values, σ.sub.x, is 0, which is the case where all of the pixels have the same value, while the upper limit is calculated by Eq. 9 below.
[0088] In Eq. 9, E represents the expectation value. Considering the pixel value range, an upper bound, which is more conservative than the value expressed by Eq. 9, may be calculated by Eq. 10 below.
[0089] In Eq. 10, N represents the size of a block, and mod represents the modulo operator. The upper bound of the standard deviation of x, σ.sub.x, according to X using Eq. 10 is shown in
[0090] While the range of I.sub.o that expresses a secret image is adjusted to reach the target standard deviation, the range of I.sub.e for concealing the secret image is not adjusted to increase the entropy of pixel values and to cover a wider range of the standard deviation. The upper bound of σ.sub.x is symmetric with respect to E(X) as shown in
[0091] X.sub.o(i) and X.sub.e(i) are defined as the i-th pixel value from X.sub.o and X.sub.e, respectively. In this case, X.sub.o(i) and X.sub.e(i) are defined by Eq. 11 below.
X.sub.o(i)=(X)+α.sub.i and X.sub.e(i)=
(X)+β.sub.i, [Eq. 11]
[0092] In Eq. 11, α.sub.i∈[−t, t] and β.sub.i∈[−E(X), 255−E(X)]. If the size of B.sub.I is assumed to be 2N, sizes of B.sub.o and B.sub.e are N, respectively.
[0093] To satisfy
[0094] In Eq. 12, φ=2.Math.[k/2t]+1, and ϕ=2.Math.[k/2m]+1. N is a multiple of 2, and m is equal to E(X). Even when k is a negative integer, the upper and lower bounds are the same. When N=4, the upper and lower bounds of the standard deviation, σ.sub.I, according to t and k are shown in
[0095] In
[0096] Afterward, pixel modulation is repeatedly performed on the adjusted secret image S′ in block units to generate a modulated image M.
[0097] Specifically, after intensity adjustment of the secret image, I.sub.e is constructed by performing pixel modulation to achieve the target
[0098] Equation 14 expresses the target
σ.sub.c.sup.T=√{square root over (2σ.sub.R.sup.2−σ.sub.o.sup.2−2(
[0099] X.sub.e is obtained from Eq. 15 by random sampling of Y with a sample size of N following a uniform distribution in the range [0, 1].
X.sub.e=qY+r, [Eq. 15]
[0100] In Eq. 15, Y˜U(0, 1), q=σ.sub.e.sup.T/σ.sub.Y, and r=
μ.sub.R−τ.sub.μ≤
σ.sub.R−τ.sub.σ≤σ.sub.I≤σ.sub.R+τ.sub.σ [Eq. 16]
[0101] If
[0102] In other words, to describe the overall process of the RVS, first, the intensity range is adjusted to be the same for each RGB channel of a secret image S. Then, an adjusted image M.sub.S is generated by repeating pixel modulation in block units based on the adjusted secret image S′. Finally, an interlaced image I, which visually conceals the secret image, is obtained by performing line interlacing on S′ and M.sub.S.
[0103]
[0104]
[0105] Specifically,
[0106]
[0107]
[0108] The upper half of
[0109]
[0110] Referring to
[0111] Here, a public image P refers to an image to which an image enhancement scheme has been applied to enhance edge components.
[0112] Here, the generating an adjusted secret image S′ and an adjusted public image P′ by adjusting the intensity range S210 adjusts the range of a pixel value by considering the correlation between the intensity strength t.sub.s of the secret image S and the intensity strength t.sub.p of the public image P.
[0113] In the S220 step, a modulated image M.sub.S,P is generated by repeating pixel modulation in block units on the adjusted secret image S′ and the adjusted public image P′.
[0114] Here, the generating a modulated image M.sub.S,P S220 includes generating a second modulated image M′.sub.S,P with enhanced image quality by applying an inverse error diffusion scheme to the previously generated, first modulated image M.sub.S,P S221.
[0115] Here, the generating a modulated image M.sub.S,P by repeating pixel modulation in block units on the adjusted secret image S′ and the adjusted public image P′ S220 calculates pixel values for a particular block located within a preconfigured range in the adjusted secret image S′ and the adjusted public image P′ and performs pixel modulation for each block of the adjusted secret image S′ and the adjusted public image P′ based on the pixel values of the particular block.
[0116] Specifically, pixel modulation is performed for each block so that the average of pixel values of the particular block located within a preconfigured range falls within a target average range.
[0117] In the S230 step, an interlaced image I is generated by interlacing odd- or even-numbered rows of the adjusted secret image S′ and even- or odd-numbered rows of the modulated image M.sub.S,P.
[0118] The selective viewing scheme will be described in more detail with reference to
[0119]
[0120] Since a non-glasses view expresses a public image, the selective viewing scheme (SVS) lets a secret image and a public image viewed selectively through polarized glasses. As a result, as shown in Eq. 17 below, a non-glasses view approximates a public image, and at the same time, a glasses view approximates a secret image.
V.sub.ng=S′//M′.sub.s,p≈P,
V.sub.g=S′//B≈s, [Eq. 17]
[0121] In Eq. 17, P represents a public image that anyone may see without wearing polarized glasses.
[0122] To meet the selective viewing conditions, the restricted viewing scheme is modified so that the average of block B.sub.I in an interlaced image follows the average of block B.sub.p in a public image. In other words, as shown in Eq. 18, the distribution of X.sub.I has to be modified so that the average
X.sub.I˜(
[0123] In Eq. 18, it is assumed that I and P have the same size. B.sub.p represents a block in a public image P, which has the same size as the block B.sub.I, and X.sub.p represents the pixel value of B.sub.p. Therefore, to make X.sub.I follow a target distribution, X.sub.I has to be constructed by generating X.sub.e to minimize modification of X.sub.o and conceal a secret image while expressing a public image simultaneously as in the restricted viewing scheme.
[0124] An image encryption method based on line interlacing characteristics according to yet another embodiment of the present disclosure generates an adjusted secret image S′ and an adjusted public image P′ by adjusting the intensity range and adjusts the range of a pixel value by considering the correlation between the intensity strength t.sub.s of the secret image S and the intensity strength t.sub.p of the public image P.
[0125] Since only σ.sub.e is a variable in Eq. 7, the upper and lower bounds of σ.sub.I are expressed by Eq. 19 below.
[0126] In Eq. 19, max
[0127]
[0128] The range of X.sub.s is adjusted by Eq. 20 in the same way as in the restricted viewing scheme.
X.sub.s∈[0,255].fwdarw.X.sub.s′∈[μ.sub.R−t.sub.s,μ.sub.R+t.sub.s], [Eq. 20]
[0129] In Eq. 20, t.sub.s∈[0, 127.5] represents the intensity strength of a secret image S. To prevent pixel values from being unequally distributed, the range of a public image P is adjusted by Eq. 21 as in an adjusted secret image S′.
X.sub.p∈[0,255].fwdarw.X.sub.p′∈[μ.sub.R−t.sub.p,μ.sub.R+t.sub.p], [Eq. 21]
[0130] In Eq. 21, t.sub.p∈[0, 127.5] represents the intensity strength of a public image P. Since X′.sub.s and X′.sub.p are the same as X.sub.o and X.sub.I, the range of X.sub.e may be expressed by Eq. 22.
X.sub.e∈[μ.sub.R−2t.sub.p−t.sub.s,μ.sub.R+2t.sub.p+t.sub.s], [Eq. 22]
[0131] Since the range of a pixel value may be limited to [0, 255], the relationship between t.sub.p and y.sub.s may be derived using Eq. 22, as shown in Eq. 23 below.
2t.sub.p+t.sub.s≤127.5. [Eq. 23]
[0132] σ.sub.e may be expressed in terms of X′.sub.p and X′.sub.s using Eq. 7, which may be further expressed in terms of t.sub.p and t.sub.s as shown in Eq. 24.
[0133] σ.sub.e defined above has to satisfy Eq. 25.
0≤σ.sub.e≤U(σ.sub.e;
[0134] Since σ.sub.e satisfies the condition above, U(σ.sub.e;
[0135] Therefore, to satisfy the selective viewing conditions, t.sub.p and t.sub.s have to be set to satisfy the two conditions expressed by Eqs. 23 and 25.
[0136] Afterward, pixel modulation is repeatedly performed on the adjusted secret image S′ and the adjusted public image P′ in block units to generate a modulated image M.sub.S,P.
[0137] Specifically, after intensity adjustment of the secret image and the public image, I.sub.e is constructed by performing pixel modulation to achieve the target
[0138] To satisfy the selective viewing conditions, X.sub.e is randomly sampled using
[0139] Then, it is checked whether
[0140] Here, a second modulated image M′.sub.S,P with enhanced image quality may be generated by applying an inverse error diffusion scheme to the previously generated, first modulated image M.sub.S.P.
[0141] Specifically, since the SVS approximates a public image in block units to conceal a secret image, the image quality of an interlaced image expressing the public image is degraded. Therefore, the embodiment of the present disclosure may use an inverse error diffusion (IED) scheme to improve the image quality of an interlaced image.
[0142] First, the error diffusion scheme is a simple and efficient image dithering algorithm proposed to improve image quality degradation encountered during image quantization. As shown in Eq. 26 below, the quantization error of a pixel value is spread to adjacent pixels, and a modified pixel value is again fed back to the input, propagating the error in the lower right direction.
[0143] In Eq. 26, x and y represent the pixel values of an input image and an output image, respectively, h represents an error filter with a size of (h×l), and e represents the quantization error obtained by e=x−y. Since the TED scheme reduces distortions in the low-frequency components of the input image, image quality degradation due to image quantization may be effectively improved.
[0144] The IED scheme according to an embodiment of the present disclosure, instead of the quantization error used in the conventional error diffusion schemes, applies an inverse error obtained by inversion of the quantization error.
[0145] Thus, rather than reducing the difference between low-frequency components of the input and output images, the difference is increased to relax the range of pixel values while concealing a secret image. In addition, unlike the existing error diffusion schemes, the inverse error is propagated only to I.sub.e to prevent the degradation of the image quality of the secret image. The modulated image M′.sub.S,P generated through the inverse error diffusion scheme is calculated by Eq. 27.
[0146] In Eq. 27, e.sub.o=−(I.sub.o−P.sub.o) and e.sub.e=−(M.sub.S,P−P.sub.e).
[0147] In the equation above, P.sub.o and P.sub.e represent images composed of only odd- and even-numbered rows of P, respectively, and h represents an error filter. e.sub.o represents an inverse error between I.sub.o and P.sub.e, and e.sub.e represents an inverse error between M.sub.S,P and P.sub.e.
[0148] In other words, to describe the overall process of the SVS, first, image enhancement is applied to a public image P to enhance edge components. The intensity range is adjusted to be the same for each RGB channel of the secret image S and the public image P. Then, an adjusted image M.sub.S,P is generated by repeating pixel modulation in block units based on S′ and P′. M′.sub.S,P is generated by applying an inverse error diffusion scheme to M.sub.S,P to improve the image quality of P. Finally, an interlaced image I, which expresses P while concealing S is obtained by performing line interlacing on S′ and M.sub.S,P.
[0149]
[0150]
[0151]
[0152]
[0153]
[0154]
[0155]
[0156] As shown in
[0157] In the embodiment of
[0158] In another embodiment of
[0159] Comparing the image decryption apparatus according to the embodiment of
[0160] According to an embodiment of the present disclosure, the proposed method of encrypting an image using line interlacing characteristics may prevent illegal content leakage from recapture of a screen using an imaging device and may also be applied as a security display method. Also, the proposed schemes may be applied to content requiring protection from unauthorized recapture in public places such as public presentations and exhibitions. The proposed schemes may be applied to situations in which two pieces of content are displayed simultaneously on a single display, such as a dual display. In addition, it may be applied for authentication of paper such as an identification card, a banknote, and a document; and as an image encryption scheme for integrity verifcation.
[0161] In addition, according to an embodiment of the present disclosure, a computer program stored in a computer-readable storing medium that executes an image encryption method based on line interlacing characteristics may be provided.
[0162] In addition, according to an embodiment of the present disclosure, a computer-readable storing medium in which a program forexecuting an image encryption method based on line interlacing characteristics is stored may be provided.
[0163] Combinations of each block of the block diagram and each step of the flowchart in the present disclosure may be performed by computer program instructions, Since these computer program instructions may be mounted on an encoding processor of a general-purpose computer, a special purpose computer, or other programmable data processing equipment, a means by which the instructions executed by the encoding processor of the computer or other programmable data processing equipment performs the functions described in each block of the block diagram or each step in the flowchart may be generated. Since these computer program ctions may be stored in computer-usable or computer-readable mmemory that may be directed to the computer or other programmable data processing equipment to implement a function in a particular way, the instructions stored in the computer-usable or computer-readable r emory may produce manufactures including an instruction means for performing the functions described in each block of the block diagram or each step of the flowchart. Since the computer program instructions may be mounted on the computer or other program able data processing equipment, instructions that operate the computer or other programmable data processing equipment by generating a process in which a series of operational steps are performed on the computer or other programmable data processing equipment and executed by the computer may provide steps of performing the functions described in each block of the block diagram and each step of the flowchart.
[0164] In addition, each block or each step may represent a part of a module, segment, or code that includes one or more executable instructions for executing specified logical function(s). Further, it Wray be noted that in some alternative embodiments, functions described in blocks or steps may occur regardless of the described order. For example, two blocks or two steps shown in succession may be performed substantially simultaneously, or sometimes be performed in the reverse order depending on the corresponding function.
[0165] The above description is merely exemplary description of the technical scope of the present disclosure, and it will be understood by those skilled in the art that various changes and modifications can be made without departing from original characteristics of the present disclosure. Therefore, the embodiments disclosed in the present disclosure are intended to explain, not to limit, the technical scope of the present disclosure, and the technical scope of the present disclosure is not limited by the embodiments. The protection scope of the present disclosure should be interpreted based on the following claims and it should be appreciated that all technical scopes included within a range equivalent thereto are included in the protection scope of the present disclosure.