Invisible Printed Cross Eye 3D

R..jpg

A
R..jpg

  • 0
  • 0
  • 5
WPPD25 Self Portrait

A
WPPD25 Self Portrait

  • 7
  • 1
  • 76
Wife

A
Wife

  • 5
  • 1
  • 106
Dragon IV 10.jpg

A
Dragon IV 10.jpg

  • 4
  • 0
  • 94
DRAGON IV 08.jpg

A
DRAGON IV 08.jpg

  • 1
  • 0
  • 63

Recent Classifieds

Forum statistics

Threads
197,889
Messages
2,766,445
Members
99,495
Latest member
Brenva1A
Recent bookmarks
0
Joined
Oct 29, 2006
Messages
4,825
Location
İstanbul
Format
35mm
I saw an invisible printed, very small , cross eye 3D print on ordinary photo paper 17 years ago . It was invisible printed on paper and How does it work ?
Is it double image - stereo image - or another improved technology ?
I think if I can print large size with a printer , it is better than Leica. May be it requires cad drawing or stereo picture.. I cant think more.

Umut
 

removed account4

Subscriber
Joined
Jun 21, 2003
Messages
29,833
Format
Hybrid
the paper dries and there is nothing, just a blank piece of paper until
it is warmed up ...
no coffee needed, coffee wouldn't be invisible messages but the tannins in
Black TEA would be used to age your paper to make your invisible message /
heated formerly invisible stereogram image ... look old ...
 
OP
OP
Mustafa Umut Sarac
Joined
Oct 29, 2006
Messages
4,825
Location
İstanbul
Format
35mm
That picture stayed at my archive for years. Its permanent. You see the image when you get close to it and cross your eyes and voila 3 dimensional small picture. It was printed on an other picture or with the other picture. I saw somewhere a technics description but may be 10 years ago. I think nobody knows and I will search and let you know. But Let me wait little bit.
 
OP
OP
Mustafa Umut Sarac
Joined
Oct 29, 2006
Messages
4,825
Location
İstanbul
Format
35mm
Steganography and related works

A Novel Steganographic Technique Based on 3D-DCT Approach
Samir Kumar Bandyopadhyay

Related works
The majority of today’s steganographic systems uses images as cover media because people often transmit
digital pictures over email and other Internet communication. Several methods exist to employ the concept of
Steganography as well as plenty algorithms have been proposed in this regard. To gather knowledge regarding
our approach, we have concentrated on some techniques and methods which are described below.
In the field of image security, Miroslav Dobsicek (Dobsicek, M., 2004) has developed an interesting application
of steganography where the content is encrypted with one key and can be decrypted with several other keys, the
relative entropy between encrypt and one specific decrypt key corresponds to the amount of information. Yusuk
Lim, Changsheng Xu and David Dagan Feng, 2001, described the webbased authentication system consists of
two parts: one is a watermark embedding system and the other is authentication system. In case of watermark
embedding system, it is installed in the server as application software that any authorized user, who has access to
server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP,
email etc. Once image is distributed to externally, client can access to authentication web page to get verification
of image (Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001).
Min Wu and Bede Liu, June, 2003, proposed (Min Wu. 2004) a new method to embed data in binary images,
including scanned text, figures, and signatures. The method manipulates “flippable” pixels to enforce specific
block based relationship in order to embed a significant amount of data without causing noticeable artifacts.
They have applied Shuffling before embedding to equalize the uneven embedding capacity from region to region.
The hidden data can then be extracted without using the original image, and can also be accurately extracted
after high quality printing and scanning with the help of a few registration marks.
Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al- Taani, 2005, have explained a method with three main
steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of
each pixel is used.
Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information
hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six
bits represent the original image with very little difference in contrast. The given method embeds three images in
one image and includes, as a special case of data embedding, information hiding, identifying and authenticating
text embedded within the digital images (Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, 2005). In
2007, Nameer N. EL-Emam proposed an algorithmic approach to obtain data security using LSB insertion
steganographic method. In this approach, high security layers have been proposed through three layers to make it
difficult to break through the encryption of the input data and confuse steganalysis too(Nameer N. EL-Emam,
2007).
S. K. Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulami Das in 2008
has proposed a heuristic approach to hide huge amount of data using LSB steganography technique. In their
method, they have first encoded the data and afterwards the encoded data is hidden behind a cover image by
modifying the least significant bits of each pixel of the cover image. The resultant stego-image was distortion
less. Also, they have given much emphasis on space complexity of the data hiding technique
(S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulumi Das, 2008).
There is also a good method proposed by G. Sahoo and R. K. Tiwari in 2008. Their proposed method works on
more than one image using the concept of file hybridization. This particular method implements the
cryptographic technique to embed two information files using steganography. And due to this reason they have
used a stego key for the embedding process (G. Sahoo, R. K. Tiwari, 2008).
Unfortunately, modifying the cover image changes its statistical properties, so eavesdroppers can detect the
distortions in the resulting stego-image’s statistical properties. In fact, the embedding of high-entropy data (often
due to encryption) changes the histogram of colour frequencies in a predictable way. So, in order to obtain more
security in our prescribed method, we have embedded an entire image behind another image of twice the size of
target image remarkable change in the final image.

Our Work
3.1 3-D DCT:
The three-dimensional variant of the DCT is a composition of three 1D DCT along each dimension.
 
OP
OP
Mustafa Umut Sarac
Joined
Oct 29, 2006
Messages
4,825
Location
İstanbul
Format
35mm
Stereogram Autostereogram

wikipedia

Stereogram and autostereogram

Stereogram was originally used to describe as a pair of 2D images used in stereoscope to present a 3D image to viewers. The "auto" in autostereogram describes an image that does not require a stereoscope. The term stereogram is now often used interchangeably with autostereogram. Dr. Christopher Tyler, inventor of the autostereogram, consistently refers to single image stereograms as autostereograms to distinguish them from other forms of stereograms.

Random dot stereogram (RDS)

Random dot stereogram, describes a pair of 2D images containing random dots which, when viewed with a stereoscope, produced a 3D image. The term is now often used interchangeably with random dot autostereogram


Single image stereogram (SIS)


Single image stereogram (SIS). SIS differs from earlier stereograms in its use of a single 2D image instead of a stereo pair and is viewed without a device. Thus, the term is often used as a synonym of autostereogram. When the single 2D image is viewed with proper eye convergence, it causes the brain to fuse different patterns perceived by the two eyes into a virtual 3D image without, hidden within the 2D image, the aid of any optical equipment. SIS images are created using a repeating pattern.[15][27] Programs for their creation include Mathematica.


Random dot autostereogram/hidden image stereogram


Is also known as single image random dot stereogram (SIRDS). This term also refers to autostereograms where the hidden 3D image is created using a random pattern of dots within one image, shaped by a depth map within a dedicated stereogram rendering program

Wallpaper autostereogram/object array stereogram/texture offset stereogram

Wallpaper autostereogram is a single 2D image where recognizable patterns are repeated at various intervals to raise or lower each pattern's perceived 3D location in relation to the display surface. Despite the repetition, these are a type of single image autostereogram.

Single image random text stereogram (SIRTS)

An single image random text ASCII stereogram is an alternative to SIRDS using random ASCII text instead of dots to produce a 3D form of ASCII art.

Map textured stereogram

In a map textured stereogram, "a fitted texture is mapped onto the depth image and repeated a number of times" resulting in a pattern where the resulting 3D image is often partially or fully visible before viewing.
 
Last edited by a moderator:

summicron1

Subscriber
Joined
Jul 28, 2010
Messages
2,920
Location
Ogden, Utah
Format
Multi Format
I saw an invisible printed, very small , cross eye 3D print on ordinary photo paper 17 years ago . It was invisible printed on paper and How does it work ?
Is it double image - stereo image - or another improved technology ?
I think if I can print large size with a printer , it is better than Leica. May be it requires cad drawing or stereo picture.. I cant think more.

Umut

I guess i don't understand what you mean by "invisible." When i think of an invisible image, I think it's a blank piece of paper, nothing to see.

If you mean "a single image with a buried 3-d image" then that is those magic image books that got real popular a bunch of years ago, with an apparent random pattern picture which, when you look at it by free-viewing with the aid of a couple of locator dots, you can see the buried/hidden/invisible 3-d image.

They tend to be computer generated. Shooting with a leica would make no difference.
 
OP
OP
Mustafa Umut Sarac
Joined
Oct 29, 2006
Messages
4,825
Location
İstanbul
Format
35mm
Thanks Summicron. I think you described it best. Is there any program in this world helps to see a postal engraving landscape in 3d and convert it to wallpaper size dots ?

Umut
 
Photrio.com contains affiliate links to products. We may receive a commission for purchases made through these links.
To read our full affiliate disclosure statement please click Here.

PHOTRIO PARTNERS EQUALLY FUNDING OUR COMMUNITY:



Ilford ADOX Freestyle Photographic Stearman Press Weldon Color Lab Blue Moon Camera & Machine
Top Bottom