Advertisement

An Analysis on Inverted Mirrored Moiré and Ribbon of Band Moiré

  • Hui-Ying Liu
  • Dao-Shun WangEmail author
  • Xiang-Hui Zhao
  • Shun-Dong Li
  • Ching-Nung Yang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)

Abstract

Band moiré pattern is produced by the superposition of the base layer with the revealing layer that has a different periodic frequency. Band moiré can effectively describe the geometric transformation of moiré, so that we can design more elements and specific moiré in band moiré image, which can be used to engage and decipher the secret image. Hersch et al. put forward a mathematical model to describe the geometric transformation of moiré pattern, and based on this, a method for constructing band moiré pattern was proposed. Furthermore, the inverted mirrored moiré effect is also described for the case that the period of the revealing layer is less than the period of the base layer. However, the principle and limitations of inverted mirrored moiré effect have not been given. In this paper, we introduce the principle of the inverted mirrored moiré effect and specify the conditions of producing inverted mirrored moiré, That is, when the period of the revealing layer is less than the period of the basic layer and more than half of the period of the base layer, the inverted mirrored moiré will be shown. We also noticed the phenomenon of the repeated local moiré pattern with the analysis of the moiré generation. We give the restriction of producing ribbon moiré, when the period of the revealing layer is equal to the period of the base layer, the ribbon moiré will show. The limitations of inverted mirror image or ribbon were analyzed and the results were verified by experiments.

Keywords

Ribbon moiré Inverted mirrored moiré Moiré pattern 

Notes

Acknowledgement

This work was supported in part by the National Natural Science Foundation of China under Grant U1536102, and Grant U1536116, in part by China Mobile Research Fund Project (MCM20170407), and State Administration of Press, Publication, Radio, Film and Television (SAPPRFT) Key Laboratory of Digital Content Anti-Counterfeiting and Security Forensics.

References

  1. 1.
    Hersch, R.D., Chosson, S.: Band moiré images. ACM Trans. Graph. 23(3), 239–247 (2004)CrossRefGoogle Scholar
  2. 2.
    Amidror, I.: The Theory of the Moiré Phenomenon. Kluwer Academic Publishers, Dordrecht, Boston, London (2000)CrossRefGoogle Scholar
  3. 3.
    Bryngdahl, O.: Moiré formation and interpretation. J. Opt. Soc. Am. 64(10), 1287–1294 (1974)CrossRefGoogle Scholar
  4. 4.
    Glass, L.: Moiré effect from random dots. Nature 223(5206), 578–589 (1969)CrossRefGoogle Scholar
  5. 5.
    Amidror, I., Hersch, R.D.: Fourier-based analysis and synthesis of moirés in the superposition of geometrically transformed periodic structures. J. Opt. Soc. Am. 15(5), 117–118 (1998)CrossRefGoogle Scholar
  6. 6.
    Zhou, S.L., Fu, Y.Q.: Fourier-based analysis of moiré fringe patterns of superposed gratings in alignment of nanolithography. Opt. Soc. Am. 16(11), 7869–7880 (2008)Google Scholar
  7. 7.
    Walger, T., Hersch, R.D.: Hiding information in multiple level-line moirés. In: ACM Symposium on Document Engineering, pp. 21–24. ACM (2015)Google Scholar
  8. 8.
    Cadarso, V.J., Chosson, S., Sidler, K.: High-resolution 1D moirés as counterfeit security features. Light Sci. Appl. 2(7), 86–92 (2013)CrossRefGoogle Scholar
  9. 9.
    Amidror, I., Hersch, R.D.: Mathematical moiré models and their limitations. J. Mod. Opt. 57(1), 23–36 (2010)CrossRefGoogle Scholar
  10. 10.
    Xin, M.: Moiré image hiding technology with multi-secret hiding performance. Tsinghua University, Beijing, pp. 5–9 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Hui-Ying Liu
    • 1
  • Dao-Shun Wang
    • 1
    Email author
  • Xiang-Hui Zhao
    • 2
  • Shun-Dong Li
    • 3
  • Ching-Nung Yang
    • 4
  1. 1.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina
  2. 2.China Information Technology Security Evaluation CenterBeijingChina
  3. 3.School of Computer ScienceShaanxi Normal UniversityXi’anChina
  4. 4.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Personalised recommendations