After considering the possibility of hiding messages amongst the designs I have been creating, forming an amalgamation between type and geometry, I chose to research into the field of visual cryptography.

Forming images which can only be viewing in a certain manner is not a new technique. As many of you may remember the Magic Eye books, first appearing twenty years ago, where an image was only revealed if the reader were able to facilitate the parallel viewing technique. Beginning with a discovery by Bela Julesz alongside MacArthur Fellow in 1959 first highlighting the possibility that depth perception was a neurological process not something occurring within the eye itself as previously considered.In 1979 Christopher Tyler created the first single-image random-dot stereogram allowing the brain to see 3D shapes from 2D images. This formed the basis for the Magic Eye phenomena. Until you master the process of deciphering the stereogram within your brain you be unable to see the 3D image. Unfortunately those without stereo vision will be unable to decipher the image as it relies on the information from the two alternative viewpoints.

To reveal these single-image stereograms the viewer must train their eyes to focus beyond the image, creating a parallel viewpoint opposed to one focussed on the page. As this is not the natural focus position for the eye, the viewer will not see the image until they have managed to complete this process.

Normal Viewing Method

Anon., n.d.  Normal Viewing. [electronic print] Available at: <http://www.vision3d.com/3views.html&gt; [Accessed 17th December 2011].

Parallel Viewing Method

Anon., n.d.  Parallel Viewing. [electronic print] Available at: <http://www.vision3d.com/3views.html&gt; [Accessed 17th December 2011].

Example of a Magic Eye image.

Anon., 2011.  Magic Eye Image. [electronic print] Available at: <http://www.magiceye3ds.com/pictures.aspx&gt; [Accessed 17th December 2011].

Those capable of mastering the parallel viewing technique will be able to reveal the image of a car.

Visual cryptography method

Originally developed by Moni Naor and Adi Shamir in 1994,2 Visual cryptography allows images and information to be decrypted by human sight. By separating the image onto two or more separate sheets it is possible to make the image impossible to decipher without having both halves of the cipher.

Anon., n.d. Visual Cryptography, [electronic print] Available at: <http://users.telenet.be/d.rijmenants/en/visualcrypto.htm> [Accessed 17th December 2011].

This method has been utilised by Kai Jauslin in their ‘Visuelle Kryptographie” project, where the image is only recognisable when the box is in the correct position. This invites the viewer to interact with the box.

Jauslin, K., n.d. Visuelle Kryptographie. [electronic print] Available at: <http://kai.jauslin.biz/> [Accessed 25th November 2011].

A simpler method which many will be familiar with is that to place a red filter over the hidden image.

People are always fascinated with hidden messages, designers alike. The thrill of uncovering a secret message is engaging for the audience and this was something I wished to carry through into my design project.

Developed by Professor Shinobu Ishihara the pseudoisochromatic colour blind test is utilised on this elephant in Antwerp. Here only those not suffering from red-green colourblindness will be able to see the M on the elephants back.

Price, R., 2008. Ishihara Elephant. [electronic print] Available at: <http://www.colblindor.com/2009/04/19/ishihara-elephant/> [Accessed 17th December 2011].

John Locke and Jackie Caradonio were experimenting with hiding text with the following image from their studio, Lioninoil.

Locke, J., and Caradonio, J., 2008. What you are looking for hidden in plain sight. [electronic print] Available at: <http://www.lioninoil.net/blog/category/graphic-design> [Accessed 17th December 2011].

Many graphic designers also experiment with hiding hidden messages in their logo design. It is a way of engaging with the audience, providing stimulation and a reward for their effort.

Aguad, S., 2009. Toblerone Logo. [electronic print] Available at: <http://noquedanblogs.com/geek/logo-toblerone/> [Accessed 17th December 2011].

Initially with the new design for the Museum of London the audience is likely to only appreciate the colour and flowing form. However the shapes used are not arbitary, they represent the changing shape of London throughout history.3

Porter Bell, C., 2010. Museum of London Logo. [electronic print] Available at: <http://lyndseycoles.files.wordpress.com/2009/09/logos3.jpg> [Accesed 17th December 2011].

Optical illusions such as the image below, which revels something different at different distances is something I wanted to consider with my design. By being able to read the hidden word at some distances but not others will engage the audience.

Anon, n.d. You Are Close. [electronic print] Available at: <http://www.moillusions.com/2010/07/are-you-far-or-close.html> [Accessed 17th December 2011].

In researching the history of visual crytpographic methods and looking at methods used by other designers to hide and reveal messages offered several alternatives to hide the message I wanted to among my design. By comparing to the work of others I am able to not only analyse which methods work effectively.

References

1. Anon. n.d. History of Magic Eye 3D Pictures. [online] Available at: <http://www.magiceye3ds.com/history.aspx> [Accessed 17th December 2011].

2. Wikipedia, 2011. Visual Crytography. [online] Available at: <http://en.wikipedia.org/wiki/Visual_cryptography> [Accessed 17th December 2011].

3. Anon. n.d. Coley Porter Bell. [online] Available at: <http://www.cpb.co.uk/> [Accessed 17th December 2011].

Advertisements