<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[nadinechicken]]></provider_name><provider_url><![CDATA[https://nadinechicken.wordpress.com]]></provider_url><author_name><![CDATA[nadinechicken]]></author_name><author_url><![CDATA[https://nadinechicken.wordpress.com/author/nadinechicken/]]></author_url><title><![CDATA[Visual Cryptography]]></title><type><![CDATA[link]]></type><html><![CDATA[<p>After considering the possibility of hiding messages amongst the designs I have been creating, forming an amalgamation between type and geometry, I chose to research into the field of visual cryptography.</p>
<p>Forming images which can only be viewing in a certain manner is not a new technique. As many of you may remember the Magic Eye books, first appearing twenty years ago, where an image was only revealed if the reader were able to facilitate the parallel viewing technique. Beginning with a discovery by Bela Julesz alongside MacArthur Fellow in 1959 first highlighting the possibility that depth perception was a neurological process not something occurring within the eye itself as previously considered.<sup>1 </sup>In 1979 Christopher Tyler created the first single-image random-dot stereogram allowing the brain to see 3D shapes from 2D images. This formed the basis for the Magic Eye phenomena. Until you master the process of deciphering the stereogram within your brain you be unable to see the 3D image. Unfortunately those without stereo vision will be unable to decipher the image as it relies on the information from the two alternative viewpoints.</p>
<p>To reveal these single-image stereograms the viewer must train their eyes to focus beyond the image, creating a parallel viewpoint opposed to one focussed on the page. As this is not the natural focus position for the eye, the viewer will not see the image until they have managed to complete this process.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/normal-viewing.gif"><img loading="lazy" data-attachment-id="87" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/normal-viewing/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/normal-viewing.gif" data-orig-size="450,127" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Normal Viewing" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/normal-viewing.gif?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/normal-viewing.gif?w=450" class="aligncenter size-medium wp-image-87" title="Normal Viewing" src="https://nadinechicken.files.wordpress.com/2011/12/normal-viewing.gif?w=300&#038;h=84" alt="" width="300" height="84" /></a>Normal Viewing Method</p>
<p>Anon., n.d.  Normal Viewing. [electronic print] Available at: &lt;<a href="http://www.vision3d.com/3views.html&#038;gt" rel="nofollow">http://www.vision3d.com/3views.html&#038;gt</a>; [Accessed 17<sup>th</sup> December 2011].</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/the-parallel-viewing-method.gif"><img loading="lazy" data-attachment-id="88" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/the-parallel-viewing-method/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/the-parallel-viewing-method.gif" data-orig-size="450,127" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="The Parallel Viewing Method" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/the-parallel-viewing-method.gif?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/the-parallel-viewing-method.gif?w=450" class="aligncenter size-medium wp-image-88" title="The Parallel Viewing Method" src="https://nadinechicken.files.wordpress.com/2011/12/the-parallel-viewing-method.gif?w=300&#038;h=84" alt="" width="300" height="84" /></a>Parallel Viewing Method</p>
<p>Anon., n.d.  Parallel Viewing. [electronic print] Available at: &lt;<a href="http://www.vision3d.com/3views.html&#038;gt" rel="nofollow">http://www.vision3d.com/3views.html&#038;gt</a>; [Accessed 17<sup>th</sup> December 2011].</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg"><img loading="lazy" data-attachment-id="81" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/042magiceye3d/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg" data-orig-size="720,509" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="042magiceye3d" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg?w=720" class="aligncenter size-full wp-image-81" title="042magiceye3d" src="https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg?w=460&#038;h=325" alt="" width="460" height="325" srcset="https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg?w=460&amp;h=325 460w, https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg?w=150&amp;h=106 150w, https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg?w=300&amp;h=212 300w, https://nadinechicken.files.wordpress.com/2011/12/042magiceye3d.jpg 720w" sizes="(max-width: 460px) 100vw, 460px" /></a></p>
<p>Example of a Magic Eye image.</p>
<p>Anon., 2011.  Magic Eye Image. [electronic print] Available at: &lt;<a href="http://www.magiceye3ds.com/pictures.aspx&#038;gt" rel="nofollow">http://www.magiceye3ds.com/pictures.aspx&#038;gt</a>; [Accessed 17<sup>th</sup> December 2011].</p>
<p>Those capable of mastering the parallel viewing technique will be able to reveal the image of a car.</p>
<p><span style="text-decoration:underline;">Visual cryptography method</span></p>
<p>Originally developed by Moni Naor and Adi Shamir in 1994,<sup>2</sup> Visual cryptography allows images and information to be decrypted by human sight. By separating the image onto two or more separate sheets it is possible to make the image impossible to decipher without having both halves of the cipher.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-1.gif"><img loading="lazy" data-attachment-id="91" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/visual-crypto-1/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-1.gif" data-orig-size="196,196" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Visual Crypto 1" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-1.gif?w=196" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-1.gif?w=196" class="aligncenter size-full wp-image-91" title="Visual Crypto 1" src="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-1.gif?w=196&#038;h=196" alt="" width="196" height="196" /></a><a href="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-2.gif"><img loading="lazy" data-attachment-id="92" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/visual-crypto-2/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-2.gif" data-orig-size="196,196" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Visual Crypto 2" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-2.gif?w=196" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-2.gif?w=196" class="aligncenter size-full wp-image-92" title="Visual Crypto 2" src="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-2.gif?w=196&#038;h=196" alt="" width="196" height="196" /></a><a href="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-example.gif"><img loading="lazy" data-attachment-id="93" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/visual-crypto-example/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-example.gif" data-orig-size="240,196" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Visual Crypto Example" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-example.gif?w=240" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-example.gif?w=240" class="aligncenter size-full wp-image-93" title="Visual Crypto Example" src="https://nadinechicken.files.wordpress.com/2011/12/visual-crypto-example.gif?w=240&#038;h=196" alt="" width="240" height="196" /></a></p>
<p>Anon., n.d. Visual Cryptography, [electronic print] Available at: &lt;<a href="http://users.telenet.be/d.rijmenants/en/visualcrypto.htm">http://users.telenet.be/d.rijmenants/en/visualcrypto.htm</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>This method has been utilised by Kai Jauslin in their &#8216;Visuelle Kryptographie” project, where the image is only recognisable when the box is in the correct position. This invites the viewer to interact with the box.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg"><img loading="lazy" data-attachment-id="83" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/4102912889_d67fe29672/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg" data-orig-size="500,400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="4102912889_d67fe29672" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg?w=500" class="aligncenter size-medium wp-image-83" title="4102912889_d67fe29672" src="https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg?w=300&#038;h=240" alt="" width="300" height="240" srcset="https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg?w=300&amp;h=240 300w, https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg?w=150&amp;h=120 150w, https://nadinechicken.files.wordpress.com/2011/12/4102912889_d67fe29672.jpg 500w" sizes="(max-width: 300px) 100vw, 300px" /></a><a href="https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg"><img loading="lazy" data-attachment-id="82" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/4102912653_3f198bf800/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg" data-orig-size="500,400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="4102912653_3f198bf800" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg?w=500" class="aligncenter size-medium wp-image-82" title="4102912653_3f198bf800" src="https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg?w=300&#038;h=240" alt="" width="300" height="240" srcset="https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg?w=300&amp;h=240 300w, https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg?w=150&amp;h=120 150w, https://nadinechicken.files.wordpress.com/2011/12/4102912653_3f198bf800.jpg 500w" sizes="(max-width: 300px) 100vw, 300px" /></a><a href="https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg"><img loading="lazy" data-attachment-id="90" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/viscrypt-2/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg" data-orig-size="600,399" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="viscrypt-2" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg?w=600" class="aligncenter size-medium wp-image-90" title="viscrypt-2" src="https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg?w=300&#038;h=199" alt="" width="300" height="199" srcset="https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg?w=300&amp;h=199 300w, https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg?w=598&amp;h=398 598w, https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg?w=150&amp;h=100 150w, https://nadinechicken.files.wordpress.com/2011/12/viscrypt-2.jpg 600w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Jauslin, K., n.d. Visuelle Kryptographie. [electronic print] Available at: &lt;<a href="http://kai.jauslin.biz/">http://kai.jauslin.biz/</a>&gt; [Accessed 25<sup>th</sup> November 2011].</p>
<p>A simpler method which many will be familiar with is that to place a red filter over the hidden image.</p>
<p>People are always fascinated with hidden messages, designers alike. The thrill of uncovering a secret message is engaging for the audience and this was something I wished to carry through into my design project.</p>
<p>Developed by Professor Shinobu Ishihara the pseudoisochromatic colour blind test is utilised on this elephant in Antwerp. Here only those not suffering from red-green colourblindness will be able to see the M on the elephants back.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg"><img loading="lazy" data-attachment-id="85" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/ishihara-elephant/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg" data-orig-size="500,332" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Ishihara Elephant" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg?w=500" class="aligncenter size-medium wp-image-85" title="Ishihara Elephant" src="https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg?w=300&#038;h=199" alt="" width="300" height="199" srcset="https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg?w=300&amp;h=199 300w, https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg?w=150&amp;h=100 150w, https://nadinechicken.files.wordpress.com/2011/12/ishihara-elephant.jpg 500w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Price, R., 2008. Ishihara Elephant. [electronic print] Available at: &lt;<a href="http://www.colblindor.com/2009/04/19/ishihara-elephant/">http://www.colblindor.com/2009/04/19/ishihara-elephant/</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>John Locke and Jackie Caradonio were experimenting with hiding text with the following image from their studio, Lioninoil.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg"><img loading="lazy" data-attachment-id="84" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/hidden-images/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg" data-orig-size="1024,787" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Hidden images" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg?w=1024" class="aligncenter size-medium wp-image-84" title="Hidden images" src="https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg?w=300&#038;h=230" alt="" width="300" height="230" srcset="https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg?w=300&amp;h=230 300w, https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg?w=600&amp;h=460 600w, https://nadinechicken.files.wordpress.com/2011/12/hidden-images.jpg?w=150&amp;h=115 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Locke, J., and Caradonio, J., 2008. What you are looking for hidden in plain sight. [electronic print] Available at: &lt;<a href="http://www.lioninoil.net/blog/category/graphic-design">http://www.lioninoil.net/blog/category/graphic-design</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>Many graphic designers also experiment with hiding hidden messages in their logo design. It is a way of engaging with the audience, providing stimulation and a reward for their effort.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg"><img loading="lazy" data-attachment-id="89" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/toblerone-logo/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg" data-orig-size="271,226" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Toblerone Logo" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg?w=271" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg?w=271" class="aligncenter size-full wp-image-89" title="Toblerone Logo" src="https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg?w=271&#038;h=226" alt="" width="271" height="226" srcset="https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg 271w, https://nadinechicken.files.wordpress.com/2011/12/toblerone-logo.jpg?w=150&amp;h=125 150w" sizes="(max-width: 271px) 100vw, 271px" /></a></p>
<p>Aguad, S., 2009. Toblerone Logo. [electronic print] Available at: &lt;<a href="http://noquedanblogs.com/geek/logo-toblerone/">http://noquedanblogs.com/geek/logo-toblerone/</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>Initially with the new design for the Museum of London the audience is likely to only appreciate the colour and flowing form. However the shapes used are not arbitary, they represent the changing shape of London throughout history.<sup>3</sup></p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg"><img loading="lazy" data-attachment-id="86" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/museum-of-london/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg" data-orig-size="320,260" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Museum of London" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg?w=320" class="aligncenter size-medium wp-image-86" title="Museum of London" src="https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg?w=300&#038;h=243" alt="" width="300" height="243" srcset="https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg?w=300&amp;h=243 300w, https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg?w=150&amp;h=122 150w, https://nadinechicken.files.wordpress.com/2011/12/museum-of-london.jpg 320w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Porter Bell, C., 2010. Museum of London Logo. [electronic print] Available at: &lt;<a href="http://lyndseycoles.files.wordpress.com/2009/09/logos3.jpg">http://lyndseycoles.files.wordpress.com/2009/09/logos3.jpg</a>&gt; [Accesed 17<sup>th</sup> December 2011].</p>
<p>Optical illusions such as the image below, which revels something different at different distances is something I wanted to consider with my design. By being able to read the hidden word at some distances but not others will engage the audience.</p>
<p><a href="https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg"><img loading="lazy" data-attachment-id="94" data-permalink="https://nadinechicken.wordpress.com/2011/12/17/visual-cryptography/you-are-close/" data-orig-file="https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg" data-orig-size="590,592" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="You Are Close" data-image-description="" data-medium-file="https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg?w=300" data-large-file="https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg?w=590" class="aligncenter size-medium wp-image-94" title="You Are Close" src="https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg?w=298&#038;h=300" alt="" width="298" height="300" srcset="https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg?w=298&amp;h=300 298w, https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg?w=150&amp;h=150 150w, https://nadinechicken.files.wordpress.com/2011/12/you-are-close.jpg 590w" sizes="(max-width: 298px) 100vw, 298px" /></a></p>
<p>Anon, n.d. You Are Close. [electronic print] Available at: &lt;<a href="http://www.moillusions.com/2010/07/are-you-far-or-close.html">http://www.moillusions.com/2010/07/are-you-far-or-close.html</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>In researching the history of visual crytpographic methods and looking at methods used by other designers to hide and reveal messages offered several alternatives to hide the message I wanted to among my design. By comparing to the work of others I am able to not only analyse which methods work effectively.</p>
<p>&#8212;</p>
<p>References</p>
<p>1. Anon. n.d. History of Magic Eye 3D Pictures. [online] Available at: &lt;<a href="http://www.magiceye3ds.com/history.aspx">http://www.magiceye3ds.com/history.aspx</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>2. Wikipedia, 2011. Visual Crytography. [online] Available at: &lt;<a href="http://en.wikipedia.org/wiki/Visual_cryptography">http://en.wikipedia.org/wiki/Visual_cryptography</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
<p>3. Anon. n.d. Coley Porter Bell. [online] Available at: &lt;<a href="http://www.cpb.co.uk/">http://www.cpb.co.uk/</a>&gt; [Accessed 17<sup>th</sup> December 2011].</p>
]]></html><thumbnail_url><![CDATA[https://nadinechicken.files.wordpress.com/2011/12/normal-viewing.gif?w=300&fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[]]></thumbnail_width><thumbnail_height><![CDATA[]]></thumbnail_height></oembed>