3 POSSIBLE SCENARIOS IN
EDUCATION
Teaching of counting has created significant
difficulties to both teachers and young kids. Class
size is one of the major barriers to effective
instruction. As the lowering cost of the computer
hardware and widely spread of the Internet, pupils
might have their own laptop personal computers for
homework and instruction, especially in some highly
computerized cities or countries. A well-designed
pedagogy, such as Computer-Assisted Instruction
(CAI), can make the instruction most effective.
In the information security field, visual
cryptography is used as one of the technologies to
implement the topics about watermarking,
information hiding and information sharing. It can
generate shares, stack them together, the secret
information will automatically show up and
recognize by human eyes. Therefore, it is a good
tool to be used to practice counting for kids.
For example, the sum of two numbers can be
treated as a secret number, the generated share 1 and
share 2 can be treated as the summand and the
addend. When kids are doing their counting
exercises, they can select one number share,
dragging it to another share, stacking them together,
magically, the number on these two meaningful
shares disappears, the correct answer shows up on
the stacked shares. When you shift these two shares
a little bit, pixels are not stacked properly, the
answer will fade away. It can stimulate the curiosity
of the kids and increase the fun of learning.
Figure 4 and Figure 5 are examples of the sum
and the product of two numbers, respectively.
(a) Share image 1
(b) Share image 2
(c) stacked image
Figure 4: Sum of 3 and 5.
(a) Share image 1
(b) Share image 2
(c) stacked image
Figure 5: Product of 4 and 6.
A set of programming exercises have been
designed with help of computer assisted instruction.
The demo system can pose questions to students,
return feedbacks, and select additional questions
based on the kids' responses. By using this system,
kids can practice counting and learn the basic
principle of the visual cryptography.
4 CONCLUSIONS
Visual Cryptography exploits the characteristics of
human visual system to decrypt the overlapping
images without mass and complicated computations.
Traditionally, visual cryptography is used as one of
the technologies to implement the topics about
watermarking, information hiding and information
sharing. In this paper, we propose a teaching system
which uses the technique of visual cryptography to
teach young kids counting. The technology of visual
cryptography can be used to generate numbers, stack
them together, the result will automatically show up
and recognize by human eyes. It can stimulate the
curiosity of the kids and increase the fun of learning.
ACKNOWLEDGEMENTS
This work was supported in part by a grant from
National Science Council of the Republic of China
under the project NSC96-2221-E-032-027.
REFERENCES
Ateniese, G., C. Blundo, A. De Santis, and D. R. Stinson,
1996, “Visual Cryptography for General Access
Structures “, Information and Computation, 129,
pp.86-106.
Ateniese, G., C. Blundo, A. De Santis, and D. R. Stinson,
2001, “Extended Capabilities for Visual
Cryptography,” Theoretical Computer Science, Vol.
250, pp. 134-161.
Blundo, C. A. De Santis and D. R. Stinson, “On the
Contrast in Visual Cryptography schemes”,
ftp://theory.lcs.mit.edu/pub/tcrypto1/96-13.ps.
Y.C. Hou, 2003, “Visual Cryptography for Color Images,”
Pattern Recognition, Vol. 36, No. 7, pp. 1619-1629
Naor, M. and A. Shamir, 1995, “Visual Cryptography”,
Advances in Cryptology: Eurpocrypt’94, Springer-
Verlag, Berlin, pp. 1-12.
Naor, M. and A. Shamir, 1996, “Visual Cryptography II:
Improving the Contrast Via the Cover Base”. Theory
of Cryptography Library Report 96-07,
ftp://theory.lcs.mit.edu.tw/pub/cryptol/96-07.ps.
LEARNING WITH FUN - An Application of Visual Cryptography
459