OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 19, Iss. 23 — Nov. 7, 2011
  • pp: 22709–22722

Fourier-based automatic alignment for improved visual cryptography schemes

Jacques Machizaud, Pierre Chavel, and Thierry Fournel  »View Author Affiliations

Optics Express, Vol. 19, Issue 23, pp. 22709-22722 (2011)

View Full Text Article

Enhanced HTML    Acrobat PDF (5273 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



In Visual Cryptography, several images, called “shadow images”, that separately contain no information, are overlapped to reveal a shared secret message. We develop a method to digitally register one printed shadow image acquired by a camera with a purely digital shadow image, stored in memory. Using Fourier techniques derived from Fourier Optics concepts, the idea is to enhance and exploit the quasi periodicity of the shadow images, composed by a random distribution of black and white patterns on a periodic sampling grid. The advantage is to speed up the security control or the access time to the message, in particular in the cases of a small pixel size or of large numbers of pixels. Furthermore, the interest of visual cryptography can be increased by embedding the initial message in two shadow images that do not have identical mathematical supports, making manual registration impractical. Experimental results demonstrate the successful operation of the method, including the possibility to directly project the result onto the printed shadow image.

© 2011 OSA

OCIS Codes
(100.0100) Image processing : Image processing
(100.2000) Image processing : Digital image processing
(330.5000) Vision, color, and visual optics : Vision - patterns and recognition
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

Original Manuscript: July 25, 2011
Revised Manuscript: September 5, 2011
Manuscript Accepted: September 10, 2011
Published: October 26, 2011

Virtual Issues
Vol. 7, Iss. 1 Virtual Journal for Biomedical Optics

Jacques Machizaud, Pierre Chavel, and Thierry Fournel, "Fourier-based automatic alignment for improved visual cryptography schemes," Opt. Express 19, 22709-22722 (2011)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. M. Naor and A. Shamir, “Visual cryptography,” Lecture Notes in Computer Science 950(01), 1–12 (1995). [CrossRef]
  2. O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Opt. Lett. 12(6), 377–379 (1987). [CrossRef] [PubMed]
  3. C. N. Yang, A. G. Peng, and T. S. Chen, “MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty,” Signal Process. 89(8), 1602–1624 (2009). [CrossRef]
  4. F. Liu, C. Wu, and X. Lin, “The alignment problem of visual cryptography schemes,” Designs Codes and Cryptography 50(2), 215–227 (2009). [CrossRef]
  5. D. Wang, L. Dong, and X. Li, “Towards Shift Tolerant Visual Secret Sharing Schemes,” Arxiv preprint arXiv:1004.2364.
  6. W. Yan, D. Jin, and M. Kankanhalli, “Visual cryptography for print and scan applications,” in Proceedings of the 2004 International Symposium on Circuits and Systems 5, Citeseer, 572–575 (2004).
  7. J. Weir and W.Q. Yan, “A comprehensive study of visual cryptography,” Transactions on data hiding and multimedia security V 6010, 70–105 (2010). [CrossRef]
  8. C. N. Yang and T. H. Chung, “A general multi-secret visual cryptography scheme,” Opt. Commun. 283(24), 4949–4960 (2010). [CrossRef]
  9. H. Yamamoto, Y. Hayasaki, and N. Nishida, “Securing information display by use of visual cryptography,” Opt. Lett. 28(17), 1564–1566 (2003). [CrossRef] [PubMed]
  10. H. Yamamoto, Y. Hayasaki, and N. Nishida, “Secure information display with limited viewing zone by use of multi-color visual cryptography,” Opt. Express 12(7), 1258–1270 (2004). [CrossRef] [PubMed]
  11. A. Maréchal and M. Francon, “Diffraction, structure des images. Influence de la cohérence de la lumière,” Masson, 1959.
  12. J. Goodman, “Introduction to Fourier optics,” Roberts & Company Publishers, (2005).
  13. L. G. Brown, “A survey of image registration techniques,” ACM Comput. Surv. 24(4), 325–376 (1992). [CrossRef]
  14. B. Zitova and J. Flusser, “Image registration methods: a survey,” Image and Vision Computing 21 (11), 977–1000 (2003). [CrossRef]
  15. Q. Tian and M. N. Huhns, “Algorithms for subpixel registration,” Computer Vision Graphics, and Image Processing 35, 220–233 (1986). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited