OSA's Digital Library

Optics Express

Optics Express

  • Editor: Michael Duncan
  • Vol. 12, Iss. 7 — Apr. 5, 2004
  • pp: 1258–1270

Secure information display with limited viewing zone by use of multi-color visual cryptography

Hirotsugu Yamamoto, Yoshio Hayasaki, and Nobuo Nishida  »View Author Affiliations

Optics Express, Vol. 12, Issue 7, pp. 1258-1270 (2004)

View Full Text Article

Enhanced HTML    Acrobat PDF (2304 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We propose a display technique that ensures security of visual information by use of visual cryptography. A displayed image appears as a completely random pattern unless viewed through a decoding mask. The display has a limited viewing zone with the decoding mask. We have developed a multi-color encryption code set. Eight colors are represented in combinations of a displayed image composed of red, green, blue, and black subpixels and a decoding mask composed of transparent and opaque subpixels. Furthermore, we have demonstrated secure information display by use of an LCD panel.

© 2004 Optical Society of America

OCIS Codes
(110.0110) Imaging systems : Imaging systems
(200.3050) Optics in computing : Information processing
(200.4660) Optics in computing : Optical logic

ToC Category:
Research Papers

Original Manuscript: February 11, 2004
Revised Manuscript: March 23, 2004
Published: April 5, 2004

Hirotsugu Yamamoto, Yoshio Hayasaki, and Nobuo Nishida, "Secure information display with limited viewing zone by use of multi-color visual cryptography," Opt. Express 12, 1258-1270 (2004)

Sort:  Journal  |  Reset  


  1. B. Javidi and J. L. Horner, �??Optical pattern recognition for validation and security verification,�?? Opt. Eng. 33, 1752-1756 (1994). [CrossRef]
  2. P. Refregier and B. Javidi,P. Refregier and B. Javidi, �??Optical image encryption based on input plane and Fourier plane random encoding,�?? Opt. Lett. 20, 767-769 (1995).,�?? Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  3. S. Fukushima, T. Kurokawa, and Y. Sakai, �??Image Encipherment Based on Optical Parallel Processing Using Spatial Light Modulators,�?? IEEE Trans. Photonics Tech. Lett. 3, 1133-1135 (1991). [CrossRef]
  4. J. F. Heanue, M. C. Bashaw, and L. Hesselink, �??Encrypted holographic data storage based on orthogonal-phase-code multiplexing,�?? Appl. Opt. 34, 6012-6015 (1995). [CrossRef] [PubMed]
  5. R. K. Wang, I. A. Watson, and C. Chatwin, �??Random phase encoding for optical security,�?? Opt. Eng. 35, 2464-2469 (1996). [CrossRef]
  6. N. Yoshikawa, M. Itoh, and T. Yatagai, �??Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography,�?? Opt. Lett. 23, 1483-1485 (1998). [CrossRef]
  7. P. C. Mogensen and J. Glückstad, �??Phase-only optical encryption,�?? Opt. Lett. 25, 566-568 (2000). [CrossRef]
  8. T. Sasaki, H. Togo, J. Tanida, and Y. Ichioka, �??Stream cipher based on pseudorandom number generation with optical affine transformation,�?? Appl. Opt. 39, 2340-2346 (2000). [CrossRef]
  9. Z. Zalevsky, D. Mendlovic, U. Levy, and G. Shabtay, �??A new optical random coding technique for security systems,�?? Opt. Commun. 180, 15-20 (2000). [CrossRef]
  10. G. Unnikrishnan, M. Pohit, and K. Singh, �??A polarization encoded optical encryption system using ferroelectric spatial light modulator,�?? Opt. Commun. 185, 25-31 (2000). [CrossRef]
  11. P. C. Mogensen and J. Glückstad, �??Phase-only optical decryption of a fixed mask,�?? Appl. Opt. 40, 1226-1235 (2001). [CrossRef]
  12. J. Rosen and B. Javidi, �??Hidden images in halftone pictures,�?? Appl. Opt. 40, 3346-3353 (2001). [CrossRef]
  13. J. Ohtsubo and A. Fujimoto, �??Practical image encryption and decryption by phase-coding technique for optical security systems,�?? Appl. Opt. 41, 4848-4855 (2002). [CrossRef] [PubMed]
  14. B. Javidi and T. Nomura, �??Securing information by use of digital holography,�?? Opt. Lett. 25, 28-30 (2000). [CrossRef]
  15. S. Lai and M. A. Neifeld, �??Digital wavefront reconstruction and its application to image encryption,�?? Opt. Commun. 178, 283-289 (2000). [CrossRef]
  16. E. Tajahuerce and B. Javidi, �??Encrypting three-dimensional information with digital holography,�?? Appl. Opt. 39, 6595-6601 (2000). [CrossRef]
  17. X. Peng, L. Yu, and L. Cai, �??Double-lock for image encryption with virtual optical wavelength,�?? Opt. Express 10, 41-45 (2002), <a href=" http://www.opticsexpress.org/abstract.cfm?URI=OPEX-10-1-41">http://www.opticsexpress.org/abstract.cfm?URI=OPEX-10-1-41</a> [CrossRef] [PubMed]
  18. O. Matoba and B. Javidi, �??Optical retrieval of encrypted digital holograms for secure real-time display,�?? Opt. Lett. 27, 321-323 (2002). [CrossRef]
  19. L. Yu, X. Peng, and L. Cai, �??Parameterized multi-dimensional data encryption by digital optics,�?? Opt. Commun. 203, 67-77 (2002). [CrossRef]
  20. O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and B. Javidi, �??Real-time three-dimensional object reconstruction by use of a phase-encoded digital hologram,�?? Appl. Opt. 41, 6187-6192 (2002). [CrossRef] [PubMed]
  21. K. Aizawa and K. Kakami, �??Ubiquitous display controlled by mobile terminals,�?? IEICE Trans. Commun. E85-B, 2214-2217 (2002), <a href= " http://search.ieice.org/2002/files/e000b10.htm#e85-b,10,2214" >http://search.ieice.org/2002/files/e000b10.htm#e85-b,10,2214</a>
  22. M. G. Kuhn, �??Optical Time-Domain Eavesdropping Risks of CRT Displays,�?? in 2002 IEEE Symposium on Security and Privacy (IEEE Computer Society, Los Alamitos, California, 2002), pp. 3-18, <a href= " http://computer.org/proceedings/sp/1543/1543toc.htm">http://computer.org/proceedings/sp/1543/1543toc.htm</a>
  23. H. Yamamoto, Y. Hayasaki, and N. Nishida, �??Securing information display by use of visual cryptography,�?? Opt. Lett. 28, 1564-1566 (2003).
  24. M. Naor and A. Shamir, �??Visual Cryptography,�?? in Advances in Cryptography - EUROCRYPT�??94, Vol 950 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1994), pp. 1-12. [CrossRef] [PubMed]
  25. J. Tanida and Y. Ichioka, �??Optical logic array processor using shadowgrams,�?? J. Opt. Soc. Am. 73, 800-809 (1983).
  26. S. Droste, �??New Results on Visual Cryptography,�?? in Advances in Cryptography - EUROCRYPT '96, Vol. 1109 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1996), pp. 401-415. [CrossRef]
  27. C. Blundo, A. De Santis, and M. Naor, �??Visual cryptography for grey level images�??, Information Processing Letters 75, 255-259 (2000).
  28. H. Koga, M. Iwamoto, and H. Yamamoto, �??An analytic construction of the visual secret sharing scheme for color images,�?? IEICE Trans. Fundamentals. E84-A, 262-272 (2001). [CrossRef]
  29. R. Hwang and C. Chang, �??Hiding a picture in two pictures,�?? Opt. Eng. 40, 342-351 (2001).
  30. C.-C. Wang, S.-C. Tai, and C.-S. Yu, �??Repeating image watermarking technique by the visual cryptography,�?? IEICE Trans. Fundamentals. E83-A, 1589-1598 (2000), <a href= " http://search.ieice.org/2000/files/e000a08.htm#e83-a,8,1589">http://search.ieice.org/2000/files/e000a08.htm#e83-a,8,1589</a> [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited