OSA's Digital Library

Optics Letters

Optics Letters


  • Vol. 28, Iss. 17 — Sep. 1, 2003
  • pp: 1564–1566

Securing information display by use of visual cryptography

Hirotsugu Yamamoto, Yoshio Hayasaki, and Nobuo Nishida  »View Author Affiliations

Optics Letters, Vol. 28, Issue 17, pp. 1564-1566 (2003)

View Full Text Article

Acrobat PDF (707 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We propose a secure display technique based on visual cryptography. The proposed technique ensures the security of visual information. The display employs a decoding mask based on visual cryptography. Without the decoding mask, the displayed information cannot be viewed. The viewing zone is limited by the decoding mask so that only one person can view the information. We have developed a set of encryption codes to maintain the designed viewing zone and have demonstrated a display that provides a limited viewing zone.

© 2003 Optical Society of America

OCIS Codes
(110.0110) Imaging systems : Imaging systems
(200.3050) Optics in computing : Information processing
(200.3760) Optics in computing : Logic-based optical processing
(200.4660) Optics in computing : Optical logic
(220.4830) Optical design and fabrication : Systems design

Hirotsugu Yamamoto, Yoshio Hayasaki, and Nobuo Nishida, "Securing information display by use of visual cryptography," Opt. Lett. 28, 1564-1566 (2003)

Sort:  Author  |  Year  |  Journal  |  Reset


  1. B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
  3. R. K. Wang, I. A. Watson, and C. Chatwin, Opt. Eng. 35, 2464 (1996).
  4. P. C. Mogensen and J. Glückstad, Opt. Lett. 25, 566 (2000).
  5. P. C. Mogensen and J. Glückstad, Appl. Opt. 40, 1226 (2001).
  6. Z. Zalevsky, D. Mendlovic, U. Levy, and G. Shabtay, Opt. Commun. 180, 15 (2000).
  7. G. Unnikrishnan, M. Pohit, and K. Singh, Opt. Commun. 185, 25 (2000).
  8. B. Javidi and T. Nomura, Opt. Lett. 25, 28 (2000).
  9. O. Matoba and B. Javidi, Opt. Lett. 27, 321 (2002).
  10. M. G. Kuhn, in 2002 IEEE Symposium on Security and Privacy (IEEE Computer Society, Los Alamitos, California, 2002), pp. 3–18, http://computer.org/proceedings/sp/1543/1543toc.htm.
  11. M. Naor and A. Shamir, in Advances in Cryptography—EUROCRYPT'94, Vol. 950 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1994), pp. 1–12.
  12. S. Droste, in Advances in Cryptography—CRYPT'96, Vol. 1109 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1996), pp. 401–415.
  13. H. Yamamoto, M. Kouno, S. Muguruma, Y. Hayasaki, Y. Nagai, Y. Shimizu, and N. Nishida, Appl. Opt. 41, 6907 (2002).
  14. A. Shamir, Commun. ACM 22, 612 (1979).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited