Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Secure information display with limited viewing zone by use of multi-color visual cryptography

Open Access Open Access

Abstract

We propose a display technique that ensures security of visual information by use of visual cryptography. A displayed image appears as a completely random pattern unless viewed through a decoding mask. The display has a limited viewing zone with the decoding mask. We have developed a multi-color encryption code set. Eight colors are represented in combinations of a displayed image composed of red, green, blue, and black subpixels and a decoding mask composed of transparent and opaque subpixels. Furthermore, we have demonstrated secure information display by use of an LCD panel.

©2004 Optical Society of America

Full Article  |  PDF Article
More Like This
Securing information display by use of visual cryptography

Hirotsugu Yamamoto, Yoshio Hayasaki, and Nobuo Nishida
Opt. Lett. 28(17) 1564-1566 (2003)

Two-out-of-two color matching based visual cryptography schemes

Jacques Machizaud and Thierry Fournel
Opt. Express 20(20) 22847-22859 (2012)

Visual cryptography in single-pixel imaging

Shuming Jiao, Jun Feng, Yang Gao, Ting Lei, and Xiaocong Yuan
Opt. Express 28(5) 7301-7313 (2020)

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1.
Fig. 1. Schematic diagram of secure information display by use of visual cryptography.
Fig. 2.
Fig. 2. Limitation of the viewing zone by use of a decoding mask.
Fig. 3.
Fig. 3. Code set for encryption of eight-color images. The subpixel patterns of the displayed image are determined by the mask pattern and the pixel color. The white subpixels in the decoding mask pattern are transparent. R, G, B, C, M, Y, K, and W denote red, green, blue, cyan, magenta, yellow, black, and white, respectively, in the decoded image.
Fig. 4.
Fig. 4. Examples of encryption for multi-color images. (a) A decoding mask, (b) a displayed image, (c) the decoded image, and (d) an unsuccessfully decoded image obtained by mis-overlaying of the decoding mask. Images (e) and (f) are another displayed image and the decoded image by overlaying the same decoding mask in (a).
Fig. 5.
Fig. 5. Viewed images at the viewing position showing (a) red, green, and blue, (b) cyan, magenta, and yellow, (c) black, and (d) white.
Fig. 6.
Fig. 6. Viewed images at different viewing points: (a) viewed image from the left side; (b) viewed image from relatively close to the ideal viewing position; (c) viewed image from the right side; (d) viewed image at close range; and (e) viewed image at long range.

Tables (5)

Tables Icon

Table 1. Assignment of subpixel values for multiple colors

Tables Icon

Table 2. Permutations of the red, green, and blue subpixels

Tables Icon

Table 3. Frequencies of obtained pixels values in combinations of each decoding mask pattern with the displayed image patterns. There are 120 different combinations for each mask pattern.

Tables Icon

Table 4. Frequencies of obtained pixel values in combinations of the displayed pattern for case number w with the decoding mask patterns. There are 20 different combinations for each displayed image pattern.

Tables Icon

Table 5. Extracted code set to encrypt multi-color images, where w denotes the case number.

Equations (5)

Equations on this page are rendered with MathJax. Learn more.

D = ( d 11 d 12 d 13 d 21 d 22 d 23 ) , where { d 11 , d 12 , d 13 , d 21 , d 22 , d 23 } = { 0 , 0 , 0 , 1 , 2 , 4 } .
M = ( m 11 m 12 m 13 m 21 m 22 m 23 ) , where { m 11 , m 12 , m 13 , m 21 , m 22 , m 23 } = { 0 , 0 , 0 , 1 , 1 , 1 } .
M T D = i = 1 2 ( m i 1 d i 1 m i 1 d i 2 m i 1 d i 3 m i 2 d i 1 m i 2 d i 2 m i 2 d i 3 m i 3 d i 1 m i 3 d i 2 m i 3 d i 3 ) ,
M D T = j = 1 3 ( m 1 j d 1 j m 1 j d 2 j m 2 j d 1 j m 2 j d 2 j ) .
P 0 = Tr ( M T D ) = Tr ( M D T ) = i = 1 2 j = 1 3 d ij m ij ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.