Abstract

We propose a display technique that ensures security of visual information by use of visual cryptography. A displayed image appears as a completely random pattern unless viewed through a decoding mask. The display has a limited viewing zone with the decoding mask. We have developed a multi-color encryption code set. Eight colors are represented in combinations of a displayed image composed of red, green, blue, and black subpixels and a decoding mask composed of transparent and opaque subpixels. Furthermore, we have demonstrated secure information display by use of an LCD panel.

© 2004 Optical Society of America

PDF Article

References

  • View by:
  • |

  1. B. Javidi and J. L. Horner, �??Optical pattern recognition for validation and security verification,�?? Opt. Eng. 33, 1752-1756 (1994).
    [CrossRef]
  2. P. Refregier and B. Javidi,P. Refregier and B. Javidi, �??Optical image encryption based on input plane and Fourier plane random encoding,�?? Opt. Lett. 20, 767-769 (1995).,�?? Opt. Lett. 20, 767-769 (1995).
  3. S. Fukushima, T. Kurokawa, and Y. Sakai, �??Image Encipherment Based on Optical Parallel Processing Using Spatial Light Modulators,�?? IEEE Trans. Photonics Tech. Lett. 3, 1133-1135 (1991).
  4. J. F. Heanue, M. C. Bashaw, and L. Hesselink, �??Encrypted holographic data storage based on orthogonal-phase-code multiplexing,�?? Appl. Opt. 34, 6012-6015 (1995).
  5. R. K. Wang, I. A. Watson, and C. Chatwin, �??Random phase encoding for optical security,�?? Opt. Eng. 35, 2464-2469 (1996).
    [CrossRef]
  6. N. Yoshikawa, M. Itoh, and T. Yatagai, �??Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography,�?? Opt. Lett. 23, 1483-1485 (1998).
  7. P. C. Mogensen and J. Glückstad, �??Phase-only optical encryption,�?? Opt. Lett. 25, 566-568 (2000).
  8. T. Sasaki, H. Togo, J. Tanida, and Y. Ichioka, �??Stream cipher based on pseudorandom number generation with optical affine transformation,�?? Appl. Opt. 39, 2340-2346 (2000).
  9. Z. Zalevsky, D. Mendlovic, U. Levy, and G. Shabtay, �??A new optical random coding technique for security systems,�?? Opt. Commun. 180, 15-20 (2000).
    [CrossRef]
  10. G. Unnikrishnan, M. Pohit, and K. Singh, �??A polarization encoded optical encryption system using ferroelectric spatial light modulator,�?? Opt. Commun. 185, 25-31 (2000).
    [CrossRef]
  11. P. C. Mogensen and J. Glückstad, �??Phase-only optical decryption of a fixed mask,�?? Appl. Opt. 40, 1226-1235 (2001).
  12. J. Rosen and B. Javidi, �??Hidden images in halftone pictures,�?? Appl. Opt. 40, 3346-3353 (2001).
  13. J. Ohtsubo and A. Fujimoto, �??Practical image encryption and decryption by phase-coding technique for optical security systems,�?? Appl. Opt. 41, 4848-4855 (2002).
  14. B. Javidi and T. Nomura, �??Securing information by use of digital holography,�?? Opt. Lett. 25, 28-30 (2000).
  15. S. Lai and M. A. Neifeld, �??Digital wavefront reconstruction and its application to image encryption,�?? Opt. Commun. 178, 283-289 (2000).
    [CrossRef]
  16. E. Tajahuerce and B. Javidi, �??Encrypting three-dimensional information with digital holography,�?? Appl. Opt. 39, 6595-6601 (2000).
  17. X. Peng, L. Yu, and L. Cai, �??Double-lock for image encryption with virtual optical wavelength,�?? Opt. Express 10, 41-45 (2002), <a href=" http://www.opticsexpress.org/abstract.cfm?URI=OPEX-10-1-41">http://www.opticsexpress.org/abstract.cfm?URI=OPEX-10-1-41</a>
  18. O. Matoba and B. Javidi, �??Optical retrieval of encrypted digital holograms for secure real-time display,�?? Opt. Lett. 27, 321-323 (2002).
  19. L. Yu, X. Peng, and L. Cai, �??Parameterized multi-dimensional data encryption by digital optics,�?? Opt. Commun. 203, 67-77 (2002).
    [CrossRef]
  20. O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and B. Javidi, �??Real-time three-dimensional object reconstruction by use of a phase-encoded digital hologram,�?? Appl. Opt. 41, 6187-6192 (2002).
  21. K. Aizawa and K. Kakami, �??Ubiquitous display controlled by mobile terminals,�?? IEICE Trans. Commun. E85-B, 2214-2217 (2002), <a href= " http://search.ieice.org/2002/files/e000b10.htm#e85-b,10,2214" >http://search.ieice.org/2002/files/e000b10.htm#e85-b,10,2214</a>
  22. M. G. Kuhn, �??Optical Time-Domain Eavesdropping Risks of CRT Displays,�?? in 2002 IEEE Symposium on Security and Privacy (IEEE Computer Society, Los Alamitos, California, 2002), pp. 3-18, <a href= " http://computer.org/proceedings/sp/1543/1543toc.htm">http://computer.org/proceedings/sp/1543/1543toc.htm</a>
  23. H. Yamamoto, Y. Hayasaki, and N. Nishida, �??Securing information display by use of visual cryptography,�?? Opt. Lett. 28, 1564-1566 (2003).
  24. M. Naor and A. Shamir, �??Visual Cryptography,�?? in Advances in Cryptography - EUROCRYPT�??94, Vol 950 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1994), pp. 1-12.
  25. J. Tanida and Y. Ichioka, �??Optical logic array processor using shadowgrams,�?? J. Opt. Soc. Am. 73, 800-809 (1983).
  26. S. Droste, �??New Results on Visual Cryptography,�?? in Advances in Cryptography - EUROCRYPT '96, Vol. 1109 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1996), pp. 401-415.
  27. C. Blundo, A. De Santis, and M. Naor, �??Visual cryptography for grey level images�??, Information Processing Letters 75, 255-259 (2000).
    [CrossRef]
  28. H. Koga, M. Iwamoto, and H. Yamamoto, �??An analytic construction of the visual secret sharing scheme for color images,�?? IEICE Trans. Fundamentals. E84-A, 262-272 (2001).
  29. R. Hwang and C. Chang, �??Hiding a picture in two pictures,�?? Opt. Eng. 40, 342-351 (2001).
    [CrossRef]
  30. C.-C. Wang, S.-C. Tai, and C.-S. Yu, �??Repeating image watermarking technique by the visual cryptography,�?? IEICE Trans. Fundamentals. E83-A, 1589-1598 (2000), <a href= " http://search.ieice.org/2000/files/e000a08.htm#e83-a,8,1589">http://search.ieice.org/2000/files/e000a08.htm#e83-a,8,1589</a>

2002 IEEE Symp. on Security and Privacy (1)

M. G. Kuhn, �??Optical Time-Domain Eavesdropping Risks of CRT Displays,�?? in 2002 IEEE Symposium on Security and Privacy (IEEE Computer Society, Los Alamitos, California, 2002), pp. 3-18, <a href= " http://computer.org/proceedings/sp/1543/1543toc.htm">http://computer.org/proceedings/sp/1543/1543toc.htm</a>

Appl. Opt. (7)

IEEE Trans Photonics Tech. Lett. (1)

S. Fukushima, T. Kurokawa, and Y. Sakai, �??Image Encipherment Based on Optical Parallel Processing Using Spatial Light Modulators,�?? IEEE Trans. Photonics Tech. Lett. 3, 1133-1135 (1991).

IEICE Trans. Commun. (1)

K. Aizawa and K. Kakami, �??Ubiquitous display controlled by mobile terminals,�?? IEICE Trans. Commun. E85-B, 2214-2217 (2002), <a href= " http://search.ieice.org/2002/files/e000b10.htm#e85-b,10,2214" >http://search.ieice.org/2002/files/e000b10.htm#e85-b,10,2214</a>

IEICE Trans. Fundamentals (2)

H. Koga, M. Iwamoto, and H. Yamamoto, �??An analytic construction of the visual secret sharing scheme for color images,�?? IEICE Trans. Fundamentals. E84-A, 262-272 (2001).

C.-C. Wang, S.-C. Tai, and C.-S. Yu, �??Repeating image watermarking technique by the visual cryptography,�?? IEICE Trans. Fundamentals. E83-A, 1589-1598 (2000), <a href= " http://search.ieice.org/2000/files/e000a08.htm#e83-a,8,1589">http://search.ieice.org/2000/files/e000a08.htm#e83-a,8,1589</a>

Information Processing Letters (1)

C. Blundo, A. De Santis, and M. Naor, �??Visual cryptography for grey level images�??, Information Processing Letters 75, 255-259 (2000).
[CrossRef]

J. Opt. Soc. Am. (1)

Lecture Notes in Computer Science (2)

M. Naor and A. Shamir, �??Visual Cryptography,�?? in Advances in Cryptography - EUROCRYPT�??94, Vol 950 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1994), pp. 1-12.

S. Droste, �??New Results on Visual Cryptography,�?? in Advances in Cryptography - EUROCRYPT '96, Vol. 1109 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1996), pp. 401-415.

Opt. Commun. (4)

Z. Zalevsky, D. Mendlovic, U. Levy, and G. Shabtay, �??A new optical random coding technique for security systems,�?? Opt. Commun. 180, 15-20 (2000).
[CrossRef]

G. Unnikrishnan, M. Pohit, and K. Singh, �??A polarization encoded optical encryption system using ferroelectric spatial light modulator,�?? Opt. Commun. 185, 25-31 (2000).
[CrossRef]

S. Lai and M. A. Neifeld, �??Digital wavefront reconstruction and its application to image encryption,�?? Opt. Commun. 178, 283-289 (2000).
[CrossRef]

L. Yu, X. Peng, and L. Cai, �??Parameterized multi-dimensional data encryption by digital optics,�?? Opt. Commun. 203, 67-77 (2002).
[CrossRef]

Opt. Eng. (3)

B. Javidi and J. L. Horner, �??Optical pattern recognition for validation and security verification,�?? Opt. Eng. 33, 1752-1756 (1994).
[CrossRef]

R. K. Wang, I. A. Watson, and C. Chatwin, �??Random phase encoding for optical security,�?? Opt. Eng. 35, 2464-2469 (1996).
[CrossRef]

R. Hwang and C. Chang, �??Hiding a picture in two pictures,�?? Opt. Eng. 40, 342-351 (2001).
[CrossRef]

Opt. Express (1)

Opt. Lett (1)

P. C. Mogensen and J. Glückstad, �??Phase-only optical encryption,�?? Opt. Lett. 25, 566-568 (2000).

Opt. Lett. (5)

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics