Skip to main content

Visual Cryptography Based on Optical Image Projection

  • Conference paper
  • First Online:
Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 152))

  • 948 Accesses

Abstract

A visual cryptography scheme based on optical image projection is proposed in this paper. Initially the secret image is split into two shares. Then, such digital images are constructed in share’s planes that their projections in the projection screen would correspond to each of the appropriate shares. Geometrical parameters describing the location of shares’ planes and focus points of projectors are additional security parameters of the encoded image. Direct overlapping of the reconstructed shares does not leak any information on the encrypted image. The original image can be interpreted by a naked eye when appropriate projectors are placed at predefined locations of the geometrical setup.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor M, Shamir A (1995) Visual cryptography. LNCS 950:1–12

    MathSciNet  Google Scholar 

  2. Nakajima M, Yamaguchi Y (2002) Extended visual cryptography. In: Conference Proceedings 10th international conference on computer graphics, visualization and computer vision, vols I and II, University of West, Bohemia pp 303–310

    Google Scholar 

  3. Leung BW, Ng FY, Wong DS (2009) On the security of a visual cryptography scheme for color images. Pattern Recogn 42(5):929–940

    Article  Google Scholar 

  4. Chen SK (2007) A visual cryptography based system for sharing multiple secret images. In: Proceedings of the 7th WSEAS international conference on signal processing, computational geometry and artificial vision (ISCGAV’-07) pp 113–118

    Google Scholar 

  5. Blundo C, De Santis A, Naor M (2000) Visual cryptography for grey level images. Inform Process Lett 75(6):255–259

    Article  MathSciNet  Google Scholar 

  6. Cimato S, De Prisco R, De Santis A (2007) Colored visual cryptography without color darkening. Theoret Comput Sci 374(1–3):261–276

    Article  MathSciNet  Google Scholar 

  7. Hu SM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45

    Article  MathSciNet  Google Scholar 

  8. Blundo C, Climato S, De Santis A (2006) Visual cryptography schemes with optimal pixel expansion. Theoret Comput Sci 369(1):169–182

    Article  MathSciNet  Google Scholar 

  9. Shyu SH (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031

    Article  Google Scholar 

  10. Wu HC, Wang HC, Tsai CS (2006) Multiple image sharing based on colour visual cryptography. Imaging Sci J 54(3):164–177

    Article  Google Scholar 

  11. Shou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

  12. Yang CN, Chen TS (2008) Colored visual cryptography scheme based on additive color mixing. Pattern Recogn 41(10):3114–3129

    Article  Google Scholar 

  13. Hajiabolhassan H, Cheraghi A (2010) Bounds for visual cryptography schemes. Discret Appl Math 158(6):659–665

    Article  MathSciNet  Google Scholar 

  14. Liu F,Wu CK, Lin XJ () A new definition of the contrast of visual cryptography scheme. Inform Process Lett 110(7):241–246

    Google Scholar 

  15. Wang D, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. Pattern Recogn 42(11):3071–3082

    Article  Google Scholar 

  16. Lee KH, Chiu PL (2011) A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images. Optics Commun 284(12):2730–2741

    Article  Google Scholar 

  17. Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42(7):1582–1596

    Article  Google Scholar 

  18. Kobayashi AS (1993) Handbook on experimental mechanics, 2nd edn. Bethel, SEM

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rita Palivonaite .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Palivonaite, R., Aleksa, A., Ragulskis, M. (2013). Visual Cryptography Based on Optical Image Projection. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3535-8_37

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3534-1

  • Online ISBN: 978-1-4614-3535-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics