Visual Cryptography Based on Optical Image Projection

  • Rita PalivonaiteEmail author
  • Algiment Aleksa
  • Minvydas Ragulskis
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 152)


A visual cryptography scheme based on optical image projection is proposed in this paper. Initially the secret image is split into two shares. Then, such digital images are constructed in share’s planes that their projections in the projection screen would correspond to each of the appropriate shares. Geometrical parameters describing the location of shares’ planes and focus points of projectors are additional security parameters of the encoded image. Direct overlapping of the reconstructed shares does not leak any information on the encrypted image. The original image can be interpreted by a naked eye when appropriate projectors are placed at predefined locations of the geometrical setup.


Visual Cryptography Scheme Optical Image Projection Secret Image Additional Security Parameter Shared Plan 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Naor M, Shamir A (1995) Visual cryptography. LNCS 950:1–12MathSciNetGoogle Scholar
  2. 2.
    Nakajima M, Yamaguchi Y (2002) Extended visual cryptography. In: Conference Proceedings 10th international conference on computer graphics, visualization and computer vision, vols I and II, University of West, Bohemia pp 303–310Google Scholar
  3. 3.
    Leung BW, Ng FY, Wong DS (2009) On the security of a visual cryptography scheme for color images. Pattern Recogn 42(5):929–940CrossRefGoogle Scholar
  4. 4.
    Chen SK (2007) A visual cryptography based system for sharing multiple secret images. In: Proceedings of the 7th WSEAS international conference on signal processing, computational geometry and artificial vision (ISCGAV’-07) pp 113–118Google Scholar
  5. 5.
    Blundo C, De Santis A, Naor M (2000) Visual cryptography for grey level images. Inform Process Lett 75(6):255–259MathSciNetCrossRefGoogle Scholar
  6. 6.
    Cimato S, De Prisco R, De Santis A (2007) Colored visual cryptography without color darkening. Theoret Comput Sci 374(1–3):261–276MathSciNetCrossRefGoogle Scholar
  7. 7.
    Hu SM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45MathSciNetCrossRefGoogle Scholar
  8. 8.
    Blundo C, Climato S, De Santis A (2006) Visual cryptography schemes with optimal pixel expansion. Theoret Comput Sci 369(1):169–182MathSciNetCrossRefGoogle Scholar
  9. 9.
    Shyu SH (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031CrossRefGoogle Scholar
  10. 10.
    Wu HC, Wang HC, Tsai CS (2006) Multiple image sharing based on colour visual cryptography. Imaging Sci J 54(3):164–177CrossRefGoogle Scholar
  11. 11.
    Shou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453CrossRefGoogle Scholar
  12. 12.
    Yang CN, Chen TS (2008) Colored visual cryptography scheme based on additive color mixing. Pattern Recogn 41(10):3114–3129CrossRefGoogle Scholar
  13. 13.
    Hajiabolhassan H, Cheraghi A (2010) Bounds for visual cryptography schemes. Discret Appl Math 158(6):659–665MathSciNetCrossRefGoogle Scholar
  14. 14.
    Liu F,Wu CK, Lin XJ () A new definition of the contrast of visual cryptography scheme. Inform Process Lett 110(7):241–246Google Scholar
  15. 15.
    Wang D, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. Pattern Recogn 42(11):3071–3082CrossRefGoogle Scholar
  16. 16.
    Lee KH, Chiu PL (2011) A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images. Optics Commun 284(12):2730–2741CrossRefGoogle Scholar
  17. 17.
    Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42(7):1582–1596CrossRefGoogle Scholar
  18. 18.
    Kobayashi AS (1993) Handbook on experimental mechanics, 2nd edn. Bethel, SEMGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Rita Palivonaite
    • 1
    Email author
  • Algiment Aleksa
    • 1
  • Minvydas Ragulskis
    • 1
  1. 1.Research Group for Mathematical and Numerical Analysis of Dynamical Systems, Department of Mathematical Research in SystemsKaunas University of TechnologyKaunasLithuania

Personalised recommendations