Browse > Article
http://dx.doi.org/10.3807/HKH.2007.18.3.202

Optical Visual Cryptography using the Characteristics of Spatial Light Modulation  

Yi, Sang-Yi (National Security Research Institute)
Wi, Sung-Min (College of Electronics and Information Engineering, Kwangwoon University)
Lee, Seung-Hyun (College of Electronics and Information Engineering, Kwangwoon University)
Yoo, Ji-Sang (College of Electronics and Information Engineering, Kwangwoon University)
Kim, Dong-Wook (College of Electronics and Information Engineering, Kwangwoon University)
Publication Information
Korean Journal of Optics and Photonics / v.18, no.3, 2007 , pp. 202-207 More about this Journal
Abstract
Optical visual cryptography (OVC) based on binary computer generated holograms (BCGH) is proposed. OVC used optics instead of human eyesight for decryption of visual cryptography (VC). As a result, it was possible to adapt cryptography to an optical system. However, it also had some difficulties because it did not overcome the existing problems of VC completely. This paper suggests a method of optical cryptography implementation based on the phase modulation characteristics of a liquid crystal display (LCD). The problems are evaluated by simulation. This system shows that the noise is reduced and resolution is improved compared with the conventional OVC.
Keywords
Binary computer generated hologram; Optical visual cryptography; Secret sharing; Spatial light modulator;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Ogata and K. Kurosawa, 'Optimum secret sharing scheme secure against cheating,' Proc. Eurocrypt'96, pp. 200-211, 1996   DOI
2 A. V. Oppenheim and J. S. Lim, 'The importance of phase in signal,' Appl. Opt., vol. 28, no. 6, pp. 1044-1046, 1989   DOI
3 A. Shamir, 'How to share secret,' CACM, vol. 22, pp. 612-613, 1979   DOI   ScienceOn
4 Sang-Yi Yi, Chung-Sang Ryu, Seung-Hyun Lee, and Eun- Soo Kim, 'Encryption of cell-oriented computer generated hologram by using visual cryptography,' CLEO/Pacific Rim'99, 1999   DOI
5 M. Naor and A. Shamir, 'Visual cryptography,' Proc. Eurocrypt'94, pp. 1-12, 1994   DOI
6 C. Blundo, A. De Santis, and D. Stinson, 'On the contrast in visual cryptography schemes,' ftp://theory.lcs.mit.edu/pub/tcryptol/96-13.ps, 1996
7 Sang-Yi Yi, Chung-Sang Ryu, Dea-Hyun Ryu, and Seung- Hyun Lee, 'Evaluation of correlation in optical encryption by using visual cryptography,' Proc. SPIE, vol. 4387, pp. 283-246, 2001   DOI
8 이상이, 이승현, 'BPEJTC를 이용한 광비쥬얼 크립토 그래피,' 전자공학회지, 제40SD권8호, pp. 47-55, 2003   과학기술학회마을
9 T. Katoh and H. Imai, 'On reducing the share size of visual secret sharing schemes,' Proc. ISITA, vol. 4, no. 1, pp. 67-70, 1996
10 T. Katoh and H. Imai, 'On human identification schemes using visual secret sharing,' IEICE Technical Report IT95-44, 1995