Abstract
This paper first proposes a design for privacy monitor that only users at the right angle viewpoint can see the screen clearly, while users at a large enough deviated angle viewpoint cannot see any useful information on the screen. The space where users from that viewpoint can see the screen is called visible space in this paper. Then the visible space of the proposed privacy monitor is completely characterized for IPS screen. By adjusting the distance between the two liquid crystal layers, the size of the visible space can be controlled in such a way that larger distance will result in a smaller visible space, while smaller distance will result in a larger visible space.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419
Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. In: Jiang, T., Lee, D.T. (eds.) COCOON 1997. LNCS, vol. 1276, pp. 176–185. Springer, Heidelberg (1997). doi:10.1007/BFb0045084
Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)
Bose, M., Mukerjee, R.: Optimal (2, n) visual cryptographic schemes. Des. Codes Crypt. 40, 255–267 (2006)
Bose, M., Mukerjee, R.: Optimal (k, n) visual cryptographic schemes for general k. Des. Codes Crypt. 55, 19–35 (2010)
Guo, T., Liu, F., Wu, C.K., Ren, Y.W., Wang, W.: On \((k, n)\) visual cryptography scheme with \(t\) essential parties. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 56–68. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04268-8_4
Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86, 2094–2109 (2013)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)
Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999)
Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Des. Codes Crypt. 24, 255–278 (2001)
Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Crypt. 71, 153–162 (2014)
Liu, F., Guo, T., Wu, C.K., Qian, L.N.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23, 331–342 (2012)
D’Arco, P., Prisco, R.: Secure two-party computation: a visual way. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 18–38. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04268-8_2
Shyu, S.J., Jiang, H.W.: General constructions for threshold multiple-secret visual cryptographic schemes. IEEE Trans. Inf. Forensics Secur. 8(5), 733–743 (2013)
Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3), 960–969 (2011)
Biham, E., Itzkovitz, A.: Visual cryptography with polarization. In: The Dagstuhl seminar on Cryptography, and the RUMP Session of CRYPTO 1998, September 1997
Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: A polarisation based visual crypto system and its secret sharing schemes (2002). http://eprint.iacr.org
Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Crypt. 37, 169–186 (2005)
Schrijen, G., Tuyls, P., Kevenaar, T., Johnson, M.: Secure visual message communication method and device. In: US20050117748 (2004)
Evans, A., Tillin, M., Walton, E.: Display having particular polarisation modifying layer. In: US7400377 (2008)
Liu, F., Guo, T., Wu, C.K., Yang, C.-N.: Flexible visual cryptography scheme without distortion. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 211–227. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32205-1_18
Rajput, S.K., Nishchal, N.K.: Fresnel domain nonlinear optical image encryption scheme based on Gerchberg—Saxton phase-retrieval algorithm. Appl. Opt. 53(3), 418–425 (2014)
Acknowledgements
This work was supported by the “Fundamental Research Funds for the Central Universities” grant No. 3262016T47 and the NSFC grant No. 61671448 and the key project of NFSC grant No. U1536207 and the “Strategic Priority Research Program” of the Chinese Academy of Sciences No. XDA06010701. Besides, many thanks to the handling editor and anonymous reviewers for their valuable comments that help us to improve this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Guo, T., Liu, F., Wang, W., Yu, B. (2017). Privacy Monitor. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-53465-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53464-0
Online ISBN: 978-3-319-53465-7
eBook Packages: Computer ScienceComputer Science (R0)