Skip to main content

Privacy Monitor

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10082))

Included in the following conference series:

  • 1715 Accesses

Abstract

This paper first proposes a design for privacy monitor that only users at the right angle viewpoint can see the screen clearly, while users at a large enough deviated angle viewpoint cannot see any useful information on the screen. The space where users from that viewpoint can see the screen is called visible space in this paper. Then the visible space of the proposed privacy monitor is completely characterized for IPS screen. By adjusting the distance between the two liquid crystal layers, the size of the visible space can be controlled in such a way that larger distance will result in a smaller visible space, while smaller distance will result in a larger visible space.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419

    Google Scholar 

  2. Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. In: Jiang, T., Lee, D.T. (eds.) COCOON 1997. LNCS, vol. 1276, pp. 176–185. Springer, Heidelberg (1997). doi:10.1007/BFb0045084

    Chapter  Google Scholar 

  3. Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bose, M., Mukerjee, R.: Optimal (2, n) visual cryptographic schemes. Des. Codes Crypt. 40, 255–267 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  5. Bose, M., Mukerjee, R.: Optimal (k, n) visual cryptographic schemes for general k. Des. Codes Crypt. 55, 19–35 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  6. Guo, T., Liu, F., Wu, C.K., Ren, Y.W., Wang, W.: On \((k, n)\) visual cryptography scheme with \(t\) essential parties. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 56–68. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04268-8_4

    Chapter  Google Scholar 

  7. Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86, 2094–2109 (2013)

    Article  Google Scholar 

  8. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  9. Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  10. Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Des. Codes Crypt. 24, 255–278 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  11. Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Crypt. 71, 153–162 (2014)

    Article  MATH  Google Scholar 

  12. Liu, F., Guo, T., Wu, C.K., Qian, L.N.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23, 331–342 (2012)

    Article  Google Scholar 

  13. D’Arco, P., Prisco, R.: Secure two-party computation: a visual way. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 18–38. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04268-8_2

    Chapter  Google Scholar 

  14. Shyu, S.J., Jiang, H.W.: General constructions for threshold multiple-secret visual cryptographic schemes. IEEE Trans. Inf. Forensics Secur. 8(5), 733–743 (2013)

    Article  Google Scholar 

  15. Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3), 960–969 (2011)

    Article  Google Scholar 

  16. Biham, E., Itzkovitz, A.: Visual cryptography with polarization. In: The Dagstuhl seminar on Cryptography, and the RUMP Session of CRYPTO 1998, September 1997

    Google Scholar 

  17. Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: A polarisation based visual crypto system and its secret sharing schemes (2002). http://eprint.iacr.org

  18. Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Crypt. 37, 169–186 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  19. Schrijen, G., Tuyls, P., Kevenaar, T., Johnson, M.: Secure visual message communication method and device. In: US20050117748 (2004)

    Google Scholar 

  20. Evans, A., Tillin, M., Walton, E.: Display having particular polarisation modifying layer. In: US7400377 (2008)

    Google Scholar 

  21. Liu, F., Guo, T., Wu, C.K., Yang, C.-N.: Flexible visual cryptography scheme without distortion. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 211–227. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32205-1_18

    Chapter  Google Scholar 

  22. Rajput, S.K., Nishchal, N.K.: Fresnel domain nonlinear optical image encryption scheme based on Gerchberg—Saxton phase-retrieval algorithm. Appl. Opt. 53(3), 418–425 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the “Fundamental Research Funds for the Central Universities” grant No. 3262016T47 and the NSFC grant No. 61671448 and the key project of NFSC grant No. U1536207 and the “Strategic Priority Research Program” of the Chinese Academy of Sciences No. XDA06010701. Besides, many thanks to the handling editor and anonymous reviewers for their valuable comments that help us to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Teng Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Guo, T., Liu, F., Wang, W., Yu, B. (2017). Privacy Monitor. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53465-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53464-0

  • Online ISBN: 978-3-319-53465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics