Such encrypted volumes are not hidden. An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.
For example, image thumbnails might be created and saved by the other operating system. Or, the contents of files might be indexed by the other operating system.