SciELO - Scientific Electronic Library Online

 
vol.11 número4RSVP Extensions for Seamless Handoff in Heterogeneous WLAN/WiMAX NetworksBilateral Waveform Similarity Overlap-and-Add Based Packet Loss Concealment for Voice over IP índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • No hay artículos similaresSimilares en SciELO

Compartir


Journal of applied research and technology

versión On-line ISSN 2448-6736versión impresa ISSN 1665-6423

J. appl. res. technol vol.11 no.4 Ciudad de México ago. 2013

 

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

 

X. W. Li1, D. H. Kim1, S. J. Cho2, S. T. Kim*1

 

1 Department of information and communications, Engineering Pukyong National University Daeyeon 3-Dong, Pusan 599-1, Korea. *setakim@pknu.ac.kr.

2 Department of Applied Mathematics Pukyong National University Daeyeon 3-Dong, Pusan 599-1, Korea.

 

ABSTRACT

A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This proposed encryption algorithm combines the use of computational integral imaging (CII) and linear-complemented maximum-length cellular automata (LC-MLCA) to encrypt a 3D image. In the encryption process, the 2-D elemental image array (EIA) recorded by light rays of the 3-D image are mapped inversely through the lenslet array according the ray tracing theory. Next, the 2-D EIA is encrypted by LC-MLCA algorithm. When decrypting the encrypted image, the 2-D EIA is recovered by the LC-MLCA. Using the computational integral imaging reconstruction (CIIR) technique and a 3-D object is subsequently reconstructed on the output plane from the 2-D recovered EIA. Because the 2-D EIA is composed of a number of elemental images having their own perspectives of a 3-D image, even if the encrypted image is seriously harmed, the 3-D image can be successfully reconstructed only with partial data. To verify the usefulness of the proposed algorithm, we perform computational experiments and present the experimental results for various attacks. The experiments demonstrate that the proposed encryption method is valid and exhibits strong robustness and security.

Keywords: 3-D image encryption, computational integral imaging, 2-D elemental image array, linear-complemented maximum-length cellular automata.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

References

[1] M. Raza et al., "Lossless compression method for medical Image sequences using super-spatial structure prediction and Inter-frame coding," Journal of Applied Research and Technology, vol. 10, no. 4, pp. 618-628, 2012.         [ Links ]

[2] M. Thaduri et al., "An efficient VLSI implementation of IDEA encryption algorithm using VHDL," Microprocessors and Microsystems, vol. 29, pp. 1-7, 2005.         [ Links ]

[3] C. Cruz-Ramos et al., "A blind video watermarking scheme robust to frame attacks combined with mpeg2 compression," Journal of Applied Research and Technology, vol. 8, no. 3, pp. 323-339, 2010.         [ Links ]

[4] E. Elbaşi, "Robust mpeg watermarking in dwt four bands," Journal of Applied Research and Technology, vol. 10, no. 2, pp. 87-93, 2012.         [ Links ]

[5] X. J. Tong and M. G. Cui, "Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator," Signal Process, vol. 89, no. 4, pp. 480-491, 2009.         [ Links ]

[6] A. Palevičius et al., "Implementation of computer-generated holograms using 3D electron beam lithography," Journal of Vibroengineering, vol. 11, no. 3, pp. 407-414, 2009.         [ Links ]

[7] C. Lin et al., "Multiple image encryption based on Fourier hologram," Opt. Commun., vol. 285, no. 6, pp. 1023-1028, 2012.         [ Links ]

[8] W. M. Jin and C. J. Yan, "Optical image encryption based on multichannel FRT and double random phase encoding technique," Optik, vol. 118, no. 1, pp. 38-41, 2006.         [ Links ]

[9] X. G. Wang et al., "mage encryption based on extended fractional Fourier transform and digital holography technique," Opt. Commun., vol. 260, no. 2, pp. 449-453, 2006.         [ Links ]

[10] K. H. Tseng et al., "Calculation of modulation transfer function of an optical system by using skew ray tracing," Transactions of the Canadian Society for Mechanical Engineering, vol. 33, no. 3, pp. 429-442, 2009.         [ Links ]

[11] G. Lippmann, "La Photographers integrale," Academie des Sciences, vol. 146, pp. 446-451, 1908.         [ Links ]

[12] J. H. Park et al., "Recent progress in three-dimensional information processing based on integral imaging," Appl. Opt. vol. 48, no. 34, pp. 77-94, 2009.         [ Links ]

[13] X. W. Li et al., "Computational integral imaging based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata," Multidimensional Systems and Signal processing. (2012) doi: 10.1007/s11045-012-0203-6 (To be published).         [ Links ]

[14] Y. R. Piao et al., "Enhanced orthoscopic integral imaging reconstruction using moving pixel mapping," Opt Laser Technol., vol. 50, no. 6, pp. 862-868, 2012.         [ Links ]

[15] D. C. Hwang et al., "A novel three-dimensional digital watermarking scheme basing on integral imaging," Opt Commun., vol. 277, no. 1, pp. 40-49, 2007.         [ Links ]

[16] O. E. Lafe, "Data compression and encryption using cellular automata transforms," Engineering Applications of Artificial Intelligence, vol. 10, no.6, pp. 581-591, 1997.         [ Links ]

[17] X. W. Li et al., "Watermarking based on complemented MLCA and 2D CAT," KIMICS, vol. 9, no. 2, pp. 212-216, 2010.         [ Links ]

[18] N. Boutana et al., "Microstructural modeling of cold creep / fatigue in near alpha titanium alloys using cellular automata method," Transactions of the Canadian Society for Mechanical Engineering, vol. 32, no. 2, pp. 195-213, 2008.         [ Links ]

[19] S. J. Cho et al., "Computing phase shifts of maximum-length 90/150 cellular automata sequence," Cellular Automata, 6th International Conference on Cellular Automata for Research and Industry, ACRI 2004, Amsterdam, Netherlands, 2004, pp. 31-39.         [ Links ]

[20] T. J. Chang et al., "Maximum length cellular automaton sequences and its application," Signal Processing, vol. 56, no. 2, pp. 199-203, 1997.         [ Links ]

[21] X. W. Li et al., "Image watermarking algorithm using 2d cellular automata transform," International Journal of Innovative Computing, Information and Control, vol. 8, no. 10, pp. 7249-7262, 2012.         [ Links ]

Creative Commons License Todo el contenido de esta revista, excepto dónde está identificado, está bajo una Licencia Creative Commons