Servicios Personalizados
Revista
Articulo
Indicadores
- Citado por SciELO
- Accesos
Links relacionados
- Similares en SciELO
Compartir
Journal of applied research and technology
versión On-line ISSN 2448-6736versión impresa ISSN 1665-6423
J. appl. res. technol vol.11 no.4 Ciudad de México ago. 2013
Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata
X. W. Li1, D. H. Kim1, S. J. Cho2, S. T. Kim*1
1 Department of information and communications, Engineering Pukyong National University Daeyeon 3-Dong, Pusan 599-1, Korea. *setakim@pknu.ac.kr.
2 Department of Applied Mathematics Pukyong National University Daeyeon 3-Dong, Pusan 599-1, Korea.
ABSTRACT
A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This proposed encryption algorithm combines the use of computational integral imaging (CII) and linear-complemented maximum-length cellular automata (LC-MLCA) to encrypt a 3D image. In the encryption process, the 2-D elemental image array (EIA) recorded by light rays of the 3-D image are mapped inversely through the lenslet array according the ray tracing theory. Next, the 2-D EIA is encrypted by LC-MLCA algorithm. When decrypting the encrypted image, the 2-D EIA is recovered by the LC-MLCA. Using the computational integral imaging reconstruction (CIIR) technique and a 3-D object is subsequently reconstructed on the output plane from the 2-D recovered EIA. Because the 2-D EIA is composed of a number of elemental images having their own perspectives of a 3-D image, even if the encrypted image is seriously harmed, the 3-D image can be successfully reconstructed only with partial data. To verify the usefulness of the proposed algorithm, we perform computational experiments and present the experimental results for various attacks. The experiments demonstrate that the proposed encryption method is valid and exhibits strong robustness and security.
Keywords: 3-D image encryption, computational integral imaging, 2-D elemental image array, linear-complemented maximum-length cellular automata.
DESCARGAR ARTÍCULO EN FORMATO PDF
References
[1] M. Raza et al., "Lossless compression method for medical Image sequences using super-spatial structure prediction and Inter-frame coding," Journal of Applied Research and Technology, vol. 10, no. 4, pp. 618-628, 2012. [ Links ]
[2] M. Thaduri et al., "An efficient VLSI implementation of IDEA encryption algorithm using VHDL," Microprocessors and Microsystems, vol. 29, pp. 1-7, 2005. [ Links ]
[3] C. Cruz-Ramos et al., "A blind video watermarking scheme robust to frame attacks combined with mpeg2 compression," Journal of Applied Research and Technology, vol. 8, no. 3, pp. 323-339, 2010. [ Links ]
[4] E. Elbaşi, "Robust mpeg watermarking in dwt four bands," Journal of Applied Research and Technology, vol. 10, no. 2, pp. 87-93, 2012. [ Links ]
[5] X. J. Tong and M. G. Cui, "Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator," Signal Process, vol. 89, no. 4, pp. 480-491, 2009. [ Links ]
[6] A. Palevičius et al., "Implementation of computer-generated holograms using 3D electron beam lithography," Journal of Vibroengineering, vol. 11, no. 3, pp. 407-414, 2009. [ Links ]
[7] C. Lin et al., "Multiple image encryption based on Fourier hologram," Opt. Commun., vol. 285, no. 6, pp. 1023-1028, 2012. [ Links ]
[8] W. M. Jin and C. J. Yan, "Optical image encryption based on multichannel FRT and double random phase encoding technique," Optik, vol. 118, no. 1, pp. 38-41, 2006. [ Links ]
[9] X. G. Wang et al., "mage encryption based on extended fractional Fourier transform and digital holography technique," Opt. Commun., vol. 260, no. 2, pp. 449-453, 2006. [ Links ]
[10] K. H. Tseng et al., "Calculation of modulation transfer function of an optical system by using skew ray tracing," Transactions of the Canadian Society for Mechanical Engineering, vol. 33, no. 3, pp. 429-442, 2009. [ Links ]
[11] G. Lippmann, "La Photographers integrale," Academie des Sciences, vol. 146, pp. 446-451, 1908. [ Links ]
[12] J. H. Park et al., "Recent progress in three-dimensional information processing based on integral imaging," Appl. Opt. vol. 48, no. 34, pp. 77-94, 2009. [ Links ]
[13] X. W. Li et al., "Computational integral imaging based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata," Multidimensional Systems and Signal processing. (2012) doi: 10.1007/s11045-012-0203-6 (To be published). [ Links ]
[14] Y. R. Piao et al., "Enhanced orthoscopic integral imaging reconstruction using moving pixel mapping," Opt Laser Technol., vol. 50, no. 6, pp. 862-868, 2012. [ Links ]
[15] D. C. Hwang et al., "A novel three-dimensional digital watermarking scheme basing on integral imaging," Opt Commun., vol. 277, no. 1, pp. 40-49, 2007. [ Links ]
[16] O. E. Lafe, "Data compression and encryption using cellular automata transforms," Engineering Applications of Artificial Intelligence, vol. 10, no.6, pp. 581-591, 1997. [ Links ]
[17] X. W. Li et al., "Watermarking based on complemented MLCA and 2D CAT," KIMICS, vol. 9, no. 2, pp. 212-216, 2010. [ Links ]
[18] N. Boutana et al., "Microstructural modeling of cold creep / fatigue in near alpha titanium alloys using cellular automata method," Transactions of the Canadian Society for Mechanical Engineering, vol. 32, no. 2, pp. 195-213, 2008. [ Links ]
[19] S. J. Cho et al., "Computing phase shifts of maximum-length 90/150 cellular automata sequence," Cellular Automata, 6th International Conference on Cellular Automata for Research and Industry, ACRI 2004, Amsterdam, Netherlands, 2004, pp. 31-39. [ Links ]
[20] T. J. Chang et al., "Maximum length cellular automaton sequences and its application," Signal Processing, vol. 56, no. 2, pp. 199-203, 1997. [ Links ]
[21] X. W. Li et al., "Image watermarking algorithm using 2d cellular automata transform," International Journal of Innovative Computing, Information and Control, vol. 8, no. 10, pp. 7249-7262, 2012. [ Links ]