SciELO - Scientific Electronic Library Online

 
vol.12 issue6Cyclostationarity-Based Detection of Randomly Arriving or Departing SignalsAn Unambiguous Tracking Scheme Using Partial-Pulses for BOC Signals author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Journal of applied research and technology

On-line version ISSN 2448-6736Print version ISSN 1665-6423

J. appl. res. technol vol.12 n.6 Ciudad de México Dec. 2014

 

Three-Dimensional Image Security System Combines the Use of Smart Mapping Algorithm and Fibonacci Transformation Technique

 

Xiao-Wei Li1, Sung-Jin Cho2, In-Kwon Lee3 and Seok-Tae Kim *4

 

1,4 Department of information and communications, Engineering, Pukyong National University, Daeyeon 3-Dong, Pusan 599-1, Korea. *setakim@pknu.ac.kr

2 Department of Applied Mathematics, Pukyong National University, Daeyeon 3-Dong, Pusan 599-1, Korea.

3 Department of Computer Science, Yonsei University 50 Yonsei-ro, Seodaemun-gu, Seoul 120-749, Korea.

 

Abstract

In this paper, a three-dimensional (3D) image security system combines the use of the smart pixel mapping (SPM) algorithm and the Fibonacci transformation technique is proposed. In order to reconstruct orthoscopic 3D images with improved image quality, a smart pixel mapping process is adopted. Based on the SPM-based computational integral imaging (CII) system, the depth-converted elemental image array (EIA) is obtained for increasing the quality of the reconstructed image. In the encryption process, the depth-converted EIA is scrambled by the Fibonacci transformation (FT) algorithm. Meanwhile, the computational integral imaging reconstruction (CIIR) technique is used to reconstruct the 3D image in the image reconstruction process. Compared with conventional CII-based 3D image encryption methods, the proposed method enable us to reconstruct high-resolution orthoscopic 3D images at long distance. To demonstrate the effectiveness of the proposed method, some numerical experiments are made to test the validity and the capability of the proposed 3D image security system.

Keywords: 3D image security; smart pixel mapping; computational integral imaging; depth-converted EIA.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

References

[1] C. Cruz-Ramos et al., "A blind video watermarking scheme robust to frame attacks combined with MPEG2 compression," J. Appl. Res. Technol., vol. 8, no. 3, pp. 323-339, 2010.         [ Links ]

[2] P. Refregier and B. Javidi, "Optical image encryption based on input plane and the Fourier plane random encoding," Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995.         [ Links ]

[3] G. Lippmann, "La photographers integrale," Academie des Sciences, vol. 146, pp. 446-451, 1908.         [ Links ]

[4] A. Stern and B. Javidi, "Three-dimensional image sensing, visualization and processing using Integral Imaging," Proceedings of the IEEE, vol. 94, no. 3, pp. 591-607, 2006.         [ Links ]

[5] S. H. Hong and B. Javidi, "Improved resolution 3D object reconstruction using computational integral imaging with time multiplexing," Opt. Express, vol. 12, no. 19, pp. 4579-4588, 2004.         [ Links ]

[6] L. Park et al., "Recent progress in three-dimensional information processing based on integral imaging," Appl. Optics, vol. 48, no. 34, pp. H77-H94, 2009.         [ Links ]

[7] S. H. Hong et al., "Three-dimensional volumetric object reconstruction using computational integral imaging," Opt. Express, vol. 12, no. 3, pp. 483-491, 2004.         [ Links ]

[8] X. W. Li et al., "Optical 3D watermark based digital image watermarking for telemedicine," Opt. Laser. Eng., vol. 51, no. 12, pp. 1310-1320, 2013.         [ Links ]

[9] D. H. Shin et al., "Occlusion removal method of partially occluded 3D object using sub-image block matching in computational integral imaging," Opt. Express, vol. 16, no. 21, pp. 16294-16304, 2008.         [ Links ]

[10] Y. R. Piao et al., "Robust image encryption by combining the use of integral imaging and pixel scrambling techniques," Opt. Laser. Eng., vol. 47, no. 11, pp. 1273-1281, 2009.         [ Links ]

[11] D. H. Kim et al., "3D image encryption using integral imaging scheme and MLCA technology," Applied Mechanics and Materials, vol. 284-287, pp. 2955-2960, 2013.         [ Links ]

[12] X. W. Li et al., "Integral imaging based 3-D image encryption algorithm combined with cellular automata," J. Appl. Res. Technol., vol. 11, no. 4, pp. 549-558, 2013.         [ Links ]

[13] D. H. Shin et al., "Resolution-enhanced 3D image reconstruction by use of smart pixel mapping in computational integral imaging," Appl. Optics, vol. 47, no. 35, pp. 6656-6664, 2008.         [ Links ]

[14] M. Zhang et al., "Occlusion-removed scheme using depth-reversed method in computational integral imaging," Appl. Optics, vol. 49, no. 14, pp. 2571-2579, 2010.         [ Links ]

[15] C. W. Tan et al., "Two-way volumetric computational integral imaging reconstruction," 5th International Conference on Visual Information Engineering, Xian China, 2008, pp. 371-376.         [ Links ]

[16] J. Zhou et al., "A new digital image scrambling method based on Fibonacci numbers," Proceedings of International Symposium on IEEE, Vancouver, BC, Canada, 2004, pp. 965-968.         [ Links ]

[17] Y. Zhou et al., "Two Fibonacci P-code based image scrambling algorithms," International Society for Optics and Photonics, San Jose, CA, 2008, pp. 681215-7.         [ Links ]

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License