Revista: | Journal of applied research and technology |
Base de datos: | PERIÓDICA |
Número de sistema: | 000372946 |
ISSN: | 1665-6423 |
Autores: | Li, X. W1 Kim, D. H1 Cho, S. J2 Kim, S. T1 |
Instituciones: | 1Pukyong National University, Department of Information and Communications, Busan. Corea del Sur 2Pukyong National University, Department of Applied Mathematics, Busan. Corea del Sur |
Año: | 2013 |
Periodo: | Ago |
Volumen: | 11 |
Número: | 4 |
Paginación: | 549-558 |
País: | México |
Idioma: | Inglés |
Tipo de documento: | Artículo |
Enfoque: | Aplicado, descriptivo |
Resumen en inglés | A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This proposed encryption algorithm combines the use of computational integral imaging (CII) and linear-complemented maximum-length cellular automata (LC-MLCA) to encrypt a 3D image. In the encryption process, the 2-D elemental image array (EIA) recorded by light rays of the 3-D image are mapped inversely through the lenslet array according the ray tracing theory. Next, the 2-D EIA is encrypted by LC-MLCA algorithm. When decrypting the encrypted image, the 2-D EIA is recovered by the LC-MLCA. Using the computational integral imaging reconstruction (CIIR) technique and a 3-D object is subsequently reconstructed on the output plane from the 2-D recovered EIA. Because the 2-D EIA is composed of a number of elemental images having their own perspectives of a 3-D image, even if the encrypted image is seriously harmed, the 3-D image can be successfully reconstructed only with partial data. To verify the usefulness of the proposed algorithm, we perform computational experiments and present the experimental results for various attacks. The experiments demonstrate that the proposed encryption method is valid and exhibits strong robustness and security |
Disciplinas: | Ciencias de la computación |
Palabras clave: | Procesamiento de datos, Manejo de imágenes, Encriptamiento, Algoritmos, Autómatas celulares |
Keyword: | Computer science, Data processing, Images management, Encryption, Algorithms, Cellular automatas |
Texto completo: | Texto completo (Ver HTML) |