AbstractA novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This proposed encryption algorithm combines the use of computational integral imaging (CII) and linear-complemented maximum-length cellular automata (LC-MLCA) to encrypt a 3D image. In the encryption process, the 2-D elemental image array (EIA) recorded by light rays of the 3-D image are mapped inversely through the lenslet array according the ray tracing theory. Next, the 2-D EIA is encrypted by LC-MLCA algorithm. When decrypting the encrypted image, the 2-D EIA is recovered by the LC-MLCA. Using the computational integral imaging reconstruction (CIIR) technique and a 3-D object is subsequently reconstructed on the output plane from the 2-D...
The popularization of electronic devices to capture digital images, as well as the creation of sever...
In this paper, we propose three-dimensional (3D) photon counting double random phase encryption (DRP...
Many image encryption algorithms have been proposed over recent years Refs. 1-8, to cite a few. Many...
A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This pr...
This paper presents a new method for three-dimensional (3D) scene acquisition via reconstruction wit...
We propose a two-step integral imaging coding based three-dimensional (3D) information encryption ap...
In this paper, we propose a novel 3-image bit-level encryption algorithm based on 3D nonequilateral ...
AbstractIn this paper, a three-dimensional (3D) image security system combines the use of the smart ...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Under the framework of computational integral imaging, a multi-image encryption scheme based on the ...
A novel method using 3-D space is proposed for optical multiple-image encryption. Each input image i...
In this paper, a watermark embedding scheme based on ghost image encryption and cellular automata tr...
Cellular automata (CA) are simple models of computation which exhibit fascinatingly complex behavior...
In this paper, we propose an image encryption technique to simultaneously encrypt double or multiple...
In cryptography, the previous research generally appears ambiguous and complex to the novice researc...
The popularization of electronic devices to capture digital images, as well as the creation of sever...
In this paper, we propose three-dimensional (3D) photon counting double random phase encryption (DRP...
Many image encryption algorithms have been proposed over recent years Refs. 1-8, to cite a few. Many...
A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This pr...
This paper presents a new method for three-dimensional (3D) scene acquisition via reconstruction wit...
We propose a two-step integral imaging coding based three-dimensional (3D) information encryption ap...
In this paper, we propose a novel 3-image bit-level encryption algorithm based on 3D nonequilateral ...
AbstractIn this paper, a three-dimensional (3D) image security system combines the use of the smart ...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Under the framework of computational integral imaging, a multi-image encryption scheme based on the ...
A novel method using 3-D space is proposed for optical multiple-image encryption. Each input image i...
In this paper, a watermark embedding scheme based on ghost image encryption and cellular automata tr...
Cellular automata (CA) are simple models of computation which exhibit fascinatingly complex behavior...
In this paper, we propose an image encryption technique to simultaneously encrypt double or multiple...
In cryptography, the previous research generally appears ambiguous and complex to the novice researc...
The popularization of electronic devices to capture digital images, as well as the creation of sever...
In this paper, we propose three-dimensional (3D) photon counting double random phase encryption (DRP...
Many image encryption algorithms have been proposed over recent years Refs. 1-8, to cite a few. Many...