6
views
0
recommends
+1 Recommend
0 collections
0
shares
• Record: found
• Abstract: found
• Article: found
Is Open Access

Encryption of 3D Point Cloud Object with Deformed Fringe

,

Hindawi Limited

ScienceOpenPublisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

Abstract

A 3D point cloud object encryption method was proposed with this study. With the method, a mapping relationship between 3D coordinates was formulated and $Z$coordinate was transformed to deformed fringe by a phase coding method. The deformed fringe and gray image were used for encryption and decryption with simulated off-axis digital Fresnel hologram. Results indicated that the proposed method is able to accurately decrypt the coordinates and gray image of the 3D object. The method is also robust against occlusion attacks.

Most cited references18

• Record: found

Fourier transform profilometry for the automatic measurement of 3-D object shapes.

(1983)
Bookmark
• Record: found
• Abstract: found

Encrypting three-dimensional information with digital holography.

(2000)
A method for optical encryption of three-dimensional (3D) information by use of digital holography is presented. A phase-shifting interferometer records the phase and amplitude information generated by a 3D object at a plane located in the Fresnel diffraction region with an intensity-recording device. Encryption is performed optically by use of the Fresnel diffraction pattern of a random phase code. Images of the 3D object with different perspectives and focused at different planes can be generated digital or optically after decryption with the proper key. Experimental results are presented.
Bookmark
• Record: found
• Abstract: found

Two-step phase-shifting interferometry and its application in image encryption.

(2006)
Conventional phase-shifting interferometry (PSI) needs at least three interferograms. A novel algorithm of two-step PSI, with an arbitrary known phase step, by which a complex object field can be reconstructed with only two interferograms is proposed. This algorithm is then applied to an information security system based on double random-phase encoding in the Fresnel domain. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. This approach can considerably improve the efficiency of data transmission and is very suitable for Internet use.
Bookmark

Author and article information

Journal
Hindawi Limited
1687-6393
1687-6407
2016
2016
: 2016
:
: 1-9
Article
10.1155/2016/4601462