6
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Encryption of 3D Point Cloud Object with Deformed Fringe

      ,

      Advances in Optical Technologies

      Hindawi Limited

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A 3D point cloud object encryption method was proposed with this study. With the method, a mapping relationship between 3D coordinates was formulated and Z coordinate was transformed to deformed fringe by a phase coding method. The deformed fringe and gray image were used for encryption and decryption with simulated off-axis digital Fresnel hologram. Results indicated that the proposed method is able to accurately decrypt the coordinates and gray image of the 3D object. The method is also robust against occlusion attacks.

          Related collections

          Most cited references 18

          • Record: found
          • Abstract: not found
          • Article: not found

          Fourier transform profilometry for the automatic measurement of 3-D object shapes.

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Encrypting three-dimensional information with digital holography.

            A method for optical encryption of three-dimensional (3D) information by use of digital holography is presented. A phase-shifting interferometer records the phase and amplitude information generated by a 3D object at a plane located in the Fresnel diffraction region with an intensity-recording device. Encryption is performed optically by use of the Fresnel diffraction pattern of a random phase code. Images of the 3D object with different perspectives and focused at different planes can be generated digital or optically after decryption with the proper key. Experimental results are presented.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              Two-step phase-shifting interferometry and its application in image encryption.

               L Cai,  Ronald Xu,  X. Yang (2006)
              Conventional phase-shifting interferometry (PSI) needs at least three interferograms. A novel algorithm of two-step PSI, with an arbitrary known phase step, by which a complex object field can be reconstructed with only two interferograms is proposed. This algorithm is then applied to an information security system based on double random-phase encoding in the Fresnel domain. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. This approach can considerably improve the efficiency of data transmission and is very suitable for Internet use.
                Bookmark

                Author and article information

                Journal
                Advances in Optical Technologies
                Advances in Optical Technologies
                Hindawi Limited
                1687-6393
                1687-6407
                2016
                2016
                : 2016
                :
                : 1-9
                Article
                10.1155/2016/4601462
                © 2016

                Comments

                Comment on this article