2013
DOI: 10.4028/www.scientific.net/amm.284-287.2955
|View full text |Cite
|
Sign up to set email alerts
|

3D Image Encryption Using Integral Imaging Scheme and MLCA Technology

Abstract: A new 3D image encryption method using integral imaging technology and maximum length cellular automata (MLCA) is proposed in this paper. First, an elemental image (EI) is generated by the integral imaging pickup process. The Wolfram rule is then selected and the state transition matrix, T, is created by MLCA. A random number matrix (RNM) is generated according to the MLCA rule. The generated EI and RNM are compared and pixel values are transitioned. Finally, a basis image is generated by another MLCA rule. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The most common methods of data acquisition are single CT and CT with secondary scan data alignment [ 19 ]. 3D images of the jaws are obtained by CT scanning, while information on the contours of the ideal restoration and the morphology of the intraoral soft and hard tissues can be obtained by radiographic guide CT (or cone-beam CT) data acquisition and optical scanning of the plaster model (or oral model impressions, intraoral optical impressions) [ 20 ].…”
Section: Digital Guide Production Processmentioning
confidence: 99%
“…The most common methods of data acquisition are single CT and CT with secondary scan data alignment [ 19 ]. 3D images of the jaws are obtained by CT scanning, while information on the contours of the ideal restoration and the morphology of the intraoral soft and hard tissues can be obtained by radiographic guide CT (or cone-beam CT) data acquisition and optical scanning of the plaster model (or oral model impressions, intraoral optical impressions) [ 20 ].…”
Section: Digital Guide Production Processmentioning
confidence: 99%
“…When minimized, the truth tables for rules 60, 90, 102, 150, 170, 204, and 240 result in the logic functions noted in Table 1, where ) (t q i denotes the state of the i -th CA cell at the t -th time, and 1 i q and 1 + i q refer to the state of its left and right neighbors [7][8][9].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…In 2013, Kim et al [11] presented a 3D image encryption method based on II and maximum length cellular automata (CA). In this method, the picked-up EIA was encrypted by the 2D maximum length CA.…”
Section: Introductionmentioning
confidence: 99%