Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.9.1703

3D Point Clouds Encryption Method and Analysis of Encryption Ratio in Holographic Reconstruction Image  

Choi, Hyun-Jun (Department of Electronic Engineering, Mokpo Maritime University)
Seo, Young-Ho (Ingenium College of Liberal Arts, Kwangwoon University)
Abstract
This paper propose a 3D point clouds (depth) security technique for digital holographic display service. Image contents encryption is a method to provide only authorized right owners with the original image information by encrypting the entire image or a part of the image. The proposed method detected an edge from a depth and performed quad tree decomposition, and then performed encryption. And encrypts the most significant block among the divided blocks. The encryption effect was evaluated numerically and visually. The experimental results showed that encrypting only 0.43% of the entire data was enough to hide the constants of the original depth. By analyzing the encryption amount and the visual characteristics, we verified a relationship between the threshold for detecting an edge-map. As the threshold for detecting an edge increased, the encryption ratio decreased with respect to the encryption amount.
Keywords
Contents security; Digital hologram; Encryption; 3D point cloud;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 T. Motoki, H. Isono, and I. Yuyama, "Present Status of Three-Dimensional Television Research," Proceedings of the IEEE, vol. 83, no. 7, pp. 1009-1021, July 1995.   DOI
2 Y. S. Seo, Y. H. Lee, J. S. Yoo, M. B. Kim, H. J. Choi, and D. W. Kim, "A Prototype Architecture of an Interactive Service System for Digital Hologram Videos," Korean Journal of Broadcasting, vol. 17, no. 4, pp. 695-706, July 2012.
3 S. A. Benton, and V. M. Bove, Jr, Holographic Imaging, New Jersey, NY: Wiley Inter-Science, 2008.
4 H. J. Choi, "Image encryption method for depth + texture video contents," International Journal of Information and Computer Security, vol. 6, no. 4 , pp. 333-343, Dec. 2014.   DOI
5 Y. S. Seo, Y. J. Bae, Y. H. Lee, H. J. Choi, J. S. Yoo, and D. W. Kim, "A New Coding Technique for Scalable Video Service of Digital Hologram," Journal of The Institute of Electronics Engineering of Korea, vol. 49, no. 9, pp. 92-103, Sept. 2012.
6 Y. H. Seo, H. J. Choi, J. S. Yoo and D. W. Kim, "Selective and adaptive signal hiding technique for security of JPEG2000," International Journal of Imaging Systems and Technology, vol. 23, no. 3, pp. 277-284, Agu. 2010.
7 H. J. Choi, Y. H. Seo and D. W. Kim, "A Frequency Characteristic Analysis of Digital Hologram in Fresnel Transform Domain," Journal of the Korea Institute of Information and Communication Engineering, vol. 16, no. 7, pp. 1505-1511, July 2012.   DOI
8 H. J. Choi,, "Data Encryption Technique for Depth-map Contents Security in DWT domain," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 5, pp. 1245-1252, May 2013.   DOI
9 Y. H. Seo, Y. H. Lee, J. S. Yoo and D. W. Kim, "Scalable hologram video coding for adaptive transmitting service," Applied Optics, vol. 52, no. 1, pp. 254-268, Jan. 2013.   DOI
10 D. W. Kim, H. J. Choi, Y. G. Choi, J. S. Yoo and Y. H. Seo, "Information hiding for digital holograms by electronic partial encryption methods," Optics Communications, vol. 277, no. 2, pp. 227-287, May 2007.
11 R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. New York, NY: Prentice Hall, 2009.