Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security

Abstract Integral imaging can provide a feasible and efficient technique for multiple-image encoding system. The computational integral imaging reconstruction (CIIR) technique reconstructs a set of plane images along the output plane, whereas the resolution of the reconstructed images will degrade due to the partial occlusion of other reconstructed images. Meanwhile, CIIR is a pixel-overlapping reconstruction method, in which the superimposition causes the undesirable interference. To overcome these problems, we first utilize the block matching algorithm to eliminate the occlusion-disturbance and introduce the back-propagation neural network algorithm to compensate for the low-resolution image. In the encryption, a computational integral imaging pickup technique is employed to record the multiple-image simultaneously to form an elemental image array (EIA). The EIA is then encrypted by combining the use of maximum length cellular automata (CA) and the double random phase encoding algorithm. Some numerical simulations have been made to demonstrate the performance of this encryption algorithm.

[1]  Sikun Li,et al.  Three-dimensional information security combined fringe projection with double random phase encoding , 2013 .

[2]  Un-Sook Choi,et al.  Computing Phase Shifts of Maximum-Length 90/150 Cellular Automata Sequences , 2004, ACRI.

[3]  Eun-Soo Kim,et al.  Robust image encryption by combined use of integral imaging and pixel scrambling techniques , 2009 .

[4]  B Javidi,et al.  Encrypted optical storage with angular multiplexing. , 1999, Applied optics.

[5]  Bahram Javidi,et al.  Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[6]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[7]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[8]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[9]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[10]  Dong Hwan Kim,et al.  3D Image Encryption Using Integral Imaging Scheme and MLCA Technology , 2013 .

[11]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[12]  Xudong Chen,et al.  Optical multiple-image encryption based on multiplane phase retrieval and interference , 2011 .

[13]  Sui Liansheng,et al.  Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. , 2013, Optics letters.

[14]  Tarek Hegazy,et al.  Developing Practical Neural Network Applications Using Back‐Propagation , 1994 .

[15]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[16]  Benjamin Schrauwen,et al.  Backpropagation for Population-Temporal Coded Spiking Neural Networks , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[17]  D. Nistér,et al.  Stereo Matching with Color-Weighted Correlation, Hierarchical Belief Propagation, and Occlusion Handling , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  Dong-Hak Shin,et al.  Occlusion removal method of partially occluded 3D object using sub-image block matching in computational integral imaging. , 2008, Optics express.

[19]  Eun-Soo Kim,et al.  Occlusion-removed scheme using depth-reversed method in computational integral imaging , 2010 .

[20]  Weimin Jin,et al.  Color image encryption based on joint fractional Fourier transform correlator , 2011 .

[21]  Daomu Zhao,et al.  Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain , 2012 .

[22]  Andries Petrus Engelbrecht,et al.  A Cooperative approach to particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.

[23]  S Nakajima,et al.  Three-dimensional medical imaging display with computer-generated integral photography. , 2001, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[24]  Li Fu,et al.  Increasing the data hiding capacity and improving the security of a double-random phase-encoding technique based information hiding scheme , 2009 .

[25]  Bahram Javidi,et al.  Digital three-dimensional image correlation by use of computer-reconstructed integral imaging. , 2002, Applied optics.

[26]  Bahram Javidi,et al.  Three-dimensional volumetric object reconstruction using computational integral imaging. , 2004, Optics express.

[27]  Mingguang Shan,et al.  Double image encryption using double pixel scrambling and random phase encoding , 2012 .

[28]  Dong Hwan Kim,et al.  Novel 3-D Image Encryption Using Computational Integral Imaging and Linear-Complemented MLCA , 2013 .

[29]  Eun-Soo Kim,et al.  Depth extraction of three-dimensional objects in space by the computational integral imaging reconstruction technique. , 2008, Applied optics.

[30]  Xudong Chen,et al.  Optical cryptography network topology based on 2D-to-3D conversion and phase-mask extraction , 2013 .