Reference Hub3
An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem

An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem

Yiqun Liu, Xiaorui Wang, Jianqi Zhang, Minqing Zhang, Peng Luo, Xu An Wang
Copyright: © 2016 |Volume: 12 |Issue: 2 |Pages: 21
ISSN: 1548-3908|EISSN: 1548-3916|EISBN13: 9781466689213|DOI: 10.4018/IJTHI.2016040101
Cite Article Cite Article

MLA

Liu, Yiqun, et al. "An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem." IJTHI vol.12, no.2 2016: pp.1-21. http://doi.org/10.4018/IJTHI.2016040101

APA

Liu, Y., Wang, X., Zhang, J., Zhang, M., Luo, P., & Wang, X. A. (2016). An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem. International Journal of Technology and Human Interaction (IJTHI), 12(2), 1-21. http://doi.org/10.4018/IJTHI.2016040101

Chicago

Liu, Yiqun, et al. "An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem," International Journal of Technology and Human Interaction (IJTHI) 12, no.2: 1-21. http://doi.org/10.4018/IJTHI.2016040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Robustness and security are difficult to be solved by conventional two-dimensional (2D) digital watermarking technology. In recent years, three-dimensional (3D) digital watermarking has become a new hotspot in optical information security. This paper presents a new improved security 3D digital watermarking method based on computational integrated imaging cryptosystem. Firstly, 3D digital watermarking is generated and encrypted by computational integral imaging cryptosystem that is implemented with smart pseudoscopic-to-orthoscopic conversion (SPOC) model. Secondly, discrete wavelet transform algorithm is applied to embed and extract the 3D digital watermarking. Finally, the extracted watermark is decrypted, and3D digital watermarking is displayed by integral imaging system. The feasibility and effectiveness of the proposed method is demonstrated by experiment. A primary implication of encrypted processing is that the majority of integral imaging cryptosystem will be encryption-in-the-loop applications, and the majority of system will improve the security and robustness of 3D digital watermarking. The new method is able to meet the requirements of robustness and security. Image quality and display quality achieve these criterions of the human visual model. The proposed method can be applied in the aspects of cloud computing and big data.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.