검색
검색 팝업 닫기

Ex) Article Title, Author, Keywords

Article

Split Viewer

Article

Curr. Opt. Photon. 2022; 6(6): 565-575

Published online December 25, 2022 https://doi.org/10.3807/COPP.2022.6.6.565

Copyright © Optical Society of Korea.

Real 3D Property Integral Imaging NFT Using Optical Encryption

Jaehoon Lee1, Myungjin Cho2 , Min-Chul Lee1

1Department of Computer Science and Networks, Kyushu Institute of Technology, Iizuka-shi, Fukuoka 820-8502, Japan
2School of ICT, Robotics, and Mechanical Engineering, Research Center for Hyper-connected Convergence Technology, IITC, Hankyong National University, Anseong 17579, Korea

Corresponding author: *mjcho@hknu.ac.kr, ORCID 0000-0003-2896-770X
**lee@csn.kyutech.ac.jp, ORCID 0000-0001-8469-0288

Received: August 3, 2022; Revised: November 7, 2022; Accepted: November 20, 2022

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

Keywords: 3D visualization, Blockchain, Double random phase encryption, Integral imaging, Non-fungible token

OCIS codes: (000.4930) Other topics of general interest; (100.0100) Image processing; (100.3010) Image reconstruction techniques; (100.4999) Pattern recognition, optical security and encryption

Recently, blockchain technology has become significant in various research fields [1, 2]. It preserves data like a chain. The data is connected with other blocks, and each block contains the previously encoded data. Therefore, it can safely preserve the data [3, 4]. Many industries have been interested in the data decentralization of the blockchain. Also, a cryptocurrency network system has been developed [5, 6]. Cryptocurrencies are managed in a network with a decentralized system. It generates blocks and preserves the data in a plurality of PCs. Therefore, it is difficult to attack the network and sensitive data is safely protected. However, cryptocurrency has a problem in that it has limited use. There are not enough stores that accept cryptocurrency. Since such a problem causes instability in the cryptocurrency market, tokens have been developed that can be used in various cryptocurrency transactions.

Tokens can mainly be divided into fungible tokens (FTs) and non-fungible tokens (NFTs) [7, 8]. FTs can be exchanged equally because they have the same value as each other’s tokens. However, in the case of NFTs, exchange is impossible because the token values are different. Using the characteristic of these tokens, NFTs have been developed to trade digital art and sound sources in cryptocurrency. When a transaction occurs in the blockchain network, all information on the transaction can be checked. Thus, using these advantages, digital art ownership can be claimed through tokens and stored safely. Tokens can be minted through various NFT markets, and anyone can freely sell their paintings or digital assets. Many NFT markets have been trying to trade ownership of real 3D property using NFT tokens [9].

However, NFT minting in the NFT market has several problems. Since most NFTs mint 2D digital data, it is difficult to sell and express factual 3D property information. To expand the NFT market to real property transactions, a 3D image is needed. Furthermore, a property sharing method is also required in the case of expensive property.

In addition, anonymous persons sell their digital art by impersonating celebrities or sell artworks without considering the copyright. If we track NFT transactions, we can find the seller’s information, but the process is complicated, and it is difficult to fix the problem [10, 11]. Furthermore, an NFT stores additional data in metadata that cannot be stored in the blockchain. The metadata eventually contains information about properties. Therefore, when real property is traded as a token, metadata exposure can cause serious property damage because sensitive information is included in the metadata.

To generate an NFT for real 3D properties, our proposed method uses integral imaging to visualize 3D depth information through the image [12–17]. It uses elemental images that have different perspectives of objects. It reconstructs the 3D image by using optical calculation through a virtual pinhole. Therefore, it can generate a 3D object image and use it for a real property NFT token. In addition, integral imaging can generate a 3D object image according to the depth, so it can share the 3D properties with several people.

Moreover, to preserve metadata securely, an image encryption method is needed. Many people use an e-commerce QR code to buy things and preserve personal image data in their portable devices. Consequently, image encryption techniques are a significant topic in various industrial fields [18–25]. The proposed method uses a double random phase encryption technique (DRPE) to show the concept of metadata encryption [18–23]. DRPE is a simple optical encryption method to preserve data securely. It uses two random phase masks to encrypt the data. The encrypted data seem like random noise, and can be recovered by using an inverse Fourier transformed random phase mask. Therefore, it is challenging to recover the original data if the user does not have a random phase mask and encrypted data. We use the DRPE technique to encrypt the metadata of real property tokens. This can prevent information exposure and similar tokens cannot be minted for cheating.

This paper is organized as follows: We present conventional cryptocurrency tokens in Section 2. Then, we propose our new NFT concept by using integral imaging and DRPE in Section 3. In Section 4, we perform the private NFT transaction application backend and frontend to show our proposed system. Finally, we present the conclusion in Section 5.

2.1. Background of Cryptocurrency Token

Cryptocurrency, which can safely preserve assets using public blockchain networks, has recently become a significant issue. However, after cryptocurrency started, it did not work correctly as a currency. This is because there are few places to use cryptocurrency, which is used for investment purposes. As use is deactivated, cryptocurrency prices become unstable and change rapidly. These problems can reduce the value of cryptocurrency. To solve these problems and revitalize it, tokens have been minted to promote consumption in various fields. Tokens are used to sell ownership of the information that cannot be contained in the blockchain. Customers purchase the information recorded in tokens using cryptocurrency. There are two types of tokens: FTs and NFTs. The FT value is the same as other FTs. It is possible to exchange tokens with each other. In contrast, an NFT has a different value compared with other NFTs. The cryptocurrency Ethereum defines rules for the token, called ERC-20 and ERC-721, to prevent abuse and fraud. When the market wants to mint the token, it must have followed the ERC rules. Figure 1 shows the concept of an FT and NFT.

Figure 1.Concept of fungible and non-fungible tokens.

Since it is difficult to define the same value with other tokens, the token market usually uses NFTs to mint their properties.

2.2. Conventional NFT

In general, NFTs are used to validate the ownership of various kinds of digital contents. Artists create digital contents and upload them to the NFT market. The market saves the art in its database or decentralized system to preserve the contents. Then, the market mints the token of art. By minting an NFT, the token must follow the ERC-721 rules. Since the owner, information, and transaction of tokens can be confirmed through ERC-721, it is possible to prevent the illegal issuance of tokens and obtain objective reliability with the disclosure of information. Then, the administrator adds the detailed digital art information metadata by minting. This is because it can record the transaction of NFT, but it is not easy to upload all information about an NFT in the blockchain network. If the block size becomes large, the customer and administrator must pay an expensive fee for the transaction. Therefore, it is inefficient for NFT. Thus, it stores the detailed information respectively. Figure 2 shows the concept of NFT minting.

Figure 2.Non-fungible token minting process.

After minting the token, the market uploads the token and brief art information to sell the token to the customer. The customer can buy art ownership by acquiring cryptocurrency and preserving the token in their electrical wallet called a MetaMask. Finally, the customer will have a token that can claim ownership of the artist’s digital content. In addition, the token has metadata information that can check the detailed information about the work. Figure 3 shows an example of metadata and an image of a token in MetaMask.

Figure 3.Creating metadata of non-fungible tokens (NFT): (a) defined metadata on backend, (b) NFT metadata.

Therefore, the advantage is that it can claim ownership of digital content using NFT and be recognized as a unique one because transaction records, such as for games, art, and sound sources sold as NFT, are stored on the blockchain. Moreover, the NFT market is currently attempting to sell real property by applying the concept of NFT.

However, NFT has some problems for selling real properties. A conventional NFT usually sells 2D images or animations [8–11]. However, to sell real property with three dimensions, the token must visualize the part or 3D information of properties. Furthermore, in some cases, expensive properties are sold in installments, so these cases should also be considered, but it is challenging to implement them with the current NFT.

In addition, NFT has copyright problems. Anyone can copy an art masterpiece and mint their own NFT. Therefore, copyright infringement in the NFT market is severe. Furthermore, some people impersonate celebrities and mint the token without the celebrities’ permission. It can cause the serious problem of claiming ownership of tokens.

Moreover, even if the NFT metadata is duplicated, it may be difficult to distinguish between real and fake tokens. Consequently, it may lead to incorrect token purchases. Transaction tracking can track the person who mints the tokens. However, the process is complicated, and the customer may find it difficult to get a refund or recover the customer’s property according to the NFT ecosystem [10, 11].

To solve these problems, we propose a new NFT system that can generate 3D images and share 3D properties using the integral imaging technique. Moreover, our proposed method can securely preserve the metadata with the DRPE method for on- and off-chain systems.

3.1. NFT Based on Integral Imaging

A conventional NFT only represents 2D or short animation to show digital art and other contents. However, in the case of real property, it cannot represent 3D property information. So, to commercialize the real 3D property, a 3D image reconstruction technique is required.

Integral imaging is one of the passive optical 3D imaging methods. It can generate 3D images without a coherent light source and expensive devices. It only uses a lens array and picks up different perspectives of the 3D object, which is called an elemental image. Then, it can reconstruct the 3D image through the lens array. Figure 4 shows the concept of the integral imaging technique.

Figure 4.Concept of integral imaging.

To reconstruct the 3D image with the computational method, volumetric computational reconstruction (VCR) has been used. VCR uses elemental images and reconstructs 3D images through a virtual pinhole. Figure 5 shows the VCR reconstruction process.

Figure 5.Volumetric computational reconstruction.

Finally, the 3D image can be generated on the reconstruction plane as follows:

Sx=IxpfCxZr

Rx,zr=1L(x,zr) k=1KEk(x+Sxk1)

where Ix is the number of elemental image pixels, f is the focal length of the camera, p is the pitch between virtual pinholes, Cx is the sensor size, Sx represents the shifting pixel value of each elemental image on the reconstruction plane, zr represents the reconstruction depth on the reconstruction plane, Ek is the elemental image and L(x, zr) is the overlapping matrix of the reconstruction process. Finally, the 3D image R(x, zr) can be generated. This 3D image can represent the depth information of real properties according to the reconstruction depth zr. In addition, if the property is expensive, it can share the property according to the depth information. Therefore, NFT can represent the real property’s 3D information through the 3D image by using integral imaging. Figure 6 shows 3D images with different depth planes.

Figure 6.3D images with different depth information: (a) front depth and (b) middle depth.

However, NFT has copyright and token fraud problems where the authentic token information and metadata are illegally copied. Since NFT metadata represents the NFT detail information, it is dangerous to expose it. It can cause incorrect NFT purchases, abuse of NFT, and serious financial problems. To prevent financial damage, we propose a method that can securely preserve the real property data using image data encryption systems.

3.2. NFT Metadata Encryption Based on Double Random Phase Encryption (DRPE)

Recently, a 3D image encryption technique has been used to safely preserve sensitive personal data and medical images [23–25]. DRPE is a simple optical encryption method that uses two random phase masks by an 4f optical imaging system. Figure 7 illustrates the DRPE encryption and decryption process.

Figure 7.Double random phase encryption.

To encrypt the image, a spatial domain mask n(x) and frequency domain mask n(μ) are required. Then the encrypted image can be represented as follows:

Ex=F1Ffxexpi2πnxexpi2πnμ

where f(x) represents the original image, and F, F −1 are referred to as Fourier transform and inverse Fourier transform, respectively. By multiplying two random phase masks through Fourier transform, the encrypted data [E(x)] can be generated. To decrypt the image, the conjugate of the second random phase mask is needed. the decryption process is described as:

Dx=|F1FExexp2πnμ|

Finally, the decrypted image D(x) can be obtained. It can be used to preserve the metadata securely. Therefore, it can prevent fake token minting that copies genuine token metadata. In addition, it can be used not only in on-chain systems, but also off-chain ones.

3.3. NFT for 3D Real Property by Using Integral Imaging and DRPE

To explain the commercialization of 3D NFT by using the integral imaging technique and DRPE, Fig. 8 shows the whole 3D NFT minting process.

Figure 8.Minting process of proposed method.

Our proposed method is based on the private blockchain system for the group that wants to buy 3D property NFTs. It is easier to manage minted 3D NFTs on a private blockchain compared to the public blockchain when some problems occur in the transaction. To mint the 3D image, the seller should have to guarantee the 3D properties and take the elemental image through the specific reconstruction parameters. This is because parameters such as sensor size, pitch value, and focal length can be the detailed information of 3D NFTs. Then, the seller generates a 3D image of the properties and should have to make each image’s warranty. Our proposed method uses the optical parameter and reconstruction depth information as the warranty of the 3D image. These values are unique and easily proven and verified information. These warranties will be preserved in the interplanetary file system (IPFS). If the seller has database problems or negligence in management, it can cause information loss in NFT. However, IPFS can save the file with the distributed file system and share the data through the peer-to-peer network. Thus, our proposed method preserves the data in IPFS. When we upload the data in IPFS, we can get the hash code value of the data. We make an image for encryption that contains the hash code, as shown in Fig. 9.

Figure 9.Generating the hash code image for encryption.

Our proposed method generates the image containing the warranty image hash codes and encrypts the image using DRPE. Then, we mint the 3D NFT with metadata that contains the random phase mask information and the minimal information about the 3D NFT. The seller sends the random phase mask information through the NFT metadata. Consequently, it can preserve the random phase mask information in an on-chain system. To decrypt the image, the customer also needs the encrypted image from the seller. Sellers can propose DRPE by sending an encrypted image with an off-chain rather than an on-chain method. Even if metadata is exposed, it is meaningless without the encrypted image, so random phase mask information and encrypted images are essential to restore the data. Finally, it can preserve the 3D NFT metadata securely. Figure 10 represents the secure data transmission process.

Figure 10.Metadata and encrypted image transmission process.

Consumers can decrypt the encrypted image by using the metadata information and verify the warranty of a 3D NFT with the hash code in the encrypted image, which is stored in the IPFS. This warranty should not be exposed because it is essential to prove ownership of the customer’s 3D NFT. Figure 11 represents the sample warranty image that can verify the detailed information of the 3D NFT.

Figure 11.Verifying warranty through the decryption process.

Finally, our proposed method can mint NFT with 3D depth information. Furthermore, it can share the real property according to the depth reconstruction information. Therefore, it can be helpful in various NFT industries that want to make 3D property NFTs. Moreover, we used the DRPE technique in the NFT metadata. It can prevent indiscriminate fake NFT minting and securely NFT ownership. To show our proposed method, we show a simulated application for the 3D NFT in the next section.

Since we have to pay a charge to make a transaction, we used the personal test blockchain network called Ganache. To mint the NFT, our proposed method followed ERC-721, which is required for NFT transactions. We used Solidity and Truffle to compose ERC-721 and the backend of the NFT. In addition, to compose the web application for the 3D NFT, we used the React and Drizzle libraries. Also, we used the IPFS system to securely save the 3D NFT detail information and warranty. Figure 12 shows the whole concept of our proposed method.

Figure 12.Whole network process of proposed method.

To generate a 3D image of a property with integral imaging, we used a 7(H) × 7(V) camera array as depicted in Fig. 13.

Figure 13.Optical experiments setup.

Each elemental image has 2,000 (H) × 3,000 (V) resolutions. The camera focal length is 50 mm, and pitch value is 2 mm. Then, a 3D image can be generated according to the depth between the camera and 3D properties. To mint the tokens that have different values according to the reconstruction depth, our proposed method generates two 3D images with different depths. Figure 14 shows the 3D property image representing the different depth information.

Figure 14.3D images that (a) contain 200 mm depth information and (b) 250 mm depth information.

Our method can mint a token that contains 3D depth information. To guarantee the 3D property value, the seller makes a warranty image for NFT. The warranty contains the detailed information of 3D images and depth information. To securely maintain the warranty information, our method uploads the 3D NFT warranty in IPFS. Then we can obtain the hash information of the warranty. Our method puts the hash information in the image and encrypts the information by using DRPE. Figure 15 represents the encryption process of the 3D NFT and Table 1 shows the image visual quality metrics results to prove the DRPE encryption performance.

TABLE 1 Image visual quality metrics

ImagesCorrelationSSIM
Encrypted Image0.01410.0043
Decrypted Imagea)0.01370.0081
Decrypted Imageb)1.0001.000


Figure 15.Security enhancement of the 3D non-fungible tokens (NFT) warranty: (a) Upload important information of 3D NFT in interplanetary file system (IPFS) and (b) encrypt the hash code of warranty.

To commercialize 3D NFT, the minting process is needed. To mint a 3D NFT, we use our web application, upload the 3D image in IPFS, and put the hash information as the metadata of the NFT. Then our method puts the second random phase mask information in the metadata. Figure 16 represents the web application mint function and metadata of the 3D NFT.

Figure 16.Minting 3D non-fungible tokens (NFT).

If a customer buys a 3D NFT, the seller sends the token to the customer’s cryptocurrency account. In addition, the seller prepares the encrypted image and passes it on to the customer without decryption. The customer can decrypt the image using second random phase mask information in the metadata. Finally, the customer can access the hash information of the 3D NFT warranty, which is preserved in IPFS. Consequently, it can only be accessed by the person who bought the 3D NFT. Figures 17 and 18 show the token list and warranty information of the decryption process, respectively.

Figure 17.Token list of 3D NFT.

Figure 18.Hash information of decryption process.

Finally, our proposed method can mint the 3D depth information NFT of real properties through the VCR. It has the advantage of being able to purchase by sharing expensive real property. Furthermore, our proposed method solves the ownership and copyright issues of NFT with the optical encryption method, DRPE. Moreover, it uses on- and off-chain systems to send the encrypted image and random phase mask key to preserve the important information of the 3D NFT. Therefore, our proposed method can prevent critical damage to the consumer’s real properties.

In this paper, we have proposed a NFT that can represent 3D real property information using the computational 3D reconstruction method. In addition, we used the optical encryption method, DRPE, to preserve the vital NFT ownership information. Since the public cryptocurrency network can record the transaction of tokens, it can be possible to purchase the ownership of things securely. To use the advantages of the network, the NFT market attempted to sell real 3D property NFT. However, providing 3D information to consumers was difficult. Our proposed method can solve this problem and suggests sharing the property through 3D depth images. It can also be used in 3D token exhibition with a 3D point cloud algorithm. In addition, the current digital NFT is causing many problems due to indiscriminate ownership copying and copyright infringement. However, if the same problem occurs in 3D real property, it causes significant financial damage to consumers. To solve this problem, we used DRPE to access documents that only consumers could claim for ownership of tokens. We believe our proposed method will greatly help mint 3D property tokens and can be used in various 3D decentralized application fields. Additionally, we used the simple encryption method DRPE to propose the concept of 3D NFT minting and metadata encryption using on- and off-chain systems. To enhance the security performance, we will use the latest security techniques in the future.

Data underlying the results presented in this paper are not publicly available at the time of publication, which may be obtained from the authors upon reasonable request.

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government(MSIT) (NRF-2020R1F1A1068637).

  1. M. Swan, Blockchain: Blueprint for a new economy (O’Reilly, USA, 2015).
  2. M. Nofer, P. Gomber, O. Hinz, and D. Schiereck, “Blockchain,” Bus. Inform. Syst. Eng. 59, 183-187 (2017).
    CrossRef
  3. M. P. Mcbee and C. Wilcox, “Blockchain technology: Principles and applications in medical imaging,” J. Digit. Imaging 33, 726-734 (2020).
    Pubmed KoreaMed CrossRef
  4. K. Koptyra and M. R. Ogiela, “Imagechain—Application of blockchain technology for images,” Sensors 21, 82 (2021).
    Pubmed KoreaMed CrossRef
  5. C. Dannen, “Introducing Ethereum and Solidity,” (Springer, NY, USA, 2017).
    CrossRef
  6. D. Vujičić, D. Jagodić, and S. Ranđić, “Blockchain technology, bitcoin, and Ethereum: A brief overview,” in Proc 17th International Symposium INFOTEH-JAHORINA-INFOTEH (East Sarajevo, Bosnia and Herzegovina, Mar. 21-23, 2018).
    CrossRef
  7. U. W. Chohan, “Non-fungible tokens: Blockchains, scarcity, and value,” Critical Blockchain Research Initiative (CBRI) working papers, Islamabad, Pakistan (2021).
    CrossRef
  8. Q. Wang, R. Li, Q. Wang, and S. Chen, “Non-fungible token (nft): Overview, evaluation, opportunities and challenges,” arXiv:2105.07447 (2021).
  9. V. Despotovic, D. Bjelica, and D. Barac, “Analysis of potential NFT applications,” E-bus. Technol. Conf. Proc. 2, 103-107, (2022)
  10. G. A. Pierro, M. sawaf, and R. Tonelli, “Original or Fake? How to understand the digital artworks’ value in the blockchain,” in Proc. Software Engineering and Formal Methods-SEFM 2021 (Virtual Conference, Dec. 6-10, 2022), pp. 76-85.
    CrossRef
  11. D. Das, P. Bose, N. Ruaro, C. Krugel, and G. Vigna, “Understanding security issues in the NFT ecosystem,” in Proc. ACM conference on computer and communications security-CSS, (LA, USA, Nov. 7-11, 2022).
  12. G. Lippmann, “La photographie integrale,” Comptes Rendus Acad. Sci 146, 446-451 (1908).
  13. J.-S. Jang and B. Javidi, “Three-dimensional synthetic aperture integral imaging,” Opt. Lett. 27, 1144-1146 (2002).
    Pubmed CrossRef
  14. S.-H. Hong, J.-S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12, 483-491 (2004).
    Pubmed CrossRef
  15. M. Cho and D. Shin, “3D integral imaging display using axially recorded multiple images,” J. Opt. Soc. Korea 17, 410-414 (2013).
    CrossRef
  16. B. Cho, P. Kopycki, M. Martinez-Corral, and M. Cho, “Computational volumetric reconstruction of integral imaging with improved depth resolution considering continuously non-uniform shifting pixels,” Opt. Lasers Eng. 111, 114-121 (2018).
    CrossRef
  17. H. Yun, A. Llavador, G. Saavedra, and M. Cho, “Three-dimensional imaging system with both improved lateral resolution and depth of field considering non-uniform system parameters,” Appl. Opt. 57, 9423-9431 (2018).
    Pubmed CrossRef
  18. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 34-39 (1994).
    CrossRef
  19. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
    Pubmed CrossRef
  20. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the fresnel domain,” Opt. Lett. 24, 762-764 (1999).
    Pubmed CrossRef
  21. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644-1646 (2005).
    Pubmed CrossRef
  22. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253-10265 (2007).
    Pubmed CrossRef
  23. J. Lee, M. Cho, and M.-C. Lee, “Three-dimensional photon counting optical encryption with enhanced visual quality and security level,” IEEE Access 9, 128862-128869 (2021).
    CrossRef
  24. H. Zeng, Y. Xing, S. Kim, and X. Li, “ Designing real-time 3D image security with CA-based random mode decomposition,” Signal Process. 197, 108554 (2022).
    CrossRef
  25. Y. Li, T. wang, Y. Liao, D. Li, and X. Li, “3D medical images security via light-field imaging,” Opt. Lett. 47, 3535-3538 (2022).
    Pubmed CrossRef

Article

Article

Curr. Opt. Photon. 2022; 6(6): 565-575

Published online December 25, 2022 https://doi.org/10.3807/COPP.2022.6.6.565

Copyright © Optical Society of Korea.

Real 3D Property Integral Imaging NFT Using Optical Encryption

Jaehoon Lee1, Myungjin Cho2 , Min-Chul Lee1

1Department of Computer Science and Networks, Kyushu Institute of Technology, Iizuka-shi, Fukuoka 820-8502, Japan
2School of ICT, Robotics, and Mechanical Engineering, Research Center for Hyper-connected Convergence Technology, IITC, Hankyong National University, Anseong 17579, Korea

Correspondence to:*mjcho@hknu.ac.kr, ORCID 0000-0003-2896-770X
**lee@csn.kyutech.ac.jp, ORCID 0000-0001-8469-0288

Received: August 3, 2022; Revised: November 7, 2022; Accepted: November 20, 2022

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

Keywords: 3D visualization, Blockchain, Double random phase encryption, Integral imaging, Non-fungible token

I. INTRODUCTION

Recently, blockchain technology has become significant in various research fields [1, 2]. It preserves data like a chain. The data is connected with other blocks, and each block contains the previously encoded data. Therefore, it can safely preserve the data [3, 4]. Many industries have been interested in the data decentralization of the blockchain. Also, a cryptocurrency network system has been developed [5, 6]. Cryptocurrencies are managed in a network with a decentralized system. It generates blocks and preserves the data in a plurality of PCs. Therefore, it is difficult to attack the network and sensitive data is safely protected. However, cryptocurrency has a problem in that it has limited use. There are not enough stores that accept cryptocurrency. Since such a problem causes instability in the cryptocurrency market, tokens have been developed that can be used in various cryptocurrency transactions.

Tokens can mainly be divided into fungible tokens (FTs) and non-fungible tokens (NFTs) [7, 8]. FTs can be exchanged equally because they have the same value as each other’s tokens. However, in the case of NFTs, exchange is impossible because the token values are different. Using the characteristic of these tokens, NFTs have been developed to trade digital art and sound sources in cryptocurrency. When a transaction occurs in the blockchain network, all information on the transaction can be checked. Thus, using these advantages, digital art ownership can be claimed through tokens and stored safely. Tokens can be minted through various NFT markets, and anyone can freely sell their paintings or digital assets. Many NFT markets have been trying to trade ownership of real 3D property using NFT tokens [9].

However, NFT minting in the NFT market has several problems. Since most NFTs mint 2D digital data, it is difficult to sell and express factual 3D property information. To expand the NFT market to real property transactions, a 3D image is needed. Furthermore, a property sharing method is also required in the case of expensive property.

In addition, anonymous persons sell their digital art by impersonating celebrities or sell artworks without considering the copyright. If we track NFT transactions, we can find the seller’s information, but the process is complicated, and it is difficult to fix the problem [10, 11]. Furthermore, an NFT stores additional data in metadata that cannot be stored in the blockchain. The metadata eventually contains information about properties. Therefore, when real property is traded as a token, metadata exposure can cause serious property damage because sensitive information is included in the metadata.

To generate an NFT for real 3D properties, our proposed method uses integral imaging to visualize 3D depth information through the image [12–17]. It uses elemental images that have different perspectives of objects. It reconstructs the 3D image by using optical calculation through a virtual pinhole. Therefore, it can generate a 3D object image and use it for a real property NFT token. In addition, integral imaging can generate a 3D object image according to the depth, so it can share the 3D properties with several people.

Moreover, to preserve metadata securely, an image encryption method is needed. Many people use an e-commerce QR code to buy things and preserve personal image data in their portable devices. Consequently, image encryption techniques are a significant topic in various industrial fields [18–25]. The proposed method uses a double random phase encryption technique (DRPE) to show the concept of metadata encryption [18–23]. DRPE is a simple optical encryption method to preserve data securely. It uses two random phase masks to encrypt the data. The encrypted data seem like random noise, and can be recovered by using an inverse Fourier transformed random phase mask. Therefore, it is challenging to recover the original data if the user does not have a random phase mask and encrypted data. We use the DRPE technique to encrypt the metadata of real property tokens. This can prevent information exposure and similar tokens cannot be minted for cheating.

This paper is organized as follows: We present conventional cryptocurrency tokens in Section 2. Then, we propose our new NFT concept by using integral imaging and DRPE in Section 3. In Section 4, we perform the private NFT transaction application backend and frontend to show our proposed system. Finally, we present the conclusion in Section 5.

II. METHOD

2.1. Background of Cryptocurrency Token

Cryptocurrency, which can safely preserve assets using public blockchain networks, has recently become a significant issue. However, after cryptocurrency started, it did not work correctly as a currency. This is because there are few places to use cryptocurrency, which is used for investment purposes. As use is deactivated, cryptocurrency prices become unstable and change rapidly. These problems can reduce the value of cryptocurrency. To solve these problems and revitalize it, tokens have been minted to promote consumption in various fields. Tokens are used to sell ownership of the information that cannot be contained in the blockchain. Customers purchase the information recorded in tokens using cryptocurrency. There are two types of tokens: FTs and NFTs. The FT value is the same as other FTs. It is possible to exchange tokens with each other. In contrast, an NFT has a different value compared with other NFTs. The cryptocurrency Ethereum defines rules for the token, called ERC-20 and ERC-721, to prevent abuse and fraud. When the market wants to mint the token, it must have followed the ERC rules. Figure 1 shows the concept of an FT and NFT.

Figure 1. Concept of fungible and non-fungible tokens.

Since it is difficult to define the same value with other tokens, the token market usually uses NFTs to mint their properties.

2.2. Conventional NFT

In general, NFTs are used to validate the ownership of various kinds of digital contents. Artists create digital contents and upload them to the NFT market. The market saves the art in its database or decentralized system to preserve the contents. Then, the market mints the token of art. By minting an NFT, the token must follow the ERC-721 rules. Since the owner, information, and transaction of tokens can be confirmed through ERC-721, it is possible to prevent the illegal issuance of tokens and obtain objective reliability with the disclosure of information. Then, the administrator adds the detailed digital art information metadata by minting. This is because it can record the transaction of NFT, but it is not easy to upload all information about an NFT in the blockchain network. If the block size becomes large, the customer and administrator must pay an expensive fee for the transaction. Therefore, it is inefficient for NFT. Thus, it stores the detailed information respectively. Figure 2 shows the concept of NFT minting.

Figure 2. Non-fungible token minting process.

After minting the token, the market uploads the token and brief art information to sell the token to the customer. The customer can buy art ownership by acquiring cryptocurrency and preserving the token in their electrical wallet called a MetaMask. Finally, the customer will have a token that can claim ownership of the artist’s digital content. In addition, the token has metadata information that can check the detailed information about the work. Figure 3 shows an example of metadata and an image of a token in MetaMask.

Figure 3. Creating metadata of non-fungible tokens (NFT): (a) defined metadata on backend, (b) NFT metadata.

Therefore, the advantage is that it can claim ownership of digital content using NFT and be recognized as a unique one because transaction records, such as for games, art, and sound sources sold as NFT, are stored on the blockchain. Moreover, the NFT market is currently attempting to sell real property by applying the concept of NFT.

However, NFT has some problems for selling real properties. A conventional NFT usually sells 2D images or animations [8–11]. However, to sell real property with three dimensions, the token must visualize the part or 3D information of properties. Furthermore, in some cases, expensive properties are sold in installments, so these cases should also be considered, but it is challenging to implement them with the current NFT.

In addition, NFT has copyright problems. Anyone can copy an art masterpiece and mint their own NFT. Therefore, copyright infringement in the NFT market is severe. Furthermore, some people impersonate celebrities and mint the token without the celebrities’ permission. It can cause the serious problem of claiming ownership of tokens.

Moreover, even if the NFT metadata is duplicated, it may be difficult to distinguish between real and fake tokens. Consequently, it may lead to incorrect token purchases. Transaction tracking can track the person who mints the tokens. However, the process is complicated, and the customer may find it difficult to get a refund or recover the customer’s property according to the NFT ecosystem [10, 11].

To solve these problems, we propose a new NFT system that can generate 3D images and share 3D properties using the integral imaging technique. Moreover, our proposed method can securely preserve the metadata with the DRPE method for on- and off-chain systems.

III. NFT for real 3D expensive property

3.1. NFT Based on Integral Imaging

A conventional NFT only represents 2D or short animation to show digital art and other contents. However, in the case of real property, it cannot represent 3D property information. So, to commercialize the real 3D property, a 3D image reconstruction technique is required.

Integral imaging is one of the passive optical 3D imaging methods. It can generate 3D images without a coherent light source and expensive devices. It only uses a lens array and picks up different perspectives of the 3D object, which is called an elemental image. Then, it can reconstruct the 3D image through the lens array. Figure 4 shows the concept of the integral imaging technique.

Figure 4. Concept of integral imaging.

To reconstruct the 3D image with the computational method, volumetric computational reconstruction (VCR) has been used. VCR uses elemental images and reconstructs 3D images through a virtual pinhole. Figure 5 shows the VCR reconstruction process.

Figure 5. Volumetric computational reconstruction.

Finally, the 3D image can be generated on the reconstruction plane as follows:

Sx=IxpfCxZr

Rx,zr=1L(x,zr) k=1KEk(x+Sxk1)

where Ix is the number of elemental image pixels, f is the focal length of the camera, p is the pitch between virtual pinholes, Cx is the sensor size, Sx represents the shifting pixel value of each elemental image on the reconstruction plane, zr represents the reconstruction depth on the reconstruction plane, Ek is the elemental image and L(x, zr) is the overlapping matrix of the reconstruction process. Finally, the 3D image R(x, zr) can be generated. This 3D image can represent the depth information of real properties according to the reconstruction depth zr. In addition, if the property is expensive, it can share the property according to the depth information. Therefore, NFT can represent the real property’s 3D information through the 3D image by using integral imaging. Figure 6 shows 3D images with different depth planes.

Figure 6. 3D images with different depth information: (a) front depth and (b) middle depth.

However, NFT has copyright and token fraud problems where the authentic token information and metadata are illegally copied. Since NFT metadata represents the NFT detail information, it is dangerous to expose it. It can cause incorrect NFT purchases, abuse of NFT, and serious financial problems. To prevent financial damage, we propose a method that can securely preserve the real property data using image data encryption systems.

3.2. NFT Metadata Encryption Based on Double Random Phase Encryption (DRPE)

Recently, a 3D image encryption technique has been used to safely preserve sensitive personal data and medical images [23–25]. DRPE is a simple optical encryption method that uses two random phase masks by an 4f optical imaging system. Figure 7 illustrates the DRPE encryption and decryption process.

Figure 7. Double random phase encryption.

To encrypt the image, a spatial domain mask n(x) and frequency domain mask n(μ) are required. Then the encrypted image can be represented as follows:

Ex=F1Ffxexpi2πnxexpi2πnμ

where f(x) represents the original image, and F, F −1 are referred to as Fourier transform and inverse Fourier transform, respectively. By multiplying two random phase masks through Fourier transform, the encrypted data [E(x)] can be generated. To decrypt the image, the conjugate of the second random phase mask is needed. the decryption process is described as:

Dx=|F1FExexp2πnμ|

Finally, the decrypted image D(x) can be obtained. It can be used to preserve the metadata securely. Therefore, it can prevent fake token minting that copies genuine token metadata. In addition, it can be used not only in on-chain systems, but also off-chain ones.

3.3. NFT for 3D Real Property by Using Integral Imaging and DRPE

To explain the commercialization of 3D NFT by using the integral imaging technique and DRPE, Fig. 8 shows the whole 3D NFT minting process.

Figure 8. Minting process of proposed method.

Our proposed method is based on the private blockchain system for the group that wants to buy 3D property NFTs. It is easier to manage minted 3D NFTs on a private blockchain compared to the public blockchain when some problems occur in the transaction. To mint the 3D image, the seller should have to guarantee the 3D properties and take the elemental image through the specific reconstruction parameters. This is because parameters such as sensor size, pitch value, and focal length can be the detailed information of 3D NFTs. Then, the seller generates a 3D image of the properties and should have to make each image’s warranty. Our proposed method uses the optical parameter and reconstruction depth information as the warranty of the 3D image. These values are unique and easily proven and verified information. These warranties will be preserved in the interplanetary file system (IPFS). If the seller has database problems or negligence in management, it can cause information loss in NFT. However, IPFS can save the file with the distributed file system and share the data through the peer-to-peer network. Thus, our proposed method preserves the data in IPFS. When we upload the data in IPFS, we can get the hash code value of the data. We make an image for encryption that contains the hash code, as shown in Fig. 9.

Figure 9. Generating the hash code image for encryption.

Our proposed method generates the image containing the warranty image hash codes and encrypts the image using DRPE. Then, we mint the 3D NFT with metadata that contains the random phase mask information and the minimal information about the 3D NFT. The seller sends the random phase mask information through the NFT metadata. Consequently, it can preserve the random phase mask information in an on-chain system. To decrypt the image, the customer also needs the encrypted image from the seller. Sellers can propose DRPE by sending an encrypted image with an off-chain rather than an on-chain method. Even if metadata is exposed, it is meaningless without the encrypted image, so random phase mask information and encrypted images are essential to restore the data. Finally, it can preserve the 3D NFT metadata securely. Figure 10 represents the secure data transmission process.

Figure 10. Metadata and encrypted image transmission process.

Consumers can decrypt the encrypted image by using the metadata information and verify the warranty of a 3D NFT with the hash code in the encrypted image, which is stored in the IPFS. This warranty should not be exposed because it is essential to prove ownership of the customer’s 3D NFT. Figure 11 represents the sample warranty image that can verify the detailed information of the 3D NFT.

Figure 11. Verifying warranty through the decryption process.

Finally, our proposed method can mint NFT with 3D depth information. Furthermore, it can share the real property according to the depth reconstruction information. Therefore, it can be helpful in various NFT industries that want to make 3D property NFTs. Moreover, we used the DRPE technique in the NFT metadata. It can prevent indiscriminate fake NFT minting and securely NFT ownership. To show our proposed method, we show a simulated application for the 3D NFT in the next section.

IV. Experiment and setup

Since we have to pay a charge to make a transaction, we used the personal test blockchain network called Ganache. To mint the NFT, our proposed method followed ERC-721, which is required for NFT transactions. We used Solidity and Truffle to compose ERC-721 and the backend of the NFT. In addition, to compose the web application for the 3D NFT, we used the React and Drizzle libraries. Also, we used the IPFS system to securely save the 3D NFT detail information and warranty. Figure 12 shows the whole concept of our proposed method.

Figure 12. Whole network process of proposed method.

To generate a 3D image of a property with integral imaging, we used a 7(H) × 7(V) camera array as depicted in Fig. 13.

Figure 13. Optical experiments setup.

Each elemental image has 2,000 (H) × 3,000 (V) resolutions. The camera focal length is 50 mm, and pitch value is 2 mm. Then, a 3D image can be generated according to the depth between the camera and 3D properties. To mint the tokens that have different values according to the reconstruction depth, our proposed method generates two 3D images with different depths. Figure 14 shows the 3D property image representing the different depth information.

Figure 14. 3D images that (a) contain 200 mm depth information and (b) 250 mm depth information.

Our method can mint a token that contains 3D depth information. To guarantee the 3D property value, the seller makes a warranty image for NFT. The warranty contains the detailed information of 3D images and depth information. To securely maintain the warranty information, our method uploads the 3D NFT warranty in IPFS. Then we can obtain the hash information of the warranty. Our method puts the hash information in the image and encrypts the information by using DRPE. Figure 15 represents the encryption process of the 3D NFT and Table 1 shows the image visual quality metrics results to prove the DRPE encryption performance.

TABLE 1. Image visual quality metrics.

ImagesCorrelationSSIM
Encrypted Image0.01410.0043
Decrypted Imagea)0.01370.0081
Decrypted Imageb)1.0001.000


Figure 15. Security enhancement of the 3D non-fungible tokens (NFT) warranty: (a) Upload important information of 3D NFT in interplanetary file system (IPFS) and (b) encrypt the hash code of warranty.

To commercialize 3D NFT, the minting process is needed. To mint a 3D NFT, we use our web application, upload the 3D image in IPFS, and put the hash information as the metadata of the NFT. Then our method puts the second random phase mask information in the metadata. Figure 16 represents the web application mint function and metadata of the 3D NFT.

Figure 16. Minting 3D non-fungible tokens (NFT).

If a customer buys a 3D NFT, the seller sends the token to the customer’s cryptocurrency account. In addition, the seller prepares the encrypted image and passes it on to the customer without decryption. The customer can decrypt the image using second random phase mask information in the metadata. Finally, the customer can access the hash information of the 3D NFT warranty, which is preserved in IPFS. Consequently, it can only be accessed by the person who bought the 3D NFT. Figures 17 and 18 show the token list and warranty information of the decryption process, respectively.

Figure 17. Token list of 3D NFT.

Figure 18. Hash information of decryption process.

Finally, our proposed method can mint the 3D depth information NFT of real properties through the VCR. It has the advantage of being able to purchase by sharing expensive real property. Furthermore, our proposed method solves the ownership and copyright issues of NFT with the optical encryption method, DRPE. Moreover, it uses on- and off-chain systems to send the encrypted image and random phase mask key to preserve the important information of the 3D NFT. Therefore, our proposed method can prevent critical damage to the consumer’s real properties.

V. Conclusion

In this paper, we have proposed a NFT that can represent 3D real property information using the computational 3D reconstruction method. In addition, we used the optical encryption method, DRPE, to preserve the vital NFT ownership information. Since the public cryptocurrency network can record the transaction of tokens, it can be possible to purchase the ownership of things securely. To use the advantages of the network, the NFT market attempted to sell real 3D property NFT. However, providing 3D information to consumers was difficult. Our proposed method can solve this problem and suggests sharing the property through 3D depth images. It can also be used in 3D token exhibition with a 3D point cloud algorithm. In addition, the current digital NFT is causing many problems due to indiscriminate ownership copying and copyright infringement. However, if the same problem occurs in 3D real property, it causes significant financial damage to consumers. To solve this problem, we used DRPE to access documents that only consumers could claim for ownership of tokens. We believe our proposed method will greatly help mint 3D property tokens and can be used in various 3D decentralized application fields. Additionally, we used the simple encryption method DRPE to propose the concept of 3D NFT minting and metadata encryption using on- and off-chain systems. To enhance the security performance, we will use the latest security techniques in the future.

DISCLOSURES

The authors declare no conflicts of interest.

DATA AVAILABILITY

Data underlying the results presented in this paper are not publicly available at the time of publication, which may be obtained from the authors upon reasonable request.

ACKNOWLEDGMENT

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government(MSIT) (NRF-2020R1F1A1068637).

FUNDING

National Research Foundation of Korea (NRF-2020 R1F1A1068637).

Fig 1.

Figure 1.Concept of fungible and non-fungible tokens.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 2.

Figure 2.Non-fungible token minting process.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 3.

Figure 3.Creating metadata of non-fungible tokens (NFT): (a) defined metadata on backend, (b) NFT metadata.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 4.

Figure 4.Concept of integral imaging.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 5.

Figure 5.Volumetric computational reconstruction.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 6.

Figure 6.3D images with different depth information: (a) front depth and (b) middle depth.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 7.

Figure 7.Double random phase encryption.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 8.

Figure 8.Minting process of proposed method.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 9.

Figure 9.Generating the hash code image for encryption.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 10.

Figure 10.Metadata and encrypted image transmission process.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 11.

Figure 11.Verifying warranty through the decryption process.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 12.

Figure 12.Whole network process of proposed method.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 13.

Figure 13.Optical experiments setup.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 14.

Figure 14.3D images that (a) contain 200 mm depth information and (b) 250 mm depth information.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 15.

Figure 15.Security enhancement of the 3D non-fungible tokens (NFT) warranty: (a) Upload important information of 3D NFT in interplanetary file system (IPFS) and (b) encrypt the hash code of warranty.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 16.

Figure 16.Minting 3D non-fungible tokens (NFT).
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 17.

Figure 17.Token list of 3D NFT.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

Fig 18.

Figure 18.Hash information of decryption process.
Current Optics and Photonics 2022; 6: 565-575https://doi.org/10.3807/COPP.2022.6.6.565

TABLE 1 Image visual quality metrics

ImagesCorrelationSSIM
Encrypted Image0.01410.0043
Decrypted Imagea)0.01370.0081
Decrypted Imageb)1.0001.000

References

  1. M. Swan, Blockchain: Blueprint for a new economy (O’Reilly, USA, 2015).
  2. M. Nofer, P. Gomber, O. Hinz, and D. Schiereck, “Blockchain,” Bus. Inform. Syst. Eng. 59, 183-187 (2017).
    CrossRef
  3. M. P. Mcbee and C. Wilcox, “Blockchain technology: Principles and applications in medical imaging,” J. Digit. Imaging 33, 726-734 (2020).
    Pubmed KoreaMed CrossRef
  4. K. Koptyra and M. R. Ogiela, “Imagechain—Application of blockchain technology for images,” Sensors 21, 82 (2021).
    Pubmed KoreaMed CrossRef
  5. C. Dannen, “Introducing Ethereum and Solidity,” (Springer, NY, USA, 2017).
    CrossRef
  6. D. Vujičić, D. Jagodić, and S. Ranđić, “Blockchain technology, bitcoin, and Ethereum: A brief overview,” in Proc 17th International Symposium INFOTEH-JAHORINA-INFOTEH (East Sarajevo, Bosnia and Herzegovina, Mar. 21-23, 2018).
    CrossRef
  7. U. W. Chohan, “Non-fungible tokens: Blockchains, scarcity, and value,” Critical Blockchain Research Initiative (CBRI) working papers, Islamabad, Pakistan (2021).
    CrossRef
  8. Q. Wang, R. Li, Q. Wang, and S. Chen, “Non-fungible token (nft): Overview, evaluation, opportunities and challenges,” arXiv:2105.07447 (2021).
  9. V. Despotovic, D. Bjelica, and D. Barac, “Analysis of potential NFT applications,” E-bus. Technol. Conf. Proc. 2, 103-107, (2022)
  10. G. A. Pierro, M. sawaf, and R. Tonelli, “Original or Fake? How to understand the digital artworks’ value in the blockchain,” in Proc. Software Engineering and Formal Methods-SEFM 2021 (Virtual Conference, Dec. 6-10, 2022), pp. 76-85.
    CrossRef
  11. D. Das, P. Bose, N. Ruaro, C. Krugel, and G. Vigna, “Understanding security issues in the NFT ecosystem,” in Proc. ACM conference on computer and communications security-CSS, (LA, USA, Nov. 7-11, 2022).
  12. G. Lippmann, “La photographie integrale,” Comptes Rendus Acad. Sci 146, 446-451 (1908).
  13. J.-S. Jang and B. Javidi, “Three-dimensional synthetic aperture integral imaging,” Opt. Lett. 27, 1144-1146 (2002).
    Pubmed CrossRef
  14. S.-H. Hong, J.-S. Jang, and B. Javidi, “Three-dimensional volumetric object reconstruction using computational integral imaging,” Opt. Express 12, 483-491 (2004).
    Pubmed CrossRef
  15. M. Cho and D. Shin, “3D integral imaging display using axially recorded multiple images,” J. Opt. Soc. Korea 17, 410-414 (2013).
    CrossRef
  16. B. Cho, P. Kopycki, M. Martinez-Corral, and M. Cho, “Computational volumetric reconstruction of integral imaging with improved depth resolution considering continuously non-uniform shifting pixels,” Opt. Lasers Eng. 111, 114-121 (2018).
    CrossRef
  17. H. Yun, A. Llavador, G. Saavedra, and M. Cho, “Three-dimensional imaging system with both improved lateral resolution and depth of field considering non-uniform system parameters,” Appl. Opt. 57, 9423-9431 (2018).
    Pubmed CrossRef
  18. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 34-39 (1994).
    CrossRef
  19. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
    Pubmed CrossRef
  20. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the fresnel domain,” Opt. Lett. 24, 762-764 (1999).
    Pubmed CrossRef
  21. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644-1646 (2005).
    Pubmed CrossRef
  22. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253-10265 (2007).
    Pubmed CrossRef
  23. J. Lee, M. Cho, and M.-C. Lee, “Three-dimensional photon counting optical encryption with enhanced visual quality and security level,” IEEE Access 9, 128862-128869 (2021).
    CrossRef
  24. H. Zeng, Y. Xing, S. Kim, and X. Li, “ Designing real-time 3D image security with CA-based random mode decomposition,” Signal Process. 197, 108554 (2022).
    CrossRef
  25. Y. Li, T. wang, Y. Liao, D. Li, and X. Li, “3D medical images security via light-field imaging,” Opt. Lett. 47, 3535-3538 (2022).
    Pubmed CrossRef