Wavelet-based image fusion for securing multiple images through asymmetric keys

被引:33
作者
Mehra, Isha [1 ]
Nishchal, Naveen K. [1 ]
机构
[1] Indian Inst Technol Patna, Dept Phys, Patna 800013, Bihar, India
关键词
Image fusion; Optical asymmetric cryptosystem; Wavelet transforms; Interference; Fractional Fourier transform; TRUNCATED FOURIER-TRANSFORMS; RANDOM-PHASE KEYS; OPTICAL ENCRYPTION; FRESNEL DOMAIN; CRYPTOSYSTEM; ALGORITHM; INTERFERENCE; COMPRESSION; ATTACK; AMPLITUDE;
D O I
10.1016/j.optcom.2014.09.040
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Image fusion is one of the popular methods which provides better quality fused image for interpreting an image data. Discrete wavelet transform based fusion technique is one such method, in which low and high frequency components are merged together to improve the image content. In this paper, we propose this fusion technique for generating asymmetric keys for securing multiple images. An input image to be encrypted is digitally encoded into two phase-only masks employing the principle of optical interference. This process has been repeated for three different input images; however, it can be extended to n images. Now, one of the phase-only masks corresponding to each input image is preserved as a phase key while another set of phase masks are fused together. This fused image is called the encrypted image. Unlike optical asymmetric encryption technique based on amplitude- and phase-truncation approach, here, four asymmetric keys are generated corresponding to each image. Asymmetric keys corresponding to each image, fractional orders, phase-only masks, level of decomposition and type of wavelet, enlarge the key space and hence offer enhanced security. The proposed method is demonstrated through the simulation results. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:153 / 160
页数:8
相关论文
共 35 条
[1]   Simultaneous fusion, compression, and encryption of multiple images [J].
Alfalou, A. ;
Brosseau, C. ;
Abdallah, N. ;
Jridi, M. .
OPTICS EXPRESS, 2011, 19 (24) :24023-24029
[2]   Optical image compression and encryption methods [J].
Alfalou, A. ;
Brosseau, C. .
ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (03) :589-636
[3]   Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption [J].
Alfalou, A. ;
Brosseau, C. .
OPTICS LETTERS, 2010, 35 (11) :1914-1916
[4]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[5]  
Chen L., 2009, OPT COMMUN, V254, P361
[6]   Security improvement for asymmetric cryptosystem based on spherical wave illumination [J].
Ding, Xiangling ;
Deng, Xiaopeng ;
Song, Kehui ;
Chen, Guangyi .
APPLIED OPTICS, 2013, 52 (03) :467-473
[7]   Resistance of the double random phase encryption against various attacks [J].
Frauel, Yann ;
Castro, Albertina ;
Naughton, Thomas J. ;
Javidi, Bahram .
OPTICS EXPRESS, 2007, 15 (16) :10253-10265
[8]   A known-plaintext heuristic attack on the Fourier plane encryption algorithm [J].
Gopinathan, U ;
Monaghan, DS ;
Naughton, TJ ;
Sheridan, JT .
OPTICS EXPRESS, 2006, 14 (08) :3181-3186
[9]   Three-dimensional image fusion by use of multiwavelength digital holography [J].
Javidi, B ;
Ferraro, P ;
Hong, SH ;
De Nicola, S ;
Finizio, A ;
Alfieri, D ;
Pierattini, G .
OPTICS LETTERS, 2005, 30 (02) :144-146
[10]  
Javidi B., 2005, Optical and Digital Techniques for Information Security