首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging
Institution:1. Laboratoire de Photovoltaïque, Centre de Recherche et des Technologies de l’énergie, BP 95, Hammam-Lif 2050, Tunisia;2. Laboratoire de Photonique et de Nanostructures, CNRS Route de Nozay, Marcoussis, France;1. Institute of Nanostructure Technologies and Analytics (INA), University of Kassel, Germany;2. Center for Interdisciplinary Nanostructure Science and Technology (CINSaT), University of Kassel, Germany;3. Department of Macromolecular Chemistry and Molecular Materials, University of Kassel, Germany;1. Departament de Física, Universitat de les Illes Balears, Ctra de Valldemossa km 7,5, 07122 Palma de Mallorca, Illes Balears, Spain;2. CENER (National Renewable Energy Center), Solar Thermal Energy Department, C/Ciudad de la Innovación, 7, 31621 Sarriguren, Navarra, Spain;1. School of Physics and Electronics, Central South University, Changsha 410083, China;2. Hunan Key Laboratory for Super-microstructure and Ultrafast Process, Changsha 410083, China
Abstract:In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people?s attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks.
Keywords:Image fusion  Watermarking  Asymmetric cryptosystem  Wavelet transforms  Fractional Fourier transform
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号