کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
743220 1461725 2015 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging
ترجمه فارسی عنوان
علامت های نامتقارن نوری با استفاده از ترکیب موجک اصلاح شده و تصویربرداری پراکنده
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی مهندسی برق و الکترونیک
چکیده انگلیسی


• Modified wavelet fusion technique along with diffractive imaging has been developed for generating the asymmetric keys.
• Encryption is performed using phase truncation approach and corresponding diffraction patterns are recorded as ciphertexts.
• For decryption, phase retrieval algorithm is applied to extract the plaintexts from corresponding retrieved watermarks.
• The support constraints are embedded into three different host images in order to disguise the attackers.

In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people׳s attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Optics and Lasers in Engineering - Volume 68, May 2015, Pages 74–82
نویسندگان
, ,