Translator Disclaimer
Paper
15 June 2015 Double image encryption using gyrator wavelet transform
Author Affiliations +
Proceedings Volume 9654, International Conference on Optics and Photonics 2015; 96542D (2015) https://doi.org/10.1117/12.2181708
Event: International Conference on Optics and Photonics 2015, 2015, Kolkata, India
Abstract
In this paper, we implement a novel optical information processing tool termed as gyrator wavelet transform for the application of double image encryption using amplitude- and phase-truncation approach. This approach enhances the key space in an asymmetric cryptosystem by adding supplementary security layers, i.e., family of mother wavelet and the gyrator transform order. Double input images bonded with random phase masks are independently gyrator transformed. Amplitude truncation of obtained spectrum generates individual and universal keys while phase truncation generates two real-valued functions. Each of the retrieved amplitude function is discrete wavelet transformed, which results into four different frequency bands. We have fused the obtained wavelet spectrum of an individual image by again gyrator transforming them following amplitude- and phase truncation. The obtained real-valued functions corresponding to each image are bonded to form the encrypted image. After using the correct universal key, individual asymmetric key, type of wavelet, and correct gyrator transform order, the original images are retrieved successfully. Numerical simulation results prove that the proposed scheme is more flexible and effective than existing wavelet fusion schemes.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Isha Mehra and Naveen K. Nishchal "Double image encryption using gyrator wavelet transform", Proc. SPIE 9654, International Conference on Optics and Photonics 2015, 96542D (15 June 2015); https://doi.org/10.1117/12.2181708
PROCEEDINGS
6 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT


Back to Top