Icacci 2014 image security_presentation final
-
Upload
jay22kar -
Category
Engineering
-
view
77 -
download
5
Transcript of Icacci 2014 image security_presentation final
![Page 1: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/1.jpg)
Sub-Band Exchange DWT Based Image
Fusion Algorithm for Enhanced Security
Jaypal Baviskar, Afshan MullaImage Processing Department
Intelligent Communication Lab
Mumbai, India
Email: [email protected] Contact: +91 8983079121
[email protected] +919867414095
![Page 2: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/2.jpg)
Overview
• Introduction
• Proposed ‘Sub-band Exchange Image Fusion Algorithm’ Methodology
• Results
• Performance Evaluation
• Conclusion
2
![Page 3: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/3.jpg)
Introduction
• Transmission of critical data over the link, in the presence of an attacker has augmented
the demand for secure communication
• In defensive information warfare arena, securing communication between substations &
exchange of confidential data viz. images, text, audio etc. in a secure manner is very
crucial
• Hence, need for robust image encryption methods and security enhancement
techniques has aggravated
• Probability of secret military images being intercepted should be mitigated & the
criticality of the application contexts should be solved
• In this presentation, a Discrete Wavelet Transform (DWT) Sub-band Exchange
based color image fusion scheme for enhanced security is proposed
• An extremely unique algorithm that; Facilitates improvement in security of images that are shared between military base camps,
Provides compression with minimum quality degradation
3
![Page 4: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/4.jpg)
Proposed Image Security
Algorithm
4
Fig.1: System Model for Image Fusion Technique
![Page 5: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/5.jpg)
A. Mapping RGB Images to Fused
Textured Gray-scale Images
5
Fig.2: Original Color Test Image
Fig.3: (a) DWT Applied on Y-Component of both images, (b)
Sub-bands replaced by Original Cb and Cr Components of
switched images
Fig.4: Fused Textured Gray-scale Image
![Page 6: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/6.jpg)
B. Retrieving the Original RGB
Image at Authenticated User end
6
Fig.5: Retrieved Cb-Cr Components
of Image1 and Image2
Fig.6: (a) DWT Applied on Textured Gray-scale
Images and Interpolated, to retrieved Y-components
Fig.7: Retrieved RGB Color Images
![Page 7: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/7.jpg)
Result Analysis And
Performance Evaluation
• A. Security aspects of the algorithm
1) The probability of interception (P) = 1 / (Number Of Images to be fused)
2) The number of combinations (n) = NCr
where; N= Number of Images and r = Required images for combination
7
Fig.8: Probability of interception by attacker vs.
Number of Images
Fig.9: Possible number of combinations vs. Number
of Images
![Page 8: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/8.jpg)
• B. Comparison of original and recovered RGB image: (RGB Plot)
8
Result Analysis And
Performance Evaluation
Fig.10: (a) RGB Plot for Original Image1, (b) RGB Plot for Reconstructed Image1
Fig. 11: (a) RGB Plot for Original Image2, (b) RGB Plot for Reconstructed Image2
![Page 9: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/9.jpg)
• B. Comparison of original and recovered RGB image: (NCC)
9
Result Analysis And
Performance Evaluation
Fig.12: Normalized Cross-Correlation Plot of image1
Fig.13: Normalized Cross-Correlation Plot of image2
![Page 10: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/10.jpg)
• C. Evaluation of image quality parameters1. PSNR
2. CR
3. MSE and RMSE
10
Result Analysis And
Performance Evaluation
Table 1: Analysis Of Image Quality Parameters
![Page 11: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/11.jpg)
Conclusion
• The algorithm implemented in this paper facilitates enhanced security as well as quality
conscience compression ratio
• It is based on an extremely unique method known as 2-level DWT based Sub-band
Exchange Image Fusion Technique
• Conversion of RGB images to fused textured gray-scale images provides acceptable
compression for military image database
• The bandwidth utilization and processing time required for transmission of these images
is minimized to great extent
11
![Page 12: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/12.jpg)
Conclusion
• It facilitates improved security, in terms of preventing the attacker from getting hold on
images transmitted over the link, since chrominance components are randomly
swapped
• Offers high compression ratio, maintaining good PSNR value, thereby mitigating errors
• The algorithm is a highly reliable and competitive image encryption scheme in image
processing domain
12
![Page 13: Icacci 2014 image security_presentation final](https://reader034.fdocuments.in/reader034/viewer/2022042818/55ad19831a28abe03c8b47ab/html5/thumbnails/13.jpg)
Thank You