Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging

Abstract In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people׳s attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks.

[1]  Ke Deng,et al.  A blind robust watermarking scheme with non-cascade iterative encrypted kinoform. , 2011, Optics express.

[2]  Nobukatsu Takai,et al.  Digital watermarking by a holographic technique. , 2002, Applied optics.

[3]  H J Wang,et al.  Wavelet-based digital image watermarking. , 1998, Optics express.

[4]  Linfei Chen,et al.  Gray images embedded in a color image and encrypted with FRFT and Region Shift Encoding methods , 2010 .

[5]  Isha Mehra,et al.  Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. , 2014, Optics express.

[6]  X G Xia,et al.  Wavelet transform based watermark for digital images. , 1998, Optics express.

[7]  Bahram Javidi,et al.  Optical and Digital Techniques for Information Security , 2004 .

[8]  D Mendlovic,et al.  Optical realization of the wavelet transform for two-dimensional objects. , 1993, Applied optics.

[9]  Wen-Liang Hwang,et al.  An asymmetric subspace watermarking method for copyright protection , 2005, IEEE Trans. Signal Process..

[10]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[11]  Isha Mehra,et al.  Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase- truncation approach , 2014 .

[12]  Bahram Javidi Optical imaging sensors and systems for homeland security applications , 2006 .

[13]  Dariusz Bogumil,et al.  An asymmetric image watermarking scheme resistant against geometrical distortions , 2006, Signal Process. Image Commun..

[14]  Bahram Javidi,et al.  Information hiding technique with double phase encoding. , 2002, Applied optics.

[15]  Wenqi He,et al.  Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment. , 2013, Optics letters.

[16]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[17]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[18]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[19]  Naveen K. Nishchal Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding , 2011 .

[20]  Xueju Shen,et al.  Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[21]  Wen Chen,et al.  Optical asymmetric cryptography using a three-dimensional space-based model Optical asymmetric crypt , 2011 .

[22]  Lu Xi,et al.  Information hiding based on double random-phase encoding and public-key cryptography. , 2009, Optics express.

[23]  Bahram Javidi,et al.  Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[24]  Taejeong Kim,et al.  Transformed-key asymmetric watermarking system , 2001, IS&T/SPIE Electronic Imaging.

[25]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[26]  Qindong Sun,et al.  Double-image encryption using discrete fractional random transform and logistic maps , 2014 .

[27]  Daomu Zhao,et al.  Color image encoding in dual fractional Fourier-wavelet domain with random phases , 2009 .

[28]  Linfei Chen,et al.  Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. , 2006, Optics express.

[29]  Guo-Shiang Lin,et al.  Public-key-based optical image cryptosystem based on data embedding techniques , 2003 .

[30]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[31]  Junli Liang,et al.  Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain , 2014 .

[32]  Zhou Xin,et al.  An improved watermarking method based on double random phase encoding technique , 2010 .

[33]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[34]  Yen-Lin Chen,et al.  Steganographic optical image encryption system based on reversible data hiding and double random phase encoding , 2013 .

[35]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[36]  Naveen K Nishchal,et al.  Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.

[37]  Cuong Manh Do,et al.  Multi-Spectral Holographic Three-Dimensional Image Fusion Using Discrete Wavelet Transform , 2006, Journal of Display Technology.

[38]  Jean-Jacques Quisquater,et al.  Which directions for asymmetric watermarking? , 2002, 2002 11th European Signal Processing Conference.

[39]  Yong-Gang Fu Asymmetric Watermarking Scheme Based on Shuffling , 2012 .

[40]  Ayman Alfalou,et al.  Dual encryption scheme of images using polarized light. , 2010, Optics letters.

[41]  Yicong Zhou,et al.  Image encryption in the wavelet domain , 2013, Defense, Security, and Sensing.

[42]  Isha Mehra,et al.  Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon , 2014 .