SlideShare a Scribd company logo
Sub-Band Exchange DWT Based Image 
Fusion Algorithm for Enhanced Security 
Jaypal Baviskar, Afshan Mulla 
Image Processing Department 
Intelligent Communication Lab 
Mumbai, India 
Email: jaypal.baviskar@intelcomlab.com Contact: +91 8983079121 
afshan.mulla@intelcomlab.com +919867414095
Overview 
• Introduction 
• Proposed ‘Sub-band Exchange Image Fusion Algorithm’ Methodology 
• Results 
• Performance Evaluation 
• Conclusion 
2
Introduction 
• Transmission of critical data over the link, in the presence of an attacker has augmented 
the demand for secure communication 
• In defensive information warfare arena, securing communication between substations & 
exchange of confidential data viz. images, text, audio etc. in a secure manner is very 
crucial 
• Hence, need for robust image encryption methods and security enhancement 
techniques has aggravated 
• Probability of secret military images being intercepted should be mitigated & the 
criticality of the application contexts should be solved 
• In this presentation, a Discrete Wavelet Transform (DWT) Sub-band Exchange 
based color image fusion scheme for enhanced security is proposed 
• An extremely unique algorithm that; 
 Facilitates improvement in security of images that are shared between military base camps, 
 Provides compression with minimum quality degradation 
3
Proposed Image Security 
Algorithm 
4 
Fig.1: System Model for Image Fusion Technique
A. Mapping RGB Images to Fused 
Textured Gray-scale Images 
5 
Fig.2: Original Color Test Image 
Fig.3: (a) DWT Applied on Y-Component of both images, (b) 
Sub-bands replaced by Original Cb and Cr Components of 
switched images 
Fig.4: Fused Textured Gray-scale Image
B. Retrieving the Original RGB 
Image at Authenticated User end 
6 
Fig.5: Retrieved Cb-Cr Components 
of Image1 and Image2 
Fig.6: (a) DWT Applied on Textured Gray-scale 
Images and Interpolated, to retrieved Y-components 
Fig.7: Retrieved RGB Color Images
Result Analysis And 
Performance Evaluation 
• A. Security aspects of the algorithm 
1) The probability of interception (P) = 1 / (Number Of Images to be fused) 
2) The number of combinations (n) = NCr 
where; N= Number of Images and r = Required images for combination 
7 
Fig.8: Probability of interception by attacker vs. 
Number of Images 
Fig.9: Possible number of combinations vs. Number 
of Images
• B. Comparison of original and recovered RGB image: (RGB Plot) 
8 
Result Analysis And 
Performance Evaluation 
Fig.10: (a) RGB Plot for Original Image1, (b) RGB Plot for Reconstructed Image1 
Fig. 11: (a) RGB Plot for Original Image2, (b) RGB Plot for Reconstructed Image2
• B. Comparison of original and recovered RGB image: (NCC) 
9 
Result Analysis And 
Performance Evaluation 
Fig.12: Normalized Cross-Correlation Plot of image1 
Fig.13: Normalized Cross-Correlation Plot of image2
• C. Evaluation of image quality parameters 
1. PSNR 
2. CR 
3. MSE and RMSE 
10 
Result Analysis And 
Performance Evaluation 
Table 1: Analysis Of Image Quality Parameters
Conclusion 
• The algorithm implemented in this paper facilitates enhanced security as well as quality 
conscience compression ratio 
• It is based on an extremely unique method known as 2-level DWT based Sub-band 
Exchange Image Fusion Technique 
• Conversion of RGB images to fused textured gray-scale images provides acceptable 
compression for military image database 
• The bandwidth utilization and processing time required for transmission of these images 
is minimized to great extent 
11
Conclusion 
• It facilitates improved security, in terms of preventing the attacker from getting hold on 
images transmitted over the link, since chrominance components are randomly 
swapped 
• Offers high compression ratio, maintaining good PSNR value, thereby mitigating errors 
• The algorithm is a highly reliable and competitive image encryption scheme in image 
processing domain 
12
Thank You

More Related Content

What's hot (16)

PDF
Estimation of Optimized Energy and Latency Constraint for Task Allocation in ...
ijcsit
 
PDF
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET Journal
 
PDF
AN ENHANCEMENT FOR THE CONSISTENT DEPTH ESTIMATION OF MONOCULAR VIDEOS USING ...
mlaij
 
PDF
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
TELKOMNIKA JOURNAL
 
PDF
A METHODOLOGY FOR IMPROVEMENT OF ROBA MULTIPLIER FOR ELECTRONIC APPLICATIONS
VLSICS Design
 
PDF
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
ijassn
 
PDF
N03430990106
ijceronline
 
PDF
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
IRJET Journal
 
PDF
HRNET : Deep High-Resolution Representation Learning for Human Pose Estimation
taeseon ryu
 
PDF
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET Journal
 
PDF
Improved block based segmentation for jpeg compressed document images
eSAT Journals
 
PDF
Survey on Single image Super Resolution Techniques
IOSR Journals
 
PDF
I017425763
IOSR Journals
 
PDF
Energy and latency aware application
csandit
 
PDF
Learning global pooling operators in deep neural networks for image retrieval...
Erlangen Artificial Intelligence & Machine Learning Meetup
 
PDF
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
IJERA Editor
 
Estimation of Optimized Energy and Latency Constraint for Task Allocation in ...
ijcsit
 
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET Journal
 
AN ENHANCEMENT FOR THE CONSISTENT DEPTH ESTIMATION OF MONOCULAR VIDEOS USING ...
mlaij
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
TELKOMNIKA JOURNAL
 
A METHODOLOGY FOR IMPROVEMENT OF ROBA MULTIPLIER FOR ELECTRONIC APPLICATIONS
VLSICS Design
 
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...
ijassn
 
N03430990106
ijceronline
 
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
IRJET Journal
 
HRNET : Deep High-Resolution Representation Learning for Human Pose Estimation
taeseon ryu
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET Journal
 
Improved block based segmentation for jpeg compressed document images
eSAT Journals
 
Survey on Single image Super Resolution Techniques
IOSR Journals
 
I017425763
IOSR Journals
 
Energy and latency aware application
csandit
 
Learning global pooling operators in deep neural networks for image retrieval...
Erlangen Artificial Intelligence & Machine Learning Meetup
 
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
IJERA Editor
 

Viewers also liked (6)

PDF
Image Registration using NSCT and Invariant Moment
CSCJournals
 
PPTX
4.Do& Martion- Contourlet transform (Backup side-4)
Nashid Alam
 
PPT
Image enhancement ppt nal2
Surabhi Ks
 
PPTX
IMAGE FUSION IN IMAGE PROCESSING
garima0690
 
PPTX
Comparison of image fusion methods
Amr Nasr
 
PPT
Digital Image Processing
Sahil Biswas
 
Image Registration using NSCT and Invariant Moment
CSCJournals
 
4.Do& Martion- Contourlet transform (Backup side-4)
Nashid Alam
 
Image enhancement ppt nal2
Surabhi Ks
 
IMAGE FUSION IN IMAGE PROCESSING
garima0690
 
Comparison of image fusion methods
Amr Nasr
 
Digital Image Processing
Sahil Biswas
 
Ad

Similar to Icacci 2014 image security_presentation final (20)

PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
PDF
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
PDF
Hf2513081311
IJERA Editor
 
PDF
Hf2513081311
IJERA Editor
 
PDF
Digital image watermarking using dct with high security of
IAEME Publication
 
PDF
Image Encryption Using Differential Evolution Approach in Frequency Domain
sipij
 
PDF
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
 
PDF
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
 
PDF
Image encryption
rakshit2105
 
PDF
A Novel Color Image Fusion for Multi Sensor Night Vision Images
Editor IJCATR
 
PDF
Blending of Images Using Discrete Wavelet Transform
rahulmonikasharma
 
PDF
International Journal of Engineering Research and Development
IJERD Editor
 
PDF
E1083237
IJERD Editor
 
PDF
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
PDF
Reversible Color Transformation: Method To Secure Secret Image By Transformin...
IJERA Editor
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
QUALITY ASSESSMENT OF PIXEL-LEVEL IMAGE FUSION USING FUZZY LOGIC
ijsc
 
PDF
F0153236
IOSR Journals
 
PDF
18. 23367.pdf
TELKOMNIKA JOURNAL
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Hf2513081311
IJERA Editor
 
Hf2513081311
IJERA Editor
 
Digital image watermarking using dct with high security of
IAEME Publication
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
sipij
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
 
Image encryption
rakshit2105
 
A Novel Color Image Fusion for Multi Sensor Night Vision Images
Editor IJCATR
 
Blending of Images Using Discrete Wavelet Transform
rahulmonikasharma
 
International Journal of Engineering Research and Development
IJERD Editor
 
E1083237
IJERD Editor
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
Reversible Color Transformation: Method To Secure Secret Image By Transformin...
IJERA Editor
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
QUALITY ASSESSMENT OF PIXEL-LEVEL IMAGE FUSION USING FUZZY LOGIC
ijsc
 
F0153236
IOSR Journals
 
18. 23367.pdf
TELKOMNIKA JOURNAL
 
Ad

Recently uploaded (20)

PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
MRRS Strength and Durability of Concrete
CivilMythili
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Day2 B2 Best.pptx
helenjenefa1
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
UNIT DAA PPT cover all topics 2021 regulation
archu26
 

Icacci 2014 image security_presentation final

  • 1. Sub-Band Exchange DWT Based Image Fusion Algorithm for Enhanced Security Jaypal Baviskar, Afshan Mulla Image Processing Department Intelligent Communication Lab Mumbai, India Email: [email protected] Contact: +91 8983079121 [email protected] +919867414095
  • 2. Overview • Introduction • Proposed ‘Sub-band Exchange Image Fusion Algorithm’ Methodology • Results • Performance Evaluation • Conclusion 2
  • 3. Introduction • Transmission of critical data over the link, in the presence of an attacker has augmented the demand for secure communication • In defensive information warfare arena, securing communication between substations & exchange of confidential data viz. images, text, audio etc. in a secure manner is very crucial • Hence, need for robust image encryption methods and security enhancement techniques has aggravated • Probability of secret military images being intercepted should be mitigated & the criticality of the application contexts should be solved • In this presentation, a Discrete Wavelet Transform (DWT) Sub-band Exchange based color image fusion scheme for enhanced security is proposed • An extremely unique algorithm that;  Facilitates improvement in security of images that are shared between military base camps,  Provides compression with minimum quality degradation 3
  • 4. Proposed Image Security Algorithm 4 Fig.1: System Model for Image Fusion Technique
  • 5. A. Mapping RGB Images to Fused Textured Gray-scale Images 5 Fig.2: Original Color Test Image Fig.3: (a) DWT Applied on Y-Component of both images, (b) Sub-bands replaced by Original Cb and Cr Components of switched images Fig.4: Fused Textured Gray-scale Image
  • 6. B. Retrieving the Original RGB Image at Authenticated User end 6 Fig.5: Retrieved Cb-Cr Components of Image1 and Image2 Fig.6: (a) DWT Applied on Textured Gray-scale Images and Interpolated, to retrieved Y-components Fig.7: Retrieved RGB Color Images
  • 7. Result Analysis And Performance Evaluation • A. Security aspects of the algorithm 1) The probability of interception (P) = 1 / (Number Of Images to be fused) 2) The number of combinations (n) = NCr where; N= Number of Images and r = Required images for combination 7 Fig.8: Probability of interception by attacker vs. Number of Images Fig.9: Possible number of combinations vs. Number of Images
  • 8. • B. Comparison of original and recovered RGB image: (RGB Plot) 8 Result Analysis And Performance Evaluation Fig.10: (a) RGB Plot for Original Image1, (b) RGB Plot for Reconstructed Image1 Fig. 11: (a) RGB Plot for Original Image2, (b) RGB Plot for Reconstructed Image2
  • 9. • B. Comparison of original and recovered RGB image: (NCC) 9 Result Analysis And Performance Evaluation Fig.12: Normalized Cross-Correlation Plot of image1 Fig.13: Normalized Cross-Correlation Plot of image2
  • 10. • C. Evaluation of image quality parameters 1. PSNR 2. CR 3. MSE and RMSE 10 Result Analysis And Performance Evaluation Table 1: Analysis Of Image Quality Parameters
  • 11. Conclusion • The algorithm implemented in this paper facilitates enhanced security as well as quality conscience compression ratio • It is based on an extremely unique method known as 2-level DWT based Sub-band Exchange Image Fusion Technique • Conversion of RGB images to fused textured gray-scale images provides acceptable compression for military image database • The bandwidth utilization and processing time required for transmission of these images is minimized to great extent 11
  • 12. Conclusion • It facilitates improved security, in terms of preventing the attacker from getting hold on images transmitted over the link, since chrominance components are randomly swapped • Offers high compression ratio, maintaining good PSNR value, thereby mitigating errors • The algorithm is a highly reliable and competitive image encryption scheme in image processing domain 12