Loading…

Image encryption scheme for multi-focus images for visual sensors network

Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral images. After obtaining a detailed image, propagation over an insecure channel is a critical issue to address. In this article, we have projecte...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2022-05, Vol.81 (12), p.16353-16370
Main Authors: Khan, Majid, Khan, Lalsaid, Hazzazi, Mohammad Mazyad, Jamal, Sajjad Shaukat, Hussain, Iqtadar
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3
cites cdi_FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3
container_end_page 16370
container_issue 12
container_start_page 16353
container_title Multimedia tools and applications
container_volume 81
creator Khan, Majid
Khan, Lalsaid
Hazzazi, Mohammad Mazyad
Jamal, Sajjad Shaukat
Hussain, Iqtadar
description Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral images. After obtaining a detailed image, propagation over an insecure channel is a critical issue to address. In this article, we have projected an image encryption structure for the fused image resulted from the multi-focus sensors. The projected scheme offered confusion as well as diffusion, which are the core parts of any symmetric cryptosystem. The projected cryptosystem has been tested against various security analysis and tabulated. The Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) are 99.62 and 33.49 shows the strength of the proposed encryption against differential attacks. For real-time implementation the time analysis is performed, for image fusion and encryption the algorithm only takes 1.268 s which makes it suitable for real-time implementation. The analysis is compared with the existing state-of-the-art techniques. The designed system is capable of obtaining spectrally and spatially enhanced image from multi-focus images and provide a high level of security.
doi_str_mv 10.1007/s11042-022-12441-x
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2659401612</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2659401612</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwApwicTbs2k7cHFHFT6RKXOBsJY5TUtq4eBNo3x63QeLGaVermVnNx9g1wi0C6DtCBCU4CMFRKIV8d8ImmGrJtRZ4Gnc5A65TwHN2QbQCwCwVasKKYlMuXeI6G_bbvvVdQvbdbVzS-JBshnXf8sbbgZL2oKPj-auloVwn5DrygZLO9d8-fFyys6Zck7v6nVP29vjwOn_mi5enYn6_4FZi3vM8czJ3UsxqQFXZKrV5ltVWgUYQtlb1LGtciVUpVKU0iFo1lZSQW53Gg3Jyym7G3G3wn4Oj3qz8ELr40ogszVVshiKqxKiywRMF15htiBXC3iCYAzIzIjMRmTkiM7tokqOJorhbuvAX_Y_rByoob1E</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2659401612</pqid></control><display><type>article</type><title>Image encryption scheme for multi-focus images for visual sensors network</title><source>ABI/INFORM Global (ProQuest)</source><source>Springer Nature</source><creator>Khan, Majid ; Khan, Lalsaid ; Hazzazi, Mohammad Mazyad ; Jamal, Sajjad Shaukat ; Hussain, Iqtadar</creator><creatorcontrib>Khan, Majid ; Khan, Lalsaid ; Hazzazi, Mohammad Mazyad ; Jamal, Sajjad Shaukat ; Hussain, Iqtadar</creatorcontrib><description>Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral images. After obtaining a detailed image, propagation over an insecure channel is a critical issue to address. In this article, we have projected an image encryption structure for the fused image resulted from the multi-focus sensors. The projected scheme offered confusion as well as diffusion, which are the core parts of any symmetric cryptosystem. The projected cryptosystem has been tested against various security analysis and tabulated. The Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) are 99.62 and 33.49 shows the strength of the proposed encryption against differential attacks. For real-time implementation the time analysis is performed, for image fusion and encryption the algorithm only takes 1.268 s which makes it suitable for real-time implementation. The analysis is compared with the existing state-of-the-art techniques. The designed system is capable of obtaining spectrally and spatially enhanced image from multi-focus images and provide a high level of security.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-022-12441-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Applied mathematics ; Computer Communication Networks ; Computer Science ; Computer vision ; Cryptography ; Data encryption ; Data Structures and Information Theory ; Deoxyribonucleic acid ; DNA ; Image enhancement ; Image processing ; Multimedia ; Multimedia Information Systems ; Optimization techniques ; Real time ; Security ; Sensors ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2022-05, Vol.81 (12), p.16353-16370</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3</citedby><cites>FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2659401612/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2659401612?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Khan, Majid</creatorcontrib><creatorcontrib>Khan, Lalsaid</creatorcontrib><creatorcontrib>Hazzazi, Mohammad Mazyad</creatorcontrib><creatorcontrib>Jamal, Sajjad Shaukat</creatorcontrib><creatorcontrib>Hussain, Iqtadar</creatorcontrib><title>Image encryption scheme for multi-focus images for visual sensors network</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral images. After obtaining a detailed image, propagation over an insecure channel is a critical issue to address. In this article, we have projected an image encryption structure for the fused image resulted from the multi-focus sensors. The projected scheme offered confusion as well as diffusion, which are the core parts of any symmetric cryptosystem. The projected cryptosystem has been tested against various security analysis and tabulated. The Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) are 99.62 and 33.49 shows the strength of the proposed encryption against differential attacks. For real-time implementation the time analysis is performed, for image fusion and encryption the algorithm only takes 1.268 s which makes it suitable for real-time implementation. The analysis is compared with the existing state-of-the-art techniques. The designed system is capable of obtaining spectrally and spatially enhanced image from multi-focus images and provide a high level of security.</description><subject>Algorithms</subject><subject>Applied mathematics</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer vision</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data Structures and Information Theory</subject><subject>Deoxyribonucleic acid</subject><subject>DNA</subject><subject>Image enhancement</subject><subject>Image processing</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Optimization techniques</subject><subject>Real time</subject><subject>Security</subject><subject>Sensors</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kM1OwzAQhC0EEqXwApwicTbs2k7cHFHFT6RKXOBsJY5TUtq4eBNo3x63QeLGaVermVnNx9g1wi0C6DtCBCU4CMFRKIV8d8ImmGrJtRZ4Gnc5A65TwHN2QbQCwCwVasKKYlMuXeI6G_bbvvVdQvbdbVzS-JBshnXf8sbbgZL2oKPj-auloVwn5DrygZLO9d8-fFyys6Zck7v6nVP29vjwOn_mi5enYn6_4FZi3vM8czJ3UsxqQFXZKrV5ltVWgUYQtlb1LGtciVUpVKU0iFo1lZSQW53Gg3Jyym7G3G3wn4Oj3qz8ELr40ogszVVshiKqxKiywRMF15htiBXC3iCYAzIzIjMRmTkiM7tokqOJorhbuvAX_Y_rByoob1E</recordid><startdate>20220501</startdate><enddate>20220501</enddate><creator>Khan, Majid</creator><creator>Khan, Lalsaid</creator><creator>Hazzazi, Mohammad Mazyad</creator><creator>Jamal, Sajjad Shaukat</creator><creator>Hussain, Iqtadar</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20220501</creationdate><title>Image encryption scheme for multi-focus images for visual sensors network</title><author>Khan, Majid ; Khan, Lalsaid ; Hazzazi, Mohammad Mazyad ; Jamal, Sajjad Shaukat ; Hussain, Iqtadar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Applied mathematics</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer vision</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data Structures and Information Theory</topic><topic>Deoxyribonucleic acid</topic><topic>DNA</topic><topic>Image enhancement</topic><topic>Image processing</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Optimization techniques</topic><topic>Real time</topic><topic>Security</topic><topic>Sensors</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khan, Majid</creatorcontrib><creatorcontrib>Khan, Lalsaid</creatorcontrib><creatorcontrib>Hazzazi, Mohammad Mazyad</creatorcontrib><creatorcontrib>Jamal, Sajjad Shaukat</creatorcontrib><creatorcontrib>Hussain, Iqtadar</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khan, Majid</au><au>Khan, Lalsaid</au><au>Hazzazi, Mohammad Mazyad</au><au>Jamal, Sajjad Shaukat</au><au>Hussain, Iqtadar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Image encryption scheme for multi-focus images for visual sensors network</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2022-05-01</date><risdate>2022</risdate><volume>81</volume><issue>12</issue><spage>16353</spage><epage>16370</epage><pages>16353-16370</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral images. After obtaining a detailed image, propagation over an insecure channel is a critical issue to address. In this article, we have projected an image encryption structure for the fused image resulted from the multi-focus sensors. The projected scheme offered confusion as well as diffusion, which are the core parts of any symmetric cryptosystem. The projected cryptosystem has been tested against various security analysis and tabulated. The Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) are 99.62 and 33.49 shows the strength of the proposed encryption against differential attacks. For real-time implementation the time analysis is performed, for image fusion and encryption the algorithm only takes 1.268 s which makes it suitable for real-time implementation. The analysis is compared with the existing state-of-the-art techniques. The designed system is capable of obtaining spectrally and spatially enhanced image from multi-focus images and provide a high level of security.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-022-12441-x</doi><tpages>18</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2022-05, Vol.81 (12), p.16353-16370
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2659401612
source ABI/INFORM Global (ProQuest); Springer Nature
subjects Algorithms
Applied mathematics
Computer Communication Networks
Computer Science
Computer vision
Cryptography
Data encryption
Data Structures and Information Theory
Deoxyribonucleic acid
DNA
Image enhancement
Image processing
Multimedia
Multimedia Information Systems
Optimization techniques
Real time
Security
Sensors
Special Purpose and Application-Based Systems
title Image encryption scheme for multi-focus images for visual sensors network
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T10%3A40%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Image%20encryption%20scheme%20for%20multi-focus%20images%20for%20visual%20sensors%20network&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Khan,%20Majid&rft.date=2022-05-01&rft.volume=81&rft.issue=12&rft.spage=16353&rft.epage=16370&rft.pages=16353-16370&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-022-12441-x&rft_dat=%3Cproquest_cross%3E2659401612%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-96e39e328d014bcb5c966dc407102cd4d86fea1ba24b4702d4fb3309c754b44e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2659401612&rft_id=info:pmid/&rfr_iscdi=true