2015
DOI: 10.1016/j.optcom.2014.09.040
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet-based image fusion for securing multiple images through asymmetric keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…That is, time windows and frequency windows can have a dynamic adjustment, according to the specific signal forms. Due to the multi-resolution capability of the wavelet transform, the wavelet theory has been widely applied in the research of image processing such as image compression [19], image de-noising [20], image fusion [21] and so on.…”
Section: The Improved Wavelet Fuzzy Threshold De-noising Methodsmentioning
confidence: 99%
“…That is, time windows and frequency windows can have a dynamic adjustment, according to the specific signal forms. Due to the multi-resolution capability of the wavelet transform, the wavelet theory has been widely applied in the research of image processing such as image compression [19], image de-noising [20], image fusion [21] and so on.…”
Section: The Improved Wavelet Fuzzy Threshold De-noising Methodsmentioning
confidence: 99%
“…Due to this reason, users are stuck with the basic key management functionality, which allows them to produce, delete and deliver the keys under the environment of network security. To solve this issue, an optical asymmetric cryptosystem has been proposed [19][20][21][22][23][24]. In an asymmetric cryptosystem, a pair of keys, an encryption key (public key) and a decryption key (private key) are entirely different functions.…”
Section: Introductionmentioning
confidence: 99%
“…Even if an opponent knew the encryption key and the corresponding ciphertext, it should still be hard to recover the input data. Thus, a central role that such asymmetric encryption system plays is an effective trapdoor oneway function [19].Employing different optical domains the security of asymmetric cryptosystem was further improved [20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…Using infrared and visible image fusion technique, we not only can overcome the limitation of information obtained from individual sensors but also can achieve improved observation. Therefore, infrared and visible image fusion is an important technique to enhance the value of the image fusion technique in various fields, such as object detection [4], object tracking [5], face recognition [6], hiding [7], and securing multiple images [8].…”
Section: Introductionmentioning
confidence: 99%