A Novel Algorithm to Protect the Secret Image through Image Fusion and Verifying the Dealer and the Secret Image

Author(s):  
P. Devaki ◽  
G. Raghavendra Rao
2013 ◽  
Vol 347-350 ◽  
pp. 3872-3876
Author(s):  
Hong Li ◽  
Gao Feng Tang ◽  
Fen Xia Wu ◽  
Cong E Tan

A novel algorithm which is image fusion based on GPU is proposed. The fused rule is regional energy. In recent years, the power of the computing of GPU has been greatly improved, which results that using it for the general-purpose computing has a rapid development. The essay researches on implementing the oriental field algorithm on GPU, including selecting GPU memories and dividing blocks and threads of GPU kernel functions. The results of experiment on the GPU of NVIDIA GTX560 are given, which shows that our proposed algorithm can be applied to the field of image fusion. Experiment shows the proposed algorithm has faster calcu-lation velocity and higher evaluation accuracy. The speed of the parallel algorithm is 200 times faster than that of the CPU-based implementation. Meanwhile the mutual information and QAB/F parameters are higher than that of the CPU-based algorithm.


2011 ◽  
Vol 284 (6) ◽  
pp. 1540-1547 ◽  
Author(s):  
Qi-guang Miao ◽  
Cheng Shi ◽  
Peng-fei Xu ◽  
Mei Yang ◽  
Yao-bo Shi
Keyword(s):  

Author(s):  
Dongpeng Wu ◽  
Duyan Bi ◽  
Linyuan He ◽  
Shiping Ma ◽  
Zunlin Fan ◽  
...  
Keyword(s):  

Data security in the modern world is a challenging aspect faced by common man in almost every field-either technical or non-technical. Particularly in Public Clouds where the data is openly available across the internet, customers are not much exposed to the working environment and the diverse spread of data across world wide geographic locations. Intruders attempt to misuse this data to serve their own commercial purpose. The government of India proposed NAD (National Academic Depository) which is a secure zone for people to deposit their valuable certificates rather than carrying to places. Towards this end, the goal of current work is to strengthen the security of certificates being loaded into the depositories by applying Image fusion technique through CBTV (Cloud Based Threshold Value). The proposed method gives a unique solution to prove authenticity of users by generating the secret image using image fusion technique integrated with public key infrastructure on the cloud prior to outsourcing. This is particularly useful to protect the patient health care reports to hide the disease description etc, which may otherwise have unintended consequences. The entire fusion is not disclosed at the cloud server end. The performance of the proposed approach, can be measure by calculating the robustness of the secret image (fused image) against different types of image processing attacks such as salt & pepper noise, Gaussian noise, JPEG compression, speckle noise, geometric noise etc. is calculated while stored at the cloud and effective results are achieved.


Author(s):  
Yinhua Ma ◽  
Yuting Zhai ◽  
Peng Geng ◽  
Pengzhan Yan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document