Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding

Open Access Open Access

Abstract

Image fusion is a popular method which provides better quality fused image for interpreting the image data. In this paper, color image fusion using wavelet transform is applied for securing data through asymmetric encryption scheme and image hiding. The components of a color image corresponding to different wavelengths (red, green, and blue) are fused together using discrete wavelet transform for obtaining a better quality retrieved color image. The fused color components are encrypted using amplitude- and phase-truncation approach in Fresnel transform domain. Also, the individual color components are transformed into different cover images in order to result disguising information of input image to an attacker. Asymmetric keys, Fresnel propagation parameters, weighing factor, and three cover images provide enlarged key space and hence enhanced security. Computer simulation results support the idea of the proposed fused color image encryption scheme.

© 2014 Optical Society of America

1. Introduction

Over the past few decades, securing information using optical methods has been an attractive research area because of inherent multidimensional nature and parallel processing capability [1]. Most of the optical schemes for information security reported in literature deal with binary or gray-scale images. Even the color images are encrypted and decrypted by a monochromatic light source and hence they do not preserve their original color information. Also, color image contribute to a higher level of security than binary and gray-value images. Zhang and Karim [2] for the first time reported a method using double random phase encoding (DRPE) for securing color images. Securing, a high resolution color image is a challenging task and is of growing interest in the optical information processing field [36].

In the literature, usually for recording a digital hologram, a single wavelength is used but, if multiple wavelengths are used, then a high quality color object can be reconstructed. Javidi et al. [7] recorded two holograms using red and green wavelengths and then fused all reconstructed images to obtain a high quality colored image. Further, this idea was extended employing multiple wavelengths [8]. Fusion techniques play an important role in all such multi-wavelength phenomenon [914] and provide better quality fused image for interpreting the image data. Alfalou and Brosseau [15] discussed several optical compression and encryption methods. They reported the relation between compression and encryption. Further, they also proposed an algorithm to compress and encrypt simultaneously multiple images [16].

The conventional DRPE technique [1] in which two random phase masks (RPMs) are used as the security keys to encrypt an input image, belongs to the class of symmetric cryptosystem. In such cryptosystems, the keys used for encryption are identical to the decryption keys. Hence, linearity makes such cryptosystems insecure. To overcome this issue, asymmetric cryptosystem has been proposed [1721]. Asymmetric cryptosystem due to its nonlinear behavior and asymmetric nature of keys makes the encryption system more strong.

Apart from encryption, image hiding is an attractive way to encode information into white noise or some other image. Kishk and Javidi [22] proposed a method to hide a double phase-encoded image in the spatial domain. Takai and Mifune [23] proposed a method to embed the watermarking image by digital holography. Several optical techniques for image hiding and watermarking employing various domains have been reported [2330].

Wavelet transform (WT) is also one of the signal processing tools, which is used for analysis of optical and digital signals [31]. It has good local optimization features as well as the multi-resolution analysis features, which makes it suitable for optical information processing [3133]. Dang and Chau [33] used WT for image encryption. They presented a scheme after combining discrete WT for image compression and block cipher data encryption standard for image encryption. Martin et al. [34] proposed efficient encryption scheme by using a stream cipher to encrypt only the significant bits for individual coefficients using color set partitioning in hierarchical trees (C-SPIHT) algorithm. Recently, Bao et al. [35] proposed an image encryption scheme in wavelet domain where input image is encrypted to some other image instead of a noisy distribution.

In this paper, we propose color image fusion technique using WT for security and image hiding applications. The different components of a color image corresponding to different wavelengths are fused together using discrete WT for obtaining a better quality color image. The individual fused color components are encrypted using amplitude- and phase-truncation approach in Fresnel transform domain. Also, the encrypted components are transformed into different cover images in order to result disguising information of input image to an attacker. Asymmetric keys, Fresnel propagation parameters, weighing factor, and three cover images provide enhanced security. The simulation results demonstrate that data fusion is an effective technique, which can also be used for multispectral image encryption. Apart from multispectral image encryption, the proposed scheme can be further extended for simultaneous compression and encryption of multiple images [15,16].

2. Fusion technique for high quality colored image

In this section, color image components corresponding to different wavelengths are decomposed into wavelet coefficients using discrete WT [8]. In a one-dimensional (1-D) discrete WT, an input function f(x) is decomposed into coefficients with starting scale mo as:

Wϕ(m0,k)=(1L)kf(x)ϕm0,k
Wψ(m,k)=(1L)kf(x)ϕm,k
Here, L' scaling parameter of wavelet. Wφ(mo,k) and Wψ(m,k) are called as approximation and detailed coefficients respectively. In a two-dimensional (2D) discrete WT, a 1-D discrete WT is first performed on the rows and on the columns of data. This results in one set of approximation coefficients Wφ(m,r,s) and three sets of detailed coefficients W ηψ(m,r,s) where η = {H,V,D} represents horizontal, vertical and diagonal components.

Let f(x,y) be a 2D color image to be encrypted. Here, fr(x,y), fg(x,y), and fb(x,y) represent their red, green, and blue components, respectively. Suppose, the recovered images corresponding to wavelengths λr and λr + δλr are given as f'1r(x,y) and f'2r(x,y) respectively. Similarly, the recovered images corresponding to wavelengths λg and λg + δλg are given as f'1g(x,y) and f'2g(x,y) respectively. Similarly, the recovered images corresponding to wavelengths λb and λb + δλb are given as f'1b(x,y) and f'2b(x,y) respectively. Now, discrete WT is performed for fusion in order to reconstruct better quality color image [8].

WFLLr=AVG(WLLr1,WLLr2)
WFHLr=AVG(WHLr1,WHLr2) 
WFLHr=AVG(WLHr1,WLHr2) 
WFHHr=AVG(WHHr1,WHHr2) 
The combination of all four components is given as
g'r(ψ,ϕ)={WFLLr,WFHLr,WFLHr,WFHHr}
Similarly for green and blue components, the combinations of coefficients are
g'g(ψ,ϕ)={WFLLg,WFHLg,WFLHg,WFHHg}
g'b(ψ,ϕ)={WFLLb,WFHLb,WFLHb,WFHHb}
Hence, individual fused components of color image are obtained using WT in order to retrieve better quality of a color image.

3. Encryption of fused color components using phase-truncation approach

In order to encrypt all fused color components, amplitude- and phase truncation based asymmetric encryption scheme has been carried out. The principle of encryption has been depicted in Fig. 1(a) for red component only. Fused red component, g'r(ψ,Φ) is bonded with an RPM, R1(ψ,Φ) and its Fresnel transformation (FrT) is obtained at some distance z1. The obtained spectrum is phase-truncated (PT) and we get, Hr (u,v).

Hr(u,v)=PT{FrTz1[gr(ψ,ϕ)×R1(ψ,ϕ)]}
Here, R1(ψ,φ) is the random white sequence uniformly distributed in the interval [0,2π]. For successful retrieval of the red component, the decryption key; kr(u,v) is generated after amplitude-truncation (AT), as defined in the following Equation,
kr(u,v)=AT{FrTz1[gr(ψ,ϕ)×R1(ψ,ϕ)]}
Similarly, fused green and blue components are encrypted using different RPMs and corresponding PT operated and AT operated values are obtained.
Hg(u,v)=PT{FrTz2[gg(ψ,ϕ)×R2(ψ,ϕ)]}
For successful retrieval of the green component, the decryption key; kg(u,v) is generated.
kg(u,v)=AT{FrTz2[gg(ψ,φ)×R2(ψ,φ)]}
Hb(u,v)=PT{FrTz3[gb(ψ,φ)×R3(ψ,φ)]}
For successful retrieval of the blue component, the decryption key; kb(u,v) is generated.
kb(u,v)=AT{FrTz3[gb(ψ,φ)×R3(ψ,φ)]}
Thus, individual fused components are encrypted using amplitude-and phase truncation approach and the decryption keys corresponding to red, green and blue components are generated.

 figure: Fig. 1

Fig. 1 (a) Block diagram for asymmetric cryptosystem; (b) DWT based image encryption; and (c) decryption process.

Download Full Size | PDF

4. Converting each encrypted color component into different visible cover image

The obtained three different color encrypted images are separately converted to three different cover images to give the disguising information of input image to the attacker. The flowchart is given in Fig. 1(b). A different cover image, mr(ξ,η) having its size four times larger than the existing encrypted image is considered. The discrete WT is applied to the cover image. Suppose the wavelet coefficients after discrete WT operation are obtained as {WLLcr, WHLcr, WLHrc, WHHrc}, so to convert the encrypted red component image into cover image, HH sub-band of the cover image is replaced with encrypted red component with the weighing factor αr. Here αr varies from 1 to 100. Higher the value of αr, better will be the quality of the reconstructed cover image.

Finally, the inverse discrete WT (IDWT) operation will yield the cover image corresponding to red component.

m'r(ξ,η)=IDWT(WLLcr,WHLcr,WLHcr,Hr/αr)
Similarly green and blue encrypted images are converted to corresponding cover images i.e. m'g (ξ,η) and m'b (ξ,η), respectively.

For image decryption, use of correct keys and same wavelet are necessary as shown in Fig. 1(c). We used Haar wavelet in this study. All the three cover images are first decomposed into four wavelet sub-bands using Haar wavelet. After being extracted from the HH sub-band, the encrypted images are then applied with the inverse process of the image encryption to reconstruct the original image color components as follows:

For decryption of red color component, the key obtained kr(u,v), is bonded with the extracted cipher-text, Hr(u,v), and its inverse Fresnel transformation is obtained for distance z1. The obtained spectrum is phase-truncated, as given by f'r(x,y).

gr(ψ,ϕ)=PT{FrTz2[Hr(u,v)×kr(u,v)]}
gg(ψ,ϕ)=PT{FrTz2[Hg(u,v)×kg(u,v)]}
gb(ψ,ϕ)=PT{FrTz2[Hb(u,v)×kb(u,v)]}
Then, IDWT is applied to all three components separately to have a good quality of red component of reconstructed image back.
fr(x,y)=IDWT(gr(ψ,ϕ))
fg(x,y)=IDWT(gg(ψ,ϕ))
fb(x,y)=IDWT(gb(ψ,ϕ))
Finally, better quality colored image is given as
f(x,y)=fr(x,y)fg(x,y)fb(x,y)
Thus, use of correct asymmetric keys and same wavelet i.e. Haar wavelet, decrypts a better quality color image.

5. Simulation results

The simulation study was carried out using MATLAB 2010(b). Figure 2(a) shows the input color image of size 256 ☓ 256 pixels. Figures 2(b) and 2(c) represent the red components corresponding to λr = 632.8 nm and λr + δλr = 631.8 nm, respectively. Figures 2(d) and 2(e) represent the green components corresponding to λg = 532 nm and λg + δλg = 531 nm, respectively. Figures 2(f) and 2(g) represent the blue components corresponding to λb = 475 nm and λb + δλb = 476 nm, respectively.

 figure: Fig. 2

Fig. 2 (a) Input color of size 256 ☓ 256 pixels; (b) red component of colored image corresponding to λr = 632.8nm; (c) red component of colored image corresponding to λr + δλr = 631.8nm; (d) green component of colored image corresponding to λg = 532nm; (e) green component of colored image corresponding to λg + δλg = 531nm; (f) blue component of colored image corresponding to λb = 475nm; and (g) blue component of colored image corresponding to λb + δλb = 476nm.

Download Full Size | PDF

Discrete WT has been carried out for fusion purpose in order to reconstruct better quality color image. Figures 3(a)-3(d) show all four coefficients of discrete WT of reconstructed red component corresponding to wavelength λr. Figures 3(e)-3(h) show all four coefficients of discrete WT of reconstructed red component corresponding to wavelength λr + δλr.

 figure: Fig. 3

Fig. 3 (a)-(d) Four coefficients of DWT of reconstructed red component corresponding to wavelength, λr, (e)-(h) all four coefficients of DWT of reconstructed red component corresponding to wavelength λr + δλr.

Download Full Size | PDF

All the three fused color components are shown in Figs. 4(a)-4(c). After fusion of wavelet coefficients, all three color components in WT domain will undergo encryption process through amplitude- and phase truncation approach. Figure 5(a) shows asymmetric (decryption) key, kr(u,v) corresponding to red component. Figure 5(b) shows encrypted image, Hr(u,v) corresponding to red component. Figure 5(c) shows asymmetric (decryption) key, kg(u,v) corresponding to green component. Figure 5(d) shows encrypted image, Hg(u,v) corresponding to green component. Figure 5(e) shows asymmetric (decryption) key, kb(u,v) corresponding to blue component. Figure 5(f) shows encrypted image, Hb(u,v) corresponding to blue component.

 figure: Fig. 4

Fig. 4 (a)-(c) All three fused color components.

Download Full Size | PDF

 figure: Fig. 5

Fig. 5 (a) Decryption key, kr(u,v) corresponding to red component; (b) corresponding encrypted image, Hr(u,v); (c) decryption key, kg(u,v) corresponding to green component; (d) corresponding encrypted image, Hg(u,v); (e) decryption key, kb(u,v) corresponding to blue component; (f) corresponding encrypted image, Hb(u,v).

Download Full Size | PDF

The three different colored encrypted images, Hr(u,v), Hg(u,v), and Hb(u,v) are separately converted to three different cover images to give the disguising information of input image to the attacker. The three cover images of size 512 ☓ 512 pixels for all three components have been shown in Figs. 6(a)-6(c). After discrete WT operation of input cover images and replacement of higher frequency component with encrypted images, corresponding results has been shown in Figs. 6(d)-6(f). Thus, The three different colored encrypted images, Hr(u,v), Hg(u,v), and Hb(u,v) are separately converted to three different cover images to give the disguising appearance of input image. The final cover images obtained after inverse discrete WT operation has been shown in Figs. 6(g)-6(i). Finally, use of correct asymmetric keys and Haar wavelet decrypts a better quality color image as shown in Fig. 6(j).

 figure: Fig. 6

Fig. 6 (a)-(c) The three cover images,; (d)-(f) fusion for all three components; (g)-(i) the final cover images obtained after IDWT operation; (j) retrieved color image; and (k) specific attack result, mean square error (MSE) versus number of iterations.

Download Full Size | PDF

To check the security of the proposed scheme, we applied the special attack [18] to the proposed color image encryption scheme. To start with the specific attack algorithm, the exact real valued encrypted image is required. But, this encrypted image is further hidden into cover images using parameters α, type (Haar) and level of wavelets. These parameters are unknown to the attacker. So, the proposed scheme resists specific attack. The mean square error (MSE) values calculated between input color image and retrieved color image has been plotted against the number of iterations as shown in Fig. 6(k). In this case, we computed the MSE for 100 iterations. It can be observed that the MSE value never converged to zero. Also asymmetric keys, fractional orders, and encryption keys corresponding to three primary color components enhance the security key space in the proposed scheme. Also, Bao et al. [35] have claimed that hiding through such schemes withstand the brute force attack. Hence, it can be inferred that the proposed scheme resists both specific and brute force attack.

To study the effectiveness of the proposed security scheme, we calculated peak signal to noise ratio (PSNR) [30]. The value of PSNR for the retrieved, color image is 41.5606. With the calculated PSNR value, we infer that when the correct keys are used the PSNR value is extremely high.

6. Conclusion

We proposed color image fusion using wavelet transform for security applications that employs asymmetric encryption scheme and image hiding. Discrete Haar wavelet transform has been used for color image fusion. Further, each fused color components are encrypted using amplitude- and phase-truncation approach. Then, the individual color components are transformed into different cover image or fake image in order to mislead the attacker. Asymmetric keys, Fresnel propagation parameters, weighing factor, and three cover images constitutes the security parameters in the proposed scheme. Apart from this, lens less scheme provides error free environment to the proposed security scheme. The simulation results demonstrate that data fusion is an effective technique, which can be used for multispectral image encryption.

Acknowledgment

The authors acknowledge the funding from the Council of Scientific and Industrial Research, Government of India, under Grant No. 03/(1183)/10/EMR-II.

References and links

1. B. Javidi, Optical and Digital Techniques for Information Security (Springer, 2005).

2. S. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microw. Opt. Technol. Lett. 21(5), 318–323 (1999). [CrossRef]  

3. L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14(19), 8552–8560 (2006). [CrossRef]   [PubMed]  

4. M. Joshi, Chandrashakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279(1), 35–42 (2007). [CrossRef]  

5. X. Deng and D. Zhao, “Single-channel color image encryption using a modified Gerchberg-Saxton algorithm and mutual encoding in the Fresnel domain,” Appl. Opt. 50(31), 6019–6025 (2011). [CrossRef]   [PubMed]  

6. H.-E. Hwang, “Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 285(5), 567–573 (2012). [CrossRef]  

7. B. Javidi, P. Ferraro, S. H. Hong, S. De Nicola, A. Finizio, D. Alfieri, and G. Pierattini, “Three-dimensional image fusion by use of multiwavelength digital holography,” Opt. Lett. 30(2), 144–146 (2005). [CrossRef]   [PubMed]  

8. B. Javidi, C. M. Do, S. H. Hong, and T. Nomura, “Multi-spectral holographic three-dimensional image fusion using discrete wavelet transform,” J. Disp. Technol. 2(4), 411–417 (2006). [CrossRef]  

9. D. C. Tseng, Y. L. Chen, and M. S. C. Liu, “Wavelet based multispectral image fusion” in Proceedings of Geoscience and Remote Sensing Symposium (IGARSS), 4, 1956–1958 (2001).

10. A. Alfalou, C. Brosseau, N. Abdallah, and M. Jridi, “Simultaneous fusion, compression, and encryption of multiple images,” Opt. Express 19(24), 24023–24029 (2011). [CrossRef]   [PubMed]  

11. S. Hong, W. M. Moon, H. Paik, and G. Choi, “Data fusion of multiple polarimetric SAR images using discrete wavelet transform” in Proceedings of IEEE Int. Geoscience and Remote Sensing Symp., 6, 3323–3325 (2002). [CrossRef]  

12. A. Garzelli, “Possibilities and limitations of the use of wavelets in image fusion” IEEE International Geoscience and Remote Sensing Symp.1, 66–68 (2002). [CrossRef]  

13. G. Hong and Y. Zhang, “High resolution image fusion based on wavelet and HIS transformations” Proceedings of 2nd GRSS/ISPRS Joint Workshop on Remote Sensing and Data Fusion99–104 (2003).

14. F. Sadjadi, “Invariant algebra and the fusion of multi-spectral information,” Inf. Fusion 3(1), 39–50 (2002). [CrossRef]  

15. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1(3), 589–636 (2009). [CrossRef]  

16. A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35(11), 1914–1916 (2010). [CrossRef]   [PubMed]  

17. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010). [CrossRef]   [PubMed]  

18. S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51(22), 5377–5386 (2012). [CrossRef]   [PubMed]  

19. S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51(10), 1446–1452 (2012). [CrossRef]   [PubMed]  

20. X. Deng and D. Zhao, “Single-channel color image encryption based on asymmetric cryptosystem,” Opt. Laser Technol. 44(1), 136–140 (2012). [CrossRef]  

21. I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Opt. Eng. 52(2), 028202 (2013). [CrossRef]  

22. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41(26), 5462–5470 (2002). [CrossRef]   [PubMed]  

23. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41(5), 865–873 (2002). [CrossRef]   [PubMed]  

24. Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A, Pure Appl. Opt. 8(6), 569–577 (2006). [CrossRef]  

25. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17(5), 3270–3284 (2009). [CrossRef]   [PubMed]  

26. N. K. Nishchal, T. Pitkaaho, and T. J. Naughton, “Digital Fresnel hologram watermarking” in Proceedings of 9th IEEE Euro-American Workshop on Information Optics, July 11–16, 2010, Helsinki, Finland.

27. X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51(6), 686–691 (2012). [CrossRef]   [PubMed]  

28. X. Wang and D. Zhao, “Double image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun. 284(19), 4441–4445 (2011). [CrossRef]  

29. C. H. Chuang and Y. L. Chen, “Steganographic optical image encryption system based on reversible data hiding and double random phase encoding,” Opt. Eng. 52(2), 028201 (2013). [CrossRef]  

30. N. K. Nishchal, “Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding,” Opt. Eng. 50(9), 097003 (2011). [CrossRef]  

31. R. K. Young, Wavelet Theory and Its Applications. (Kluwer Academic, 1993).

32. Y.-H. Seo, H.-J. Choi, and D.-W. Kim, “Digital hologram encryption using discrete wavelet packet transform,” Opt. Commun. 282(3), 367–377 (2009). [CrossRef]  

33. P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia applications,” IEEE Trans. Consum. Electron. 46(3), 395–403 (2000). [CrossRef]  

34. K. Martin, R. Lukac, and K. N. Plataniotis, “Efficient encryption of wavelet based coded color images,” Pattern Recognit. 38(7), 1111–1115 (2005). [CrossRef]  

35. L. Bao, Y. Zhou, and C. L. P. Chen, “Image encryption in the wavelet domain,” Proc. SPIE 8755, 875502 (2013). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1
Fig. 1 (a) Block diagram for asymmetric cryptosystem; (b) DWT based image encryption; and (c) decryption process.
Fig. 2
Fig. 2 (a) Input color of size 256 ☓ 256 pixels; (b) red component of colored image corresponding to λr = 632.8nm; (c) red component of colored image corresponding to λr + δλr = 631.8nm; (d) green component of colored image corresponding to λg = 532nm; (e) green component of colored image corresponding to λg + δλg = 531nm; (f) blue component of colored image corresponding to λb = 475nm; and (g) blue component of colored image corresponding to λb + δλb = 476nm.
Fig. 3
Fig. 3 (a)-(d) Four coefficients of DWT of reconstructed red component corresponding to wavelength, λr, (e)-(h) all four coefficients of DWT of reconstructed red component corresponding to wavelength λr + δλr.
Fig. 4
Fig. 4 (a)-(c) All three fused color components.
Fig. 5
Fig. 5 (a) Decryption key, kr(u,v) corresponding to red component; (b) corresponding encrypted image, Hr(u,v); (c) decryption key, kg(u,v) corresponding to green component; (d) corresponding encrypted image, Hg(u,v); (e) decryption key, kb(u,v) corresponding to blue component; (f) corresponding encrypted image, Hb(u,v).
Fig. 6
Fig. 6 (a)-(c) The three cover images,; (d)-(f) fusion for all three components; (g)-(i) the final cover images obtained after IDWT operation; (j) retrieved color image; and (k) specific attack result, mean square error (MSE) versus number of iterations.

Equations (23)

Equations on this page are rendered with MathJax. Learn more.

W ϕ ( m 0 , k ) = ( 1 L ) k f ( x ) ϕ m 0 , k
W ψ ( m , k ) = ( 1 L ) k f ( x ) ϕ m , k
W FLLr = AVG ( W LLr1 , W LLr2 )
W FHLr = AVG ( W HLr1 , W HLr2 )  
W FLHr = AVG ( W LHr1 , W LHr2 )  
W FHHr = AVG ( W HHr1 , W HHr2 )  
g ' r ( ψ , ϕ ) = { W FLLr , W FHLr , W FLHr , W FHHr }
g ' g ( ψ , ϕ ) = { W FLLg , W FHLg , W FLHg , W FHHg }
g ' b ( ψ , ϕ ) = { W FLLb , W FHLb , W FLHb , W FHHb }
H r ( u , v ) = P T { F r T z 1 [ g r ( ψ , ϕ ) × R 1 ( ψ , ϕ ) ] }
k r ( u , v ) = A T { F r T z 1 [ g r ( ψ , ϕ ) × R 1 ( ψ , ϕ ) ] }
H g ( u , v ) = P T { F r T z 2 [ g g ( ψ , ϕ ) × R 2 ( ψ , ϕ ) ] }
k g ( u , v ) = A T { F r T z 2 [ g g ( ψ , φ ) × R 2 ( ψ , φ ) ] }
H b ( u , v ) = P T { F r T z 3 [ g b ( ψ , φ ) × R 3 ( ψ , φ ) ] }
k b ( u , v ) = A T { F r T z 3 [ g b ( ψ , φ ) × R 3 ( ψ , φ ) ] }
m ' r ( ξ , η ) = IDWT ( W LLcr , W HLcr , W LHcr , H r / α r )
g r ( ψ , ϕ ) = P T { F r T z 2 [ H r ( u , v ) × k r ( u , v ) ] }
g g ( ψ , ϕ ) = P T { F r T z 2 [ H g ( u , v ) × k g ( u , v ) ] }
g b ( ψ , ϕ ) = P T { F r T z 2 [ H b ( u , v ) × k b ( u , v ) ] }
f r ( x , y ) = I D W T ( g r ( ψ , ϕ ) )
f g ( x , y ) = I D W T ( g g ( ψ , ϕ ) )
f b ( x , y ) = I D W T ( g b ( ψ , ϕ ) )
f ( x , y ) = f r ( x , y ) f g ( x , y ) f b ( x , y )
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.