Abstract

In this paper, our previously proposed compressive interference-based image cryptosystem (CIBC) is utilized to develop a camouflaged image cryptosystem, in which a secret image is camouflaged by a meaningful image. During the encryption process, a secret image is encoded into two sparse and complementary phase only masks (POMs) by CIBC under the constraints of two binary amplitude masks(BAMs), in which the BAM can be taken as a private key. Then, a camouflaged image is encoded into another two POMs by CIBC under the constraints of the two POMs generated in the aforementioned step, and the two final POMs are stored and transmitted as ciphertexts. In the decryption process, only authorized users, who can access the ciphertexts, public and private keys simultaneously, can retrieve the decrypted secret image. Otherwise, even if the eavesdropper cracks the ciphertexts and the public keys, only the camouflaged image can be directly obtained, which can confuse the eavesdropper and then protect the secret image. Several simulation experiments were demonstrated to verify the feasibility and security of this cryptosystem.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.