logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 2 : 129102(2021) https://doi.org/10.1007/s11432-018-9572-x

Secure fusion of encrypted remote sensing images based on Brovey

More info
  • ReceivedJun 14, 2018
  • AcceptedAug 21, 2018
  • PublishedJul 16, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported in part by National Natural Science Foundation of China (Grant No. 61602039), and in part by Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security) (Grant No. C18604).


References

[1] Zhijun Wang , Ziou D, Armenakis C. A Comparative Analysis of Image Fusion Methods. IEEE Trans Geosci Remote Sens, 2005, 43: 1391-1402 CrossRef ADS Google Scholar

[2] Shen M, Ma B, Zhu L. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. IEEE TransInformForensic Secur, 2018, 13: 940-953 CrossRef Google Scholar

[3] Ahmad N. Cloud computing: technology, security issues and solutions. In: Proceedings of the 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, 2017. 30--35. Google Scholar

[4] Zhu L, Tang X, Shen M. Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks. IEEE J Sel Areas Commun, 2018, 36: 628-643 CrossRef Google Scholar

[5] Manikandan V M, Masilamani V. An efficient visually meaningful image encryption using Arnold transform. In: Proceedings of IEEE Students' Technology Symposium (TechSym), Kharagpur, 2016. 266--271. Google Scholar

[6] Zhao J L, Huang L S, Yang H, et al. Fusion and assessment of high-resolution WorldView-3 satellite imagery using NNDiffuse and Brovey algotirhms. In: Proceedings of IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Beijing, 2016. 2606--2609. Google Scholar

[7] Xia Q, Hu Z Q, Li J H, et al. Quality evaluation of different remote sensing image fusion methods (in Chinese). Geospatial Inform, 2013, 11: 49--51. Google Scholar

  • Figure 1

    (Color online) Evaluation results of the proposed scheme. (a) Iteration number effect on scheme efficiency;protect łinebreak (b) key-changing effect on scheme efficiency; (c) correlation between adjacent pixels in non-encrypted image; (d) correlation between adjacent pixels in encrypted image; (e) original panchromatic image; (f) original multispectral image; (g) original fusion image; protectłinebreak (h) fusion image obtained by the proposed scheme.

  •   

    Algorithm 1 ImageEncryption($a,b,n$)

    Require:$1~\leq~i~\leq~M~\bigwedge~1~\leq~j~\leq~M~\bigwedge~1~\leq~k~\leq~n$;

    while $k~\neq~n$ do

    while $i~\neq~M$ do

    while $j~\neq~M$ do

    $i_{\rm~new}~\Leftarrow~(((i-1)+b(j-1))~{\rm~mod}~M)+1~$;

    $j_{\rm~new}~\!\Leftarrow\!~((a(i-1)+(ab+1)(j-1))\,~{\rm~mod}\,~M)+1$;

    ${\rm~EImg}(i_{\rm~new},j_{\rm~new})~\Leftarrow~{\rm~Img}(i,j)$;

    $j~\Leftarrow~j+1$;

    end while

    $i~\Leftarrow~i+1$;

    end while

    ${\rm~Img}~\Leftarrow~{\rm~EncImg}$;

    $k~\Leftarrow~k+1$;

    end while

  •   

    Algorithm 2 EncryptedImageFusion

    Require:$1~\leq~i~\leq~M~\bigwedge~1~\leq~j~\leq~M~\bigwedge~k=1$;

    while $i~\neq~M$ do

    while $j~\neq~M$ do

    ${\rm~tmp}~\!\Leftarrow\!~{\rm~EMImg}(i,j,1)\!+\!{\rm~EMImg}(i,j,2)\!+\!{\rm~EMImg}(i,$ $j,3)$;

    while $k~\neq~4$ do

    ${\rm~EFImg}(i,j,k)~\Leftarrow~({\rm~EMImg}(i,j,k)/{\rm~tmp})~\times~{\rm~EPImg}(i,j)~$;

    if ${\rm~EFImg}(i,j,k)~<~0$ then

    ${\rm~EFImg}(i,j,k)~\Leftarrow~0$;ELSIF${\rm~EFImg}(i,j,k)~>~255$

    ${\rm~EFImg}(i,j,k)~\Leftarrow~255$;

    end if

    $k~\Leftarrow~k+1$;

    end while

    $j~\Leftarrow~j+1$;

    end while

    $i~\Leftarrow~i+1$;

    end while