Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing imageencryption scheme using the Secure Hash Algorithm (SHA-512)...
详细信息
ISBN:
(数字)9781728144528
ISBN:
(纸本)9781728144535
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing imageencryption scheme using the Secure Hash Algorithm (SHA-512), Discrete Cosine Transform (DCT), orthogonal matrix and discrete Chirikov map-based random permutation. DCT is applied on a plaintext image and a block of DCT coefficients is multiplied with an orthogonal matrix. Inverse DCT and scaling are performed to restrict the values between 0 and 255. Furthermore, values are shuffled using Chirikov-based pseudo-random permutation. A strong trade-off exists between DCT block size and computational efficiency. The quality and Signal to Noise Ratio (SNR) of the decrypted image decreases when the size of the DCT matrix is reduced, increasing the speed of the encryption algorithm. An extensive security analyses of the proposed scheme are performed, which establishes the robustness, computational efficiency and security of the technique against cryptographic attacks.
This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data. Discrete Wavelet Transformation (DWT) domain is...
详细信息
This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data. Discrete Wavelet Transformation (DWT) domain is used for the embedding of QR code, while embedding process is additionally protected by Advanced encryption Standard (AES) cipher algorithm. In addition, typical characteristics of QR code was broken using the encryption, therefore it makes the method more secure. The aim of this paper is design of image steganographic method with high secure level and high non-perceptibility level. The relation between security and capacity of the method was improved by special compression of QR code before the embedding process. Efficiency of the proposed method was measured by Peak Signal-to-Noise Ratio (PSNR) and achieved results were compared with other steganographic tools.
Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming throug...
详细信息
ISBN:
(数字)9798350370249
ISBN:
(纸本)9798350370270
Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming through the Internet. In this perspective, computer scientists are strongly pushed to protect information against unscrupulous persons who evolve quickly with technology. The goal of cryptography is to encrypt and decrypt information by using complex mathematical functions and logics. encryption not only for text data, but image, audio, and video kind of data as well. This research focuses on encryption and decryption of images. Different kinds of imageencryption algorithms have been developed upto this point. In each algorithm, pixel permutation and pixel substitution steps are performed by using mathematical functions such as Logistic map, Cubic-logistic map, and Arnold map. Various image cryptanalysis works has been going on these conventional imageencryption algorithms. In this work, we introduce a new method of encrypting and decrypting images without using any conventional steps like substitution and permutation of image pixels. This proposed method uses a deep learning technique, i.e., convolutional autoencoders. This method targets both compression and encryption so that images can travel with much speed and security over the network.
The increasing use of digital medical images in healthcare has raised significant concerns regarding their security, privacy, and integrity during transmission and storage. Unauthorized access, tampering, and image ma...
详细信息
ISBN:
(数字)9798331541064
ISBN:
(纸本)9798331541071
The increasing use of digital medical images in healthcare has raised significant concerns regarding their security, privacy, and integrity during transmission and storage. Unauthorized access, tampering, and image manipulation pose severe risks, potentially leading to compromised diagnoses and patient safety issues. This paper presents a novel asymmetric imageencryption and watermarking scheme aimed at securing medical images. The proposed scheme integrates cryptographic encryption and digital watermarking to protect sensitive patient information and ensure the authenticity and integrity of medical images. Specifically, the scheme encrypts patient data using asymmetric encryption and embeds the encrypted data into the medical image as a QR code watermark. This watermark is securely embedded into the least significant bits of the image pixels using a clustering algorithm, ensuring resilience against common image distortions, such as noise, rotation, and compression. Experimental results demonstrate the robustness of the proposed scheme, as evidenced by high PSNR and SSIM values, indicating minimal impact on image quality while ensuring strong security. The proposed method offers an efficient solution for enhancing the security of medical images in healthcare systems.
For secured communication of information steganography is preferred, which embeds the information in a cover object. The objective is to propose a modified high-capacity steganography technique based on wavelet transf...
详细信息
ISBN:
(纸本)9781509045570
For secured communication of information steganography is preferred, which embeds the information in a cover object. The objective is to propose a modified high-capacity steganography technique based on wavelet transform with acceptable levels of imperceptibility and distortion in the cover image and with high level of overall security. Wavelet transforms are considered to be an ideal domain for imagecompression and transmission. Among the four sub-bands, the LL sub-band to hide information is analyzed. Haar wavelet is used to hide an image inside the other image. PSNR and MSE are analyzed to determine the performance of the wavelet and an average value of 29.85dB and 0.03 is obtained respectively.
GEZGIN-2 is a real-time image processing subsystem, currently being developed for RASAT, the second small satellite to be launched by TUBITAK-BILTEN, in 2007. It is an advanced version of the GEZGIN payload, implement...
详细信息
GEZGIN-2 is a real-time image processing subsystem, currently being developed for RASAT, the second small satellite to be launched by TUBITAK-BILTEN, in 2007. It is an advanced version of the GEZGIN payload, implementing JPEG 2000 imagecompression algorithm and currently flying on the BILSAT-1 satellite. The main enhancements in GEZGIN-2 are the integration of the full processing path of JPEG 2000 algorithm in a single Field Programmable Gate Array (FPGA) for increased processing performance and high speed data links complying with the ESA Spacewire standard, for data transfer at a rate of 100 Mbps. In addition to JPEG2000, GEZGIN-2 facilitates image pre-processing for cloud/sea detection and image/data encryption implemented on a daughter-board called GOLGE. As in GEZGIN, GEZGIN-2 allows for adjustment of compression ratio for different mission times by means of run-time supplied parameters and full reconfigurability in orbit.
In this paper, a novel Commutative Watermarking and Partial encryption (CWPE) algorithm using single level 2-Dimension Discrete Wavelet Transform (CWPE 2D DWT) and Multi-Map Orbit Hopping Chaotic System (MMOH-CS) is p...
详细信息
In this paper, a novel Commutative Watermarking and Partial encryption (CWPE) algorithm using single level 2-Dimension Discrete Wavelet Transform (CWPE 2D DWT) and Multi-Map Orbit Hopping Chaotic System (MMOH-CS) is proposed. The experimental results show that the proposed algorithm is robust against common signal processing attacks such as Salt & Pepper noise, Gaussian noise, Wiener filter, JPEG compression, Resizing and Cropping. The proposed scheme is able to reduce encryption to one quarter of the image information. Statistical analysis, differential analysis and key sensitivity test are performed to estimate the security strength of the proposed algorithm. The results of the security analysis show that the proposed algorithm provides a high security level for real time application.
High resolution, high data rate sensor streams acquired from the Navy Shared Reconnaissance Pod In (SHARP), encompassing unsurpassed resolution EO and IR sensors, covering large tactical areas with detailed surveillan...
详细信息
ISBN:
(纸本)0819453498
High resolution, high data rate sensor streams acquired from the Navy Shared Reconnaissance Pod In (SHARP), encompassing unsurpassed resolution EO and IR sensors, covering large tactical areas with detailed surveillance information, will overwhelm current signal processing, and communications capabilities. However, the value and utility of these data streams is dependent on their subsequent exploitation and timely dissemination to appropriate commanders. This situation renders real-time surveillance infeasible without significant advances in each of these areas: signal processing communications, and interpretation. Data compression, encryption, and other related technologies play a vital role here. Here we focus on the target recognition problem from an ultra-high resolution SHARP sensor suite, specifically on the detection in the EO domain. The theory of correlation filters (MACH, MACE, etc.), developed by Casasent and company at CMU has been typically used for classification purposes in the past. Herein we develop innovative low-complexity Correlation Eigen-Filters (CEFs), which have the unique advantage of offering detection capability for one or multiple objects, over a wide range of aspect angles (up to full 360 degrees), using as few as a single filter. In the paper, we develop a theoretical analysis of the CEF filter design, and provide some application examples. Figure I illustrates a case in point: various military aircraft are detected with perfect performance (Pd = 1.0, Pfa = 0) by training CEF filters on examples aircraft in other imagery, and testing on sequestered data. We not only diverge from traditional correlation-filter methods in that we use the correlation filter as a detector, but also to develop a novel feature space in which to do discrimination analysis. figure 1c.
In this paper, a novel selective encryptionimage scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we introduc...
详细信息
In this paper, a novel selective encryptionimage scheme based on JPEG2000 is proposed, which encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we introduce the permutation of codeblocks contributing in the selected precincts. Symmetric encryption AES with CFB mode is used to encrypt swapped codeblocks. The idea of combining permutation and selective encryption is used in order to minimize the amount of processed data encryption while ensuring the best possible degradation through the permutation. The proposed process encryption doesn't introduce superfluous JPEG2000 markers in the protected codestream, i.e, the protected codestream format is compliant to JPEG2000 codestream one. It keeps file format and compression ratio unchanged and doesn't degrade the original error robustness. The proposed scheme works with any standard ciphers and introduces negligible computational cost.
This paper addresses the important need for security measures in the transmission of medical images to ensure the confidentiality of sensitive patient information. Leveraging a synergistic combination of advanced cryp...
详细信息
ISBN:
(数字)9798350369083
ISBN:
(纸本)9798350369090
This paper addresses the important need for security measures in the transmission of medical images to ensure the confidentiality of sensitive patient information. Leveraging a synergistic combination of advanced cryptography and steganography techniques, including DNA-based AES encryption and LSB embedding, the proposed system ensures the secure hiding and transmission of patient data. Furthermore, Discrete Wavelet Transform compression is employed to optimize data size while preserving integrity and also applied deep learning models to the HAM10000 dataset. Experimental evaluations prove the superiority and efficacy of the suggested strategy in safeguarding medical data against unauthorized access and ensuring confidentiality. This work contributes significantly to the advancement of secure medical data transmission systems, addressing security concerns and regulatory requirements in the healthcare domain.
暂无评论