The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with Applications. The topics discussed include: improving wireless video communication withou...
详细信息
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with Applications. The topics discussed include: improving wireless video communication without feedback information;analysis of digital chaotic optical signals;lossless data compression in space amplifications;security analysis of public key watermarking schemes;dataencryption scheme with arithmetic coding and robust digital watermarking using random casting method.
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and...
详细信息
ISBN:
(纸本)0819441899
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and images. Along with the increase of market potential, the need arises for the protection of the image products from non-authorized use. Such a need is a very crucial one even because the Internet and other public/private networks have become preferred means of data exchange. A crucial issue arising when dealing with digital image distribution is copyright protection. Such a problem has been largely addressed by resorting to watermarking technology. A question that obviously arises is whether the requirements imposed by remote sensing imagery are compatible with existing watermarking techniques. On the basis of these motivations, the contribution of this work is twofold: i) assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection ii) analysis of the state-of-the-art, and performance evaluation of existing algorithms in terms of the requirements at the previous point.
In this paper, we present an implementation of the IDEA algorithm for imageencryption. The imageencryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method,...
详细信息
ISBN:
(纸本)0819437670
In this paper, we present an implementation of the IDEA algorithm for imageencryption. The imageencryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method, Embedded Wavelet Zero-tree coding is used for image compression. Experimental results show that our proposed scheme enhances data security and reduces the network bandwidth required for video transmissions. A software implementation and system architecture for hardware implementation of the IDEA imageencryption algorithm based on Field Programmable Gate Array (FPGA) technology are presented in this paper.
Surveillance imaging applications on small autonomous imaging platforms present challenges of highly constrained power supply and form factor, with potentially demanding specifications for target detection and recogni...
详细信息
ISBN:
(纸本)0819437670
Surveillance imaging applications on small autonomous imaging platforms present challenges of highly constrained power supply and form factor, with potentially demanding specifications for target detection and recognition. Absent of significant advances in image processing hardware, such power and space restrictions can imply severely limited computational capabilities. This holds especially for compute-intensive algorithms with high-precision fixed- or floating-point operations in deep pipelines that process large data streams. Such algorithms tend not to be amenable to small or simplified architectures involving (for example) reduced precision, reconfigurable logic, low-power gates, or energy recycling schemes. In this series of two papers, a technique of reduced-power computing called compressive processing (CXP) is presented and applied to several low- and mid-level computer vision operations. CXP computes over compressed data without resorting to intermediate decompression steps. As a result of fewer data due to compression, fewer operations are required by CXP than are required by computing over the corresponding uncompressed image. In several cases, CXP techniques yield speedups on the order of the compression ratio. Where lossy high-compression transforms are employed, it is often possible to use approximations to derive CXP operations to yield increased computational efficiency via a simplified mix of operations. The reduced work requirement, which follows directly from the presence of fewer data, also implies a reduced power requirement, especially if simpler operations are involved in compressive versus noncompressive operations. Several image processing algorithms (edge detection, morphological operations, and component labelling) are analyzed in the context of three compression transforms: vector quantization (VQ), visual pattern imagecoding (VPIC), and EBLAST. The latter is a lossy high-compression transformation developed for underwater communication
This paper presents a new truncated Baker transformation with a finite precision and extends it to an efficient imageencryption scheme. The truncated Baker transformation uses the quantization error as a secret key, ...
详细信息
ISBN:
(纸本)0819433004
This paper presents a new truncated Baker transformation with a finite precision and extends it to an efficient imageencryption scheme. The truncated Baker transformation uses the quantization error as a secret key, which is always produced by contraction mechanism in the mapping process. The original dynamics by Baker transformation is globally preserved but a random local rotation operator is incorporated between two neighbor elements in the mapping domain in order to keep the same precision. Such perturbations are local and small in each mapping, however, as the mapping process goes on they will gradually accumulate and affect the whole dynamics. Consequently, generated binary sequences (the dynamics of elements) have statistically good features on ergodicity, mixing and chaotic properties. The extended imageencryption scheme efficiently shuffle the input gray level image making difficult for a third party to decode the ciphered data to the original image without knowing the proper secret key.
Recent studies have shown that chaotic processes provide an appropriate mechanism for the encryption of sensitive signal information. Thus, a Volterra nonlinear integral equation is used to generate such chaotic proce...
详细信息
ISBN:
(纸本)0819429112
Recent studies have shown that chaotic processes provide an appropriate mechanism for the encryption of sensitive signal information. Thus, a Volterra nonlinear integral equation is used to generate such chaotic processes as solutions of an initial-value problem.
This Volume 3456 of the conference proceedings contains 20 papers. Topics discussed include mathematics of data/imagecoding, compression and encryption, digital watermarking and encryption, image compression, error d...
详细信息
This Volume 3456 of the conference proceedings contains 20 papers. Topics discussed include mathematics of data/imagecoding, compression and encryption, digital watermarking and encryption, image compression, error detection, modeling and management.
Developers of the UF Distributed Conferencing System, version 2 (DCS.v2) have proposed a protocol that involves the distribution of a session key by a trusted server to a principal with whom it will communicate. The p...
详细信息
ISBN:
(纸本)0819429112
Developers of the UF Distributed Conferencing System, version 2 (DCS.v2) have proposed a protocol that involves the distribution of a session key by a trusted server to a principal with whom it will communicate. The protocol differs from standard key exchange protocols in that it attempts to address the issue of the delivery of a private key as well as the desired session key in a secure fashion. Because of the complexity of asymmetric keys, it is necessary for human principals to store their private keys until needed. The DCS.v2 protocol assumes that principals encrypt their private keys and store them on a network. When they seek to communicate with other principals, they must request that the appropriate encrypted key be issued to them by the server which will in turn be used to decrypt the session key. This paper presents the protocol and analyses it using BAN logic.
暂无评论