The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the devic...
详细信息
ISBN:
(纸本)0819445606
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the device. This grating is used to encode the input information. The decoding is done by another sub wavelength grating. When the two gratings are attached a variation of the energetic efficiency between the two polarization states occurs. The polarization ratio encrypts the spatial information strewn. The sub wavelength grating are hard to copy and thus high encryption capability is obtained.
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical prop...
详细信息
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical properties. We first look at the type of problems it tries to solve, then describe the technique and its properties, and present a detailed mathematical analysis of its security, and finally discuss some practical issues related to its implementation.
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact...
详细信息
ISBN:
(纸本)0819441899
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact that the decoding process of arithmetic coding scheme can be considered as the repetition of Bernoulli shift map. dataencryption is achieved by controlling the piecewise linear maps by a secret key in three kinds of approach: (i) perturbation method, (ii) switching method, and (iii) source extension method. Experimental results show that the obtained arithmetic codes for a message are randomly distributed on the mapping domain [0,1) by using different keys without seriously deteriorating the compression ratio, and the transition of the orbits in the domain [0,1) is similar to the chaotic dynamics.
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication withou...
详细信息
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication without feedback information;analysis of digital chaotic optical signals;lossless data compression in space amplifications;security analysis of public key watermarking schemes;dataencryption scheme with arithmetic coding and robust digital watermarking using random casting method.
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorit...
详细信息
ISBN:
(纸本)0819441899
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorithms used and their characterization. In the second part a more detailed analysis, in terms of data entropy, is presented. At the end the preliminary results in the determination of compressibility of the file will be presented.
data compression is one of key techniques in image processing, To begin with, this paper discusses the actuality of image compressioncoding, and then introduces generalized computing concept, Finally, by introducing ...
详细信息
ISBN:
(纸本)0819442798
data compression is one of key techniques in image processing, To begin with, this paper discusses the actuality of image compressioncoding, and then introduces generalized computing concept, Finally, by introducing knowledge to date compression, this paper presents a kind of intelligent image compression model (IICM) based on generalized computing.
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and...
详细信息
ISBN:
(纸本)0819441899
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and images. Along with the increase of market potential, the need arises for the protection of the image products from non-authorized use. Such a need is a very crucial one even because the Internet and other public/private networks have become preferred means of data exchange. A crucial issue arising when dealing with digital image distribution is copyright protection. Such a problem has been largely addressed by resorting to watermarking technology. A question that obviously arises is whether the requirements imposed by remote sensing imagery are compatible with existing watermarking techniques. On the basis of these motivations, the contribution of this work is twofold: i) assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection ii) analysis of the state-of-the-art, and performance evaluation of existing algorithms in terms of the requirements at the previous point.
Transmission and exchange of digital images with friends and customers is become a very simple task thanks to the development of the communication networks and the tools built around them. Unfortunately, such operatio...
详细信息
ISBN:
(纸本)0819441864
Transmission and exchange of digital images with friends and customers is become a very simple task thanks to the development of the communication networks and the tools built around them. Unfortunately, such operations become delicate whenever image security is required, typically for commercial applications or protection of proprietary data. Solutions associated to dataencryption already exist but are usually complex and do not take into account the specificities of images, generally under a compressed form. The Joint Photographic Experts group has recently created a new still imagecoding standard called JPEG 2000. It presents an efficient compression scheme together with support of functionalities required by today and tomorrow applications (progressive decoding, region of interest...). xBy considering the JPEG 2000 algorithm, we are presenting tools for image authentication or access control (on image resolutions and qualities). These techniques can be applied on JPEG 2000 codestreams or directly integrated into the coding/decoding operations, and are mainly based on modification and insertion of information in the bit stream. The resulting codestreams remain compliant with the standard. Moreover, they allow image side information retrieval and/or prevent use by unauthorized parties.
暂无评论