A new discrete fractional random transform based on two circular matrices is designed and a novel double-imageencryption-compression scheme is proposed by combining compressive sensing with discrete fractional random...
详细信息
A new discrete fractional random transform based on two circular matrices is designed and a novel double-imageencryption-compression scheme is proposed by combining compressive sensing with discrete fractional random transform. The two random circular matrices and the measurement matrix utilized in compressive sensing are constructed by using a two-dimensional sine Logistic modulation map. Two original images can be compressed, encrypted with compressive sensing and connected into one image. The resulting image is re-encrypted by Arnold transform and the discrete fractional random transform. Simulation results and security analysis demonstrate the validity and security of the scheme. (C) 2015 Elsevier B.V. All rights reserved.
Coarseness is the most fundamental textural feature and has been much investigated since early studies. This paper improves the previous coarseness algorithm on the selection of neighborhood sizes and the calculation ...
详细信息
ISBN:
(纸本)0819442798
Coarseness is the most fundamental textural feature and has been much investigated since early studies. This paper improves the previous coarseness algorithm on the selection of neighborhood sizes and the calculation of neighborhood average differences, and the improved coarseness algorithm is presented. Experiments show that the improved coarseness has higher texture discriminability and better rotation invariance, and that the image retrieval result based on the improved coarseness is superior to that based on the previous coarseness.
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmiss...
详细信息
The increased demand of multimedia leads to shortage of network bandwidth and memory capacity. As a result, imagecompression is more significant for decreasing data redundancy, saving storage space and bandwidth. Alo...
详细信息
In this paper the method is presented to retrieve based on image content in video database using DC-image. The DC-image with the DC coefficient is extracted from DCT domain of image in this video database model. The p...
详细信息
ISBN:
(纸本)0819442798
In this paper the method is presented to retrieve based on image content in video database using DC-image. The DC-image with the DC coefficient is extracted from DCT domain of image in this video database model. The principle of DC-image and three different extraction methods of the DC-image from MPEG video stream are described. With the DC-image, temporary segmentation of compress video is realized depending the histogram of DC-image. Comparing the performance of three extracting methods and analyzing the result of DC-image extracted by different methods, we propose a video database structure and feature extraction method. To create the uniform indexing for video clip, the expression format of frame is developed by normalized histogram of DC-image.
In this paper, we study a new strategy to embed watermarks to the scale subband of image wavelet transform domain. The coefficients in scale subband are much bigger than most coefficients in other subband. This means ...
详细信息
ISBN:
(纸本)0819442798
In this paper, we study a new strategy to embed watermarks to the scale subband of image wavelet transform domain. The coefficients in scale subband are much bigger than most coefficients in other subband. This means the coefficients in scale subband have higher perceptual capacity than coefficients in other subband to embed watermarks. We also use nonlinear wavelet transform derived from lifting scheme to get bigger scale subband coefficients. The experiment result shows the scheme is robust enough and the image watermarking algorithm using nonlinear wavelet transform is more robust than algorithms using usual wavelet transform.
The conventional encryption methods are not appropriate for image cryptography as they contain large amount of data and the pixels have strong correlation. A new approach for chaotic encryption scheme for image is pro...
详细信息
ISBN:
(纸本)9781467398251
The conventional encryption methods are not appropriate for image cryptography as they contain large amount of data and the pixels have strong correlation. A new approach for chaotic encryption scheme for image is proposed through this paper. This imageencryption algorithm is a modification of baptista's chaotic system. Analysis shows that the compression performance and encryption speed of the proposed system is much better.
This paper describes a triple-layered watermarking scheme employing KLT and two layers of discrete cosine transforms, with data shuffled pseudo-randomly prior to the second DCT. In this way, the watermark is impercept...
详细信息
ISBN:
(纸本)0819442798
This paper describes a triple-layered watermarking scheme employing KLT and two layers of discrete cosine transforms, with data shuffled pseudo-randomly prior to the second DCT. In this way, the watermark is imperceptibly and robustly embedded into a set of multispectral images. The watermark is extractable without original host images. Simulation experiments are carried out to study the anti-attack performance. It is shown that the proposed technique is applicable to color and remote sensed multispectral images.
This paper represents a new spatial domain digital watermarking method, which can trade off between spatial domain and frequency domain approaches. This technique produces a watermarked image that closely retains the ...
详细信息
ISBN:
(纸本)0819442798
This paper represents a new spatial domain digital watermarking method, which can trade off between spatial domain and frequency domain approaches. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently surviving various image processing operations such as lowpass/highpass filtering, lossy JPEG compression, and cropping. This image watermarking algorithm takes full advantage of permutation and 2-D barcode, which is PDF417 coding. The actual watermark embedding in spatial domain is followed using permutated image for improving the resistance to image cropping. Much higher robustness of watermark is obtainable via forward error correction (FEC) technique, which is the main feature of PDF417 codes. Additional features of this technique include the easy determination of the existence of the watermark and that the watermark verification procedure does not need the original host image.
In the algorithms of content-based image retrieval, color has been used widely as the most important visual character. Three key factors for the image retrieval when using color characters are: color expression, color...
详细信息
ISBN:
(纸本)0819442798
In the algorithms of content-based image retrieval, color has been used widely as the most important visual character. Three key factors for the image retrieval when using color characters are: color expression, color abstraction, and color similarity treasure. In this paper, authors develop a sub-block method based on the color characters to retrieve images. It is found that the image retrieval accuracy of the sub-block histogram method is superior to that of the conventional single global histogram method, but its image retrieval speed is slightly slower than that of the single global histogram method.
暂无评论