To overcome the different issues connected with security and limited bandwidth during transmission of images, compression and encryption play an important role. To measure the effect on the performance of compression ...
详细信息
To overcome the different issues connected with security and limited bandwidth during transmission of images, compression and encryption play an important role. To measure the effect on the performance of compression technique followed by encryption techniques is a challenging task. In this paper, biorthogonal discrete wavelet transform (DWT) technique is proposed for compression which is followed by advanced encryption standard (AES) and data encryption. Standard (DES) technologies to achieve secure transmission of data. The performances of DWT-AES and DWT-DES compression-encryption (CE) algorithms are analyzed based on statistical and differential parameters. We illustrate the authentication of results by applying the proposed CE algorithms over five standard test images and also by comparing with different state of the art methods. The results show that combination of DWT-DES CE methodology provides high quality of reconstructed image with robustness against different attacks.
Compressive sensing and chaos based simultaneous compression-encryption of medical images is presented in this paper. A new chaotic map that is highly sensitive to its initial parameters and chaotic in wider range of ...
详细信息
ISBN:
(纸本)9781538692790
Compressive sensing and chaos based simultaneous compression-encryption of medical images is presented in this paper. A new chaotic map that is highly sensitive to its initial parameters and chaotic in wider range of its control value is proposed. Chaotic behavior of the proposed map is compared with that of the existing logistic map as well. The measurement matrix for compressively sensing the images is constructed based on this proposed map. Also, the initial parameter of the map is used as secret keys in designing the encryption algorithm. Various encryption results are presented to verify the performance of the proposed map and the compression- encryption scheme.
The growing number of planned Earth Observation (EO) satellites, together with the increase in payload resolution and swath, brings to the fore the generation of unprecedented volumes of data that needs to be download...
详细信息
ISBN:
(纸本)9781713843054
The growing number of planned Earth Observation (EO) satellites, together with the increase in payload resolution and swath, brings to the fore the generation of unprecedented volumes of data that needs to be downloaded, processed and distributed with low latency. This creates a severe bottleneck problem, which overloads ground infrastructure, communications to ground, and hampers the provision of EO products to the End User with the required performances. The European H2020 EO-ALERT project (http://***/), proposes the definition of next-generation EO missions by developing an on-board high speed EO data processing chain, based on a novel flight segment architecture that moves optimised key EO data processing elements from the ground segment to on-board the satellite. EO-ALERT achieves, globally, latencies below five minutes for EO products delivery, reaching latencies below 1 minute in some scenarios. The proposed architecture solves the above challenges through a combination of innovations in the on-board elements of the data chain and the communications link. Namely, the architecture introduces innovative technological solutions, including on-board reconfigurable data handling, on-board image generation and processing for generation of alerts (EO products) using Artificial Intelligence (AI), high-speed on-board avionics, on-board data compression and encryption using AI and reconfigurable high data rate communication links to ground including a separate chain for alerts with minimum latency and global coverage. Those key technologies have been studied, developed, implemented in software/hardware (SW/HW) and verified against previously established technologies requirements to meet the identified user needs. The paper presents an overview of the development of the innovative solutions defined during the project for each of the above-mentioned technological areas and the results of the testing campaign of the individual SW/HW implementations within the
compression and encryption are two major aspects of cryptanalysis. compression reduces the large bandwidth requirement while encryption provides security against differential unethical attacks during transmission of i...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
compression and encryption are two major aspects of cryptanalysis. compression reduces the large bandwidth requirement while encryption provides security against differential unethical attacks during transmission of images over a channel. The fractal based compression algorithm is proposed to remove the redundant data as it makes the image resolution independent. Here, AES and DES symmetrical encryption techniques are used over compressed images. The efficiency of proposed compression technique is evaluated by performance evaluation parameters like PSNR, MSE and SSIM. The effects on these performance evaluation parameters, when symmetrical encryption techniques are imposed on compressed images, are also analysed. The capacity of encryption techniques to procure the information from differential attacks is also analysed by calculation of differential parameters like NPCR and UACI. This experiment is performed on standard set of five grayscale test images. This paper shows that fractal-DES cryptanalysis system uses minimum bandwidth during transmission and provides better security and efficient reconstruction of images over fractal-AES cryptanalysis system.
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to in...
详细信息
ISBN:
(纸本)9781538681909
Detection of object and recognition of objects in real world computing environment is one of the challenging tasks in computer vision. To solve this task there are many challenges in designing algorithm, we have to introduce different and innovative techniques to detect objects in natural environments. image security is of high importance in various applications including military, medical and many others. Security is one of the most challenging aspects in the internet and network applications. Encrypting entire image is very slow. Selective encryption is a scheme which intends to save computational power, network resources, and execution time. To encrypt object selectively object detection techniques are used. This technique is one of the most promising solutions to increase the speed of encryption as compared to the traditional encryption techniques. Selective encryption is helpful for the multimedia contents like image, video and audio. The compression ratio achieved is very high, since we store only the residues of extracted pixel of an image. So this paper discussed about Selective encryption with object detection technique.
The proceedings contain 119 papers. The special focus in this conference is on Advances in Electrical and Computer technologies. The topics include: Sum modified laplacian-based image fusion in dct domain with super r...
ISBN:
(纸本)9789811555572
The proceedings contain 119 papers. The special focus in this conference is on Advances in Electrical and Computer technologies. The topics include: Sum modified laplacian-based image fusion in dct domain with super resolution;a supplement to "pre: A simple, pragmatic, and provably correct algorithm";effective compression of digital images using spiht coding with selective decomposition bands;reconfigurable lut-based dynamic obfuscation for hardware security;detection and control of phishing attack in electronic medical record application;smart apron using embroidered textile fractal antenna for e-health monitoring system;design of modified wideband log periodic microstrip antenna with slot for navigational application;machine learning approach to condition monitoring of an automotive radiator cooling fan system;sensors network for temperature measurement in a cocoa fermentator;communication-aware virtual machine placement in cloud;migration from silicon to gallium nitride devices—a review;high-speed modified da architecture for dwt computation in secure image encoding;satellite image classification with data augmentation and convolutional neural network;design and randomness evaluation of a chaotic neural encryption and decryption network for trng;circuit modelling of graphene and carbon nanotube-based multilayer structures for high-frequency absorption;pi and sliding mode control of quanser qnet 2.0 hvac system;robust control of position and speed for a dc servomotor system using various control techniques;mpc-based temperature control of cstr process and its comparison with pid;microgrid integration in kerala power grid—a case study;design of control system for autonomous harvester based on navigation inputs;design and optimization of microgrid as ev charging source;preface.
Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video...
详细信息
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing imageencryption scheme using the Secure Hash Algorithm (SHA-512)...
详细信息
ISBN:
(数字)9781728144528
ISBN:
(纸本)9781728144535
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing imageencryption scheme using the Secure Hash Algorithm (SHA-512), Discrete Cosine Transform (DCT), orthogonal matrix and discrete Chirikov map-based random permutation. DCT is applied on a plaintext image and a block of DCT coefficients is multiplied with an orthogonal matrix. Inverse DCT and scaling are performed to restrict the values between 0 and 255. Furthermore, values are shuffled using Chirikov-based pseudo-random permutation. A strong trade-off exists between DCT block size and computational efficiency. The quality and Signal to Noise Ratio (SNR) of the decrypted image decreases when the size of the DCT matrix is reduced, increasing the speed of the encryption algorithm. An extensive security analyses of the proposed scheme are performed, which establishes the robustness, computational efficiency and security of the technique against cryptographic attacks.
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing imageencryption scheme using the Secure Hash Algorithm (SHA-512)...
详细信息
暂无评论