This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/image coding, compression, and encryption and security, remote sensing and communication and compressive ...
详细信息
This Volume 4793 of the conference proceedings contains 34 papers. Topics discussed include mathematics of data/image coding, compression, and encryption and security, remote sensing and communication and compressive processing.
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the devic...
详细信息
ISBN:
(纸本)0819445606
The suggested device includes a spatial light modulator (SLM) allowing varying the polarization state of an input illumination source. Attached to the SLM a sub wavelength grating is placed per each pixel of the device. This grating is used to encode the input information. The decoding is done by another sub wavelength grating. When the two gratings are attached a variation of the energetic efficiency between the two polarization states occurs. The polarization ratio encrypts the spatial information strewn. The sub wavelength grating are hard to copy and thus high encryption capability is obtained.
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical prop...
详细信息
In this paper, a new encryption mode, which we call the 2D-encryption Mode, is presented. 2D-encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical properties. We first look at the type of problems it tries to solve, then describe the technique and its properties, and present a detailed mathematical analysis of its security, and finally discuss some practical issues related to its implementation.
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication withou...
详细信息
The proceedings contain 27 papers from the conference on mathematics of data/image coding, compression, and encryption IV, with applications. The topics discussed include: improving wireless video communication without feedback information;analysis of digital chaotic optical signals;lossless data compression in space amplifications;security analysis of public key watermarking schemes;dataencryption scheme with arithmetic coding and robust digital watermarking using random casting method.
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact...
详细信息
ISBN:
(纸本)0819441899
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact that the decoding process of arithmetic coding scheme can be considered as the repetition of Bernoulli shift map. dataencryption is achieved by controlling the piecewise linear maps by a secret key in three kinds of approach: (i) perturbation method, (ii) switching method, and (iii) source extension method. Experimental results show that the obtained arithmetic codes for a message are randomly distributed on the mapping domain [0,1) by using different keys without seriously deteriorating the compression ratio, and the transition of the orbits in the domain [0,1) is similar to the chaotic dynamics.
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorit...
详细信息
ISBN:
(纸本)0819441899
The first part of the article gives a brief examination of the state of art in terms of methodologies, hardware available and algorithms used in space applications. Particular emphasis is given to the lossless algorithms used and their characterization. In the second part a more detailed analysis, in terms of data entropy, is presented. At the end the preliminary results in the determination of compressibility of the file will be presented.
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and...
详细信息
ISBN:
(纸本)0819441899
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and images. Along with the increase of market potential, the need arises for the protection of the image products from non-authorized use. Such a need is a very crucial one even because the Internet and other public/private networks have become preferred means of data exchange. A crucial issue arising when dealing with digital image distribution is copyright protection. Such a problem has been largely addressed by resorting to watermarking technology. A question that obviously arises is whether the requirements imposed by remote sensing imagery are compatible with existing watermarking techniques. On the basis of these motivations, the contribution of this work is twofold: i) assessment of the requirements imposed by the characteristics of remotely sensed images on watermark-based copyright protection ii) analysis of the state-of-the-art, and performance evaluation of existing algorithms in terms of the requirements at the previous point.
暂无评论