Non-linear chaos is a property of equations, cauterized by non-periodicity, the high sensitivity to initial conditions and his control parameters, ability to reciprocal synchronization and unpredictability. The determ...
详细信息
ISBN:
(纸本)9781509034079
Non-linear chaos is a property of equations, cauterized by non-periodicity, the high sensitivity to initial conditions and his control parameters, ability to reciprocal synchronization and unpredictability. The deterministic nature of the chaotic system can be used to generate a pseudo-random sequence for digital ciphering algorithms. This work presents a pseudo-random bit generator (PRBG), based on the chaotic system, which can be used for generating keys in real encrypts application to ensure a secure transmission in real time. The proposed approach is applied for encryption image. The totality of the pixels of the host image are XORed with a generated key based on the Logistic map (LM). It is implemented in Xilinx System Generator (XSG). A PRBG architecture is considered.
Exploring the conception of robust encryption techniques for the security of digital images is a permanent necessity due to the existence of the Internet where sending and receiving information to establish communicat...
详细信息
Exploring the conception of robust encryption techniques for the security of digital images is a permanent necessity due to the existence of the Internet where sending and receiving information to establish communication is a high priority activity. encryption process is carried out by data transformation, i.e. shuffled or scrambled, so that the information can not be read by an unauthorized receiver and it can exclusively be decrypted using valid-keys. In this paper, a novel fusion-scheme based on mathematical equation system for encryption-image algorithm is explored. In order to do that, numerical pixels are introduced in a system of equations for fusing images with three different private-keys. In addition, classical tests between original and encrypted images such as correlation coefficient, number of changing pixel rate (NPCR), unified average changed intensity (UACI) and entropy have been carried out to support the effectiveness of image fusion for imageencryption.
Covid19 corona virus has caused widespread disruption across the world, in terms of the health, economy, and society problems. X-ray images of the chest can be helpful in making an accurate diagnosis because the coron...
详细信息
Covid19 corona virus has caused widespread disruption across the world, in terms of the health, economy, and society problems. X-ray images of the chest can be helpful in making an accurate diagnosis because the corona virus typically first manifests its symptoms in patients' lungs. In this study, a classification method based on deep learning is proposed as a means of identifying lung disease from chest X-ray images. In the proposed study, the detection of covid19 corona virus disease from chest X-ray images was made with MobileNet and Densenet models, which are deep learning methods. Several different use cases can be built with the help of MobileNet model and case modelling approach is utilized to achieve 96% accuracy and an Area Under Curve (AUC) value of 94%. According to the result, the proposed method may be able to more accurately identify the signs of an impurity from dataset of chest X-ray images. This research also compares various performance parameters such as precision, recall and F1-Score.
Hiding secret data in digital images is one of the major researchfields in information ***,reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud *** paper proposes ...
详细信息
Hiding secret data in digital images is one of the major researchfields in information ***,reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud *** paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique(OMTBL-RDHEI).In our scheme,the content owner encrypts the cover image with block permutation,pixel permutation,and stream cipher,which preserve the in-block correlation of pixel *** uploading to the cloud service,the data hider applies the prediction error rearrangement(PER),the optimal threshold selection(OTS),and the multi-threshold labeling(MTL)methods to obtain a compressed version of the encrypted image and embed secret data into the vacated *** receiver can extract the secret,restore the cover image,or do both according to his/her granted *** proposed MTL labels blocks of the encrypted image with a list of threshold values which is optimized with OTS based on the features of the current *** results show that labeling image blocks with the optimized threshold list can efficiently enlarge the amount of vacated room and thus improve the embedding capacity of an encrypted cover *** level of the proposed scheme is analyzed and the embedding capacity is compared with state-of-the-art *** are concluded with satisfactory performance.
Reversible data hiding (RDH) has been investigated for over two decades. Depending on the application scenario, it can be divided into RDH and reversible data hiding in encrypted images (RDHEI). Interestingly, almost ...
详细信息
Reversible data hiding (RDH) has been investigated for over two decades. Depending on the application scenario, it can be divided into RDH and reversible data hiding in encrypted images (RDHEI). Interestingly, almost all studies on RDH/RDHEI have been conducted on gray-scale images, and relatively few studies have been conducted on color images compared to those on gray-scale images. Moreover, very few studies have been undertaken on palette images as a widely used image format. For palette images in which pixels are not gray-scale levels but color table indexes, it is difficult to apply traditional RDH/RDHEI methods directly. Therefore, we propose a new framework for RDH/RDHEI specifically for palette images. This framework adds a route selection algorithm before the conventional RDH/RDHEI approach. To be specific, we propose a method named the shortest route with correlation and frequency selection to reorder the color table, followed by a correlation reconstruction of the remapped index image according to this color table. The experimental results show the improvement brought by our proposed route selection to the existing RDH/RDHEI methods in palette images.
This paper presents a separable reversible data hiding in encrypted image (SRDH-EI) based on code division multiplexing (CDM). In this, the owner encrypts the cover image first, and then uploads the preprocessed image...
详细信息
This paper presents a separable reversible data hiding in encrypted image (SRDH-EI) based on code division multiplexing (CDM). In this, the owner encrypts the cover image first, and then uploads the preprocessed image to two cloud servers. In the servers, two encrypted pixels, on the same place of uploaded images, form an embedded vector. Finally the secret bits, which are encoded to CDM spreading sequences, are embedded into the vector. At the receiver side, there are three cases: 1) if they only have the data hiding key, the secret bits can be extracted;2) if they only have the encryption key, the original image can be recovered;3) if they have the two keys, both of them can be obtained. Compared with the classic dual-images RDH method, the proposed method protects the content security of the outsourced cloud image and has a better performance on visual quality and embedding capacity.
This paper proposes a crypto-compression scheme to protect the distribution and storage of digital medical images. The proposed process uses a chaotic system in order to provide an efficient digital medical images enc...
详细信息
ISBN:
(纸本)9781479956272
This paper proposes a crypto-compression scheme to protect the distribution and storage of digital medical images. The proposed process uses a chaotic system in order to provide an efficient digital medical images encryption. This enhanced scheme combines between compression based on DCT and encryption. Simulation experiment, sensitivity and statistical analyses have validated the effectiveness of the proposed system.
image processing is technique in order to improve the quality of the image. Presently more focus is on RIT a new technique is proposed, this technique improves the quality of the camouflage image also it can store the...
详细信息
image processing is technique in order to improve the quality of the image. Presently more focus is on RIT a new technique is proposed, this technique improves the quality of the camouflage image also it can store the original image losslessly after data is get extracted. It is very essential to secure data. To overcome these security aspects, we developed a technique image Transmutation in Reversible Manner for Camouflage image. Different from all existing technique, RIT technique allows to transform the information of secret image into another cover image because of that we secure the original image, the camouflage image is same as the target image.
暂无评论