28 Hits in 3.9 sec

JPEG image encryption using fuzzy PN sequences

B. K. ShreyamshaKumar, Chidamber R. Patil
2009 Signal, Image and Video Processing  
In the proposed algorithm, the modified DCT blocks are confused by a fuzzy PN sequence.  ...  In addition to that, the DCT coefficients of each modified DCT block are converted to unique uncorrelated symbols, which are confused by another fuzzy PN sequence.  ...  Recently a new method for generating PN sequence based on Fuzzy logic has been proposed in [25] and thus generated PN sequences are used by a Fuzzy Random Index Generator (FRIG) to generate Random Indices  ... 
doi:10.1007/s11760-009-0131-6 fatcat:4lty3a7nxfb4xovuzhhpgawnci

Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme

Hinal M. Mudia, Pallavi V. Chavan
2016 Procedia Computer Science  
Here we had tried to implement the proposed technique fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme.  ...  Using fuzzy logic makes encryption and decryption complex. The (2, 2) secret sharing scheme provides secured and confidential authentication.  ...  This are converted to unique not related symbols are used for confusing by another fuzzy PN sequence. By chaotic stream cipher the variable length encoded bits are used for encryption.  ... 
doi:10.1016/j.procs.2016.02.110 fatcat:yljq76mjqrglnktbjqognj5sme

A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

Ahmed S. Salama, Mohamed Amr Mokhtar, Mazhar B. Tayel, Esraa Eldesouky, Ahmed Ali
2021 Computers Materials & Continua  
Lastly, a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT. Thus, the watermarked image is generated by enclosing both keys into DWT and DCT coefficients.  ...  In order to validate the proposed technique, a standard dataset of medical images is used.  ...  embed watermark SVD and DCT and DCT and DCT Number of noise Not used Three PN Two PN Two Three PN Three PN sequences sequences sequences WGN sequences sequences sequences Maximum PSNR 31.17 39.03 37.75  ... 
doi:10.32604/cmc.2021.016165 fatcat:xhyarvhm5vf6ndnzrto53dlmmy

Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Mohammed El Hassouni
2018 Multimedia tools and applications  
In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images.  ...  Experiments were conducted on natural and textured images.  ...  Apply DFT to the watermarked image and calculate the magnitude. 2. Generate two PN sequences (PN Seq 0 and PN Seq 1) using the same secrete key used in the embedding process. 3.  ... 
doi:10.1007/s11042-018-5913-9 fatcat:uqxpwwhcobhd5clfd2akifwi44

Recent Trends in Image Encryption: A Review

Ibrahim M. Harram, Mala U. M. Bakura, Ali M. Mohammed, Abdullahi M. Kire
2016 Zenodo  
Encryption is one of the ways to ensure the security of images as they are used in many fields such as in secure medical imaging services, military intelligence, internet and intranet communication, e-banking  ...  All the techniques reviewed came into existence within the last five years (2011-2015) and are found to be useful for the present day encryption applications.  ...  using a fuzzy PN bit generator developed by the authors to encrypt the image pixels is proposed.  ... 
doi:10.5281/zenodo.4012823 fatcat:v45rjrog7nfsdcfh5jzlno2riy

A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm

Aniruddha G. Phatak
2016 International Journal of Image Graphics and Signal Processing  
Finally, the encrypted file sizes for both the algorithms are compared with the unencrypted JPEG compressed image file size.  ...  Firstly, an alternate form of entropy coding is described, which is more suited to the proposed algorithm, instead of the zigzag coding scheme used in JPEG.  ...  the XOR operation [12] , a combination of several operations at the bit stream level [4] , permutation of the zigzag scheme used in JPEG encryption [11] or the use of fuzzy PN sequences [9] .  ... 
doi:10.5815/ijigsp.2016.06.08 fatcat:673m74kzfncjndkrwtl5kfqjwa

Hybrid Multimodal Biometric Template Protection

sanaa Ghouzali, Naima Bousnina, Mounia Mikram, Maryam Lafkih, Ohoud Nafea, Muna Al-Razgan, Wadood Abdul
2021 Intelligent Automation and Soft Computing  
However, a 3D chaotic-map-based encryption method is employed to protect the watermarked facial image in order to offer an added security level.  ...  The experimentation performed using the ORL face database and three Fingerprint Verification Competition (FVC) fingerprint databases showed the approach's efficiency in withstanding standard digital image  ...  Moreover, as the midb and frequencies of a DCT block have seven coefficients, pseudorandom sequences PN 0 and PN 1 of length seven are generated.  ... 
doi:10.32604/iasc.2021.014694 fatcat:mubzbvwktvch5dsdvdkzcnyceq

A Robust Chaotic and Fast Walsh Transform Encryption for Gray Scale Biomedical Image Transmission

Adelaide Nicole Kengnou Telem, Daniel Tchiotsop, Thomas Kanaa, Hilaire B. Fotsin, Didier Wolf
2015 Signal & Image Processing An International Journal  
We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images.  ...  The encryption process involves two steps: firstly, chaotic sequences generated by the chaotic logistic maps are used to permute and mask the intermediate results or array of FWT, the next step consist  ...  Firstly, fuzzy PN sequence is used to confuse the modified Direct Cosine Transform (DCT) blocks.  ... 
doi:10.5121/sipij.2015.6307 fatcat:qyngnefvebac5l2yjkzjknrz4m

ICACI 2020 Cover Page

2020 2020 12th International Conference on Advanced Computational Intelligence (ICACI)  
These papers cover many topics of computational intelligence including neural networks, machine learning, fuzzy systems, and evolutionary computation.  ...  Chin-Teng Lin (IEEE Fellow and IEEE Fuzzy Systems Pioneer Awardee, University Sydney Technology), and Shun-Feng Su, IEEE Fellow, IFSA fellow, CACS fellow and RST fellow, National Taiwan University of Science  ...  fusion for biopsy Hongyue Wu, Yunjie Chen, Biao Huang, Su Zhang, Yunkai Zhu and Yaqing Chen 2:10PM A new image encryption algorithm based on 2D-LSIMM chaotic map Huacheng Zhang, Jinyu Zhu, Shuaijie Zhao  ... 
doi:10.1109/icaci49185.2020.9177509 fatcat:pbotmcjydbdqddbta2t2xgp7tq

A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation

Maheswari Subramanian, Reeba Korah
2018 Journal of Computer Networks and Communications  
Image pixels which belong to the skin regions are used to carry more secret bits, and the secret information is hidden in both horizontal and vertical sequences of the skin areas of the cover image.  ...  First, the skin tone regions are identified by using YCbCr color space which can be used as a cover image.  ...  Iteration 1: length (vector) { PN Sequence for horizontal (2 * (rand (M/2, N/2))) PN Sequence for vertical (2 * (rand (M/2, N/2)))} Iteration 0, obtain stego image with horizontal and vertical information  ... 
doi:10.1155/2018/8695103 fatcat:mqiqrxqvfnaupdvsbvzvz5llfu

Multimedia watermarking techniques

F. Hartung, M. Kutter
1999 Proceedings of the IEEE  
The basic concepts of watermarking systems are outlined and illustrated with proposed watermarking methods for images, video, audio, text documents, and other media.  ...  They use a PN sequence that is filtered in several stages in order to exploit long-term and shortterm masking effects of the HAS.  ...  The watermark can be extracted by hypothesis testing using the original and the PN sequence and by employing a correlation method.  ... 
doi:10.1109/5.771066 fatcat:e3hxw7y2s5hrdmvjrzjabognpi

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
integrity and the quality of this publication and the information herein, no responsibility is assumed by the publishers nor the author for any damage to the property or persons as a result of operation or use  ...  [ 7 ] 7 Sahai, A. & Waters, B., Fuzzy identity based encryption. Advances in Cryptology: EUROCRYPT, 3494, pp. 457-473, 2005.  ...  Lossy and Lossless Intra Coding Performance Evaluation: HEVC, H.264/AVC, JPEG 2000 and JPEG LS. In: QI CAI, L. S. A. G. L., NAM LING, ed.  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
Algorithm for Image Compression using JPEG 2000 Standard IV.  ...  Since the fuzzy number is invariant with respect to shifting, they define similarity measure using the variance of fuzzy intervals associated with frequent item sets.  ...  Accountability [2] is the obligation to act as a responsible for preserving the personal information of others and appropriate use of that information beyond mere legal requirements, and to be accountable  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata [article]

Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong
2020 arXiv   pre-print
Moreover, a new privacy-preserving NFA evaluation method is given in P-Med to get a confidential match result for the evaluation of an encrypted NFA and an encrypted data set, which avoids the cumbersome  ...  A medical model is encrypted and outsourced to the cloud to deliver telemedicine services.  ...  [[Ψ]] pk A = ([[ψ 1 ]] pk A , · · · , [[ψ m ]] pk A ), encrypted DNA sequence [[Φ]] pk B = ([[φ 1 ]] pk B , · · · , [[φ n ]] pk B ), Each encrypted symbol [[φ k ]] pk B (1 ≤ k ≤ n) in DNA sequence [[Φ]  ... 
arXiv:2005.11688v2 fatcat:7jfemrbr7nahxgqpp5qwmstx5m

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images  ...  JSRT also provide special software called ImageJ, which is used to get images from database . By using this software we import image as a raw image and save it as jpeg format for further processing.  ...  Fuzzy feature for single channel image denoising is used to enhance image information in wavelet sub-bands and then using a fuzzy membership function to shrink wavelet coefficients, correspondingly.  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu
« Previous Showing results 1 — 15 out of 28 results