A novel approach employs the principles of medical image analysis using Wavelet Transform (WT) and Difference Peak Signal-to-Noise Ratio (ΔPSNR). Both techniques are combined as a function of different decomposing le...A novel approach employs the principles of medical image analysis using Wavelet Transform (WT) and Difference Peak Signal-to-Noise Ratio (ΔPSNR). Both techniques are combined as a function of different decomposing levels of wavelets and various image search through and slicing levels, which is implemented under MATLAB environment. In this new approach, the structural change due to damage in the component or the presence of foreign bodies appearing in an image taken for a specific structure is uncovered with its extent determined after applying the search through algorithm. Such alteration of the composite structure, which could be masked by the presence of noise, is accounted for using combined WT and PSNR. Effect of Artifacts and Blurring caused by different wavelet types is investigated before choosing an appropriate wavelet, namely Sym8. This new approach, which also reduces the required layers of search within an image, produces a pattern matrix per damaged area and is an excellent way in tracing and modeling damage in structures with ability to predict effects of further damage on components and further application to artificial limbs that could suffer damage and affect users mobility.展开更多
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extrac...Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security.展开更多
文摘A novel approach employs the principles of medical image analysis using Wavelet Transform (WT) and Difference Peak Signal-to-Noise Ratio (ΔPSNR). Both techniques are combined as a function of different decomposing levels of wavelets and various image search through and slicing levels, which is implemented under MATLAB environment. In this new approach, the structural change due to damage in the component or the presence of foreign bodies appearing in an image taken for a specific structure is uncovered with its extent determined after applying the search through algorithm. Such alteration of the composite structure, which could be masked by the presence of noise, is accounted for using combined WT and PSNR. Effect of Artifacts and Blurring caused by different wavelet types is investigated before choosing an appropriate wavelet, namely Sym8. This new approach, which also reduces the required layers of search within an image, produces a pattern matrix per damaged area and is an excellent way in tracing and modeling damage in structures with ability to predict effects of further damage on components and further application to artificial limbs that could suffer damage and affect users mobility.
文摘Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security.