The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV...The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security.展开更多
In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in wh...In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.展开更多
A novel single-channel blind separation algorithm for permuted motion blurred images is proposed by using blind restoration in this paper. Both the motion direction and the length of the point spread function (PSF) ...A novel single-channel blind separation algorithm for permuted motion blurred images is proposed by using blind restoration in this paper. Both the motion direction and the length of the point spread function (PSF) are estimated by Radon transformation and extrema a detection. Using the estimated blur parameters, the permuted image is restored by performing the L-R blind restoration method. The permutation mixing matrices can be accurately estimated by classifying the ringing effect in the restored image, thereby the source images can be separated. Simulation results show a better separation efficiency for the permuted motion blurred image with various permutation operations. The proposed algorithm indicates a better performance on the robustness against Gaussian noise and lossy JPEG compression.展开更多
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ...Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.展开更多
Image output by computer is done row by row,the shortcoming of which is that we cannot know the topological relations between points at the image boundary.To obtain the closed boundary of the target from an image and ...Image output by computer is done row by row,the shortcoming of which is that we cannot know the topological relations between points at the image boundary.To obtain the closed boundary of the target from an image and turn points' row permutation of boundary into sequence permutation,an algorithm based on 4-connection relation of pixel points is proposed and the analysis of its correctness and complexity is given.Compared with classical operators and existing method,the single pixel boundary extracted from gray images by this algorithm is more complete and more distinct.Moreover,it has a lower time complexity and can eliminate the noise inside and outside the target area.The obtained sequence permutation of points is also conducive to follow-up image processing.展开更多
To ensure the safe transmission of image information in communication, and improve the security performance of image encryption algorithm, we proposed a color image encryption algorithm with higher security based on c...To ensure the safe transmission of image information in communication, and improve the security performance of image encryption algorithm, we proposed a color image encryption algorithm with higher security based on chaotic system. Firstly, the 2-dimensional Cubic ICMIC modulation map(2D-CIMM) is designed, which has simple form, easy to construct, and high Spectral Entropy(SE) complexity. Secondly, the hash values of the original image are used to update the initial values of the 2D-CIMM map in real time, which increases the sensitivity of the image encryption algorithm to the plaintext and improves the finite precision effect. Finally, the permutation and diffusion processes of the encryption algorithm based on bit-level are performed. In addition, simulation and performance analysis show that the proposed algorithm has higher security.展开更多
We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynam...We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynamics of hyperchaotic map,a color image encryption scheme is designed.At the end of the encryption process,a DNA mutation operation is used to increase the encoding images’randomness and to improve the encryption algorithm’s security.Finally,simulation experiments,performance analysis,and attack tests are performed to prove the effectiveness and security of the designed algorithm.This work provides the possibility of applying chaos theory and gene theory in image encryption.展开更多
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very ...Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very useful for grayscale secret images.In this method,the secret image decomposes in three parts based on the pixel’s threshold value.The division of the color image into three parts is very easy based on the color channel but in the grayscale image,it is difficult to implement.The proposed image scrambling method is implemented in image steganography using discrete wavelet transform(DWT),singular value decomposition(SVD),and sorting function.There is no visual difference between the stego image and the cover image.The extracted secret image is also similar to the original secret image.The proposed algorithm outcome is compared with the existed image steganography techniques.The comparative results show the strength of the proposed technique.展开更多
In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit le...In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.展开更多
基金supported by the National Natural Science Foundation of China (Grant No. 61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203)+2 种基金the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013)the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103)the Jinan City 20-University Funding Projects for Introducing Innovation Team Program,China (Grant No. 2019GXRC031)。
文摘The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security.
文摘In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.
基金Project supported by the National Natural Science Foundation of China (Grant No.60872114)the Shanghai Leading Academic Discipline Project (Grant No.S30108)the Graduate Student Innovation Foundation of Shanghai University (Grant No.SHUCX101086)
文摘A novel single-channel blind separation algorithm for permuted motion blurred images is proposed by using blind restoration in this paper. Both the motion direction and the length of the point spread function (PSF) are estimated by Radon transformation and extrema a detection. Using the estimated blur parameters, the permuted image is restored by performing the L-R blind restoration method. The permutation mixing matrices can be accurately estimated by classifying the ringing effect in the restored image, thereby the source images can be separated. Simulation results show a better separation efficiency for the permuted motion blurred image with various permutation operations. The proposed algorithm indicates a better performance on the robustness against Gaussian noise and lossy JPEG compression.
基金Project supported by the National Natural Science Foundationof China (Nos. 60302012+2 种基金 60202002) and the Youth ScientificResearch Foundation of Ningbo (No. 2003A61006) China
文摘Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.
基金Sponsored by the National Natural Science Foundation of China (60773044 )PLA General Armament Department Key Foundation(9140A26010308BQ0178)
文摘Image output by computer is done row by row,the shortcoming of which is that we cannot know the topological relations between points at the image boundary.To obtain the closed boundary of the target from an image and turn points' row permutation of boundary into sequence permutation,an algorithm based on 4-connection relation of pixel points is proposed and the analysis of its correctness and complexity is given.Compared with classical operators and existing method,the single pixel boundary extracted from gray images by this algorithm is more complete and more distinct.Moreover,it has a lower time complexity and can eliminate the noise inside and outside the target area.The obtained sequence permutation of points is also conducive to follow-up image processing.
基金the National Natural Science Foundation of China (Grant Nos. 61161006 and 61573383)
文摘To ensure the safe transmission of image information in communication, and improve the security performance of image encryption algorithm, we proposed a color image encryption algorithm with higher security based on chaotic system. Firstly, the 2-dimensional Cubic ICMIC modulation map(2D-CIMM) is designed, which has simple form, easy to construct, and high Spectral Entropy(SE) complexity. Secondly, the hash values of the original image are used to update the initial values of the 2D-CIMM map in real time, which increases the sensitivity of the image encryption algorithm to the plaintext and improves the finite precision effect. Finally, the permutation and diffusion processes of the encryption algorithm based on bit-level are performed. In addition, simulation and performance analysis show that the proposed algorithm has higher security.
基金the National Natural Science Foundation of China(Grant No.62061014)the Provincial Natural Science Foundation of Liaoning(Grant No.2020-MS-274)the Basic Scientific Research Projects of Colleges and Universities of Liaoning Province,China(Grant No.LJKZ0545).
文摘We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynamics of hyperchaotic map,a color image encryption scheme is designed.At the end of the encryption process,a DNA mutation operation is used to increase the encoding images’randomness and to improve the encryption algorithm’s security.Finally,simulation experiments,performance analysis,and attack tests are performed to prove the effectiveness and security of the designed algorithm.This work provides the possibility of applying chaos theory and gene theory in image encryption.
基金This work was supported by Taif university Researchers Supporting Project Number(TURSP-2020/114),Taif University,Taif,Saudi Arabia.
文摘Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very useful for grayscale secret images.In this method,the secret image decomposes in three parts based on the pixel’s threshold value.The division of the color image into three parts is very easy based on the color channel but in the grayscale image,it is difficult to implement.The proposed image scrambling method is implemented in image steganography using discrete wavelet transform(DWT),singular value decomposition(SVD),and sorting function.There is no visual difference between the stego image and the cover image.The extracted secret image is also similar to the original secret image.The proposed algorithm outcome is compared with the existed image steganography techniques.The comparative results show the strength of the proposed technique.
文摘In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.