期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
A secure image steganography algorithm based on least significant bit and integer wavelet transform 被引量:2
1
作者 ELSHAZLY Emad ABDELWAHAB Safey +3 位作者 ABOUZAID Refaat ZAHRAN Osama ELARABY Sayed ELKORDY Mohamed 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期639-649,共11页
The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a... The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms. 展开更多
关键词 image steganography image processing integer wavelet transform
下载PDF
Seismic data compression based on integer wavelet transform 被引量:1
2
作者 WANG Xi-zhen(王喜珍) TENG Yun-tian(滕云田) +1 位作者 GAO Meng-tan(高孟潭) JIANG Hui(姜慧) 《Acta Seismologica Sinica(English Edition)》 CSCD 2004年第z1期123-128,共6页
Due to the particularity of the seismic data, they must be treated by lossless compression algorithm in some cases. In the paper, based on the integer wavelet transform, the lossless compression algorithm is studied.... Due to the particularity of the seismic data, they must be treated by lossless compression algorithm in some cases. In the paper, based on the integer wavelet transform, the lossless compression algorithm is studied. Comparing with the traditional algorithm, it can better improve the compression rate. CDF (2, n) biorthogonal wavelet family can lead to better compression ratio than other CDF family, SWE and CRF, which is owe to its capability in can- celing data redundancies and focusing data characteristics. CDF (2, n) family is suitable as the wavelet function of the lossless compression seismic data. 展开更多
关键词 lossless compression integer wavelet transform lifting scheme biorthogonal wavelet
下载PDF
An Approach to Integer Wavelet Transform for Medical Image Compression in PACS
3
作者 YANG Yan ZHANG Dong 《Wuhan University Journal of Natural Sciences》 CAS 2000年第2期204-206,共3页
We study an approach to integer wavelet transform for lossless compression of medical image in medical picture archiving and communication system (PACS). By lifting scheme a reversible integer wavelet transform is gen... We study an approach to integer wavelet transform for lossless compression of medical image in medical picture archiving and communication system (PACS). By lifting scheme a reversible integer wavelet transform is generated, which has the similar features with the corresponding biorthogonal wavelet transform. Experimental results of the method based on integer wavelet transform are given to show better performance and great applicable potentiality in medical image compression. 展开更多
关键词 Key words integer wavelet transform lifting scheme lossless compression PACS
下载PDF
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
4
作者 Xiaoling HUANG Youxia DONG +1 位作者 Guodong YE Yang SHI 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期161-175,共15页
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this study.First of all,the initial values of chaotic system are encrypted by RSA algor... A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this study.First of all,the initial values of chaotic system are encrypted by RSA algorithm,and then they are open as public keys.To make the chaotic sequence more random,a mathematical model is constructed to improve the random performance.Then,the plain image is compressed and encrypted to obtain the secret image.Secondly,the secret image is inserted with numbers zero to extend its size same to the plain image.After applying IWT to the carrier image and discrete wavelet transformation(DWT)to the inserted image,the secret image is embedded into the carrier image.Finally,a meaningful carrier image embedded with secret plain image can be obtained by inverse IWT.Here,the measurement matrix is built by both chaotic system and Hadamard matrix,which not only retains the characteristics of Hadamard matrix,but also has the property of control and synchronization of chaotic system.Especially,information entropy of the plain image is employed to produce the initial conditions of chaotic system.As a result,the proposed algorithm can resist known-plaintext attack(KPA)and chosen-plaintext attack(CPA).By the help of asymmetric cipher algorithm RSA,no extra transmission is needed in the communication.Experimental simulations show that the normalized correlation(NC)values between the host image and the cipher image are high.That is to say,the proposed encryption algorithm is imperceptible and has good hiding effect. 展开更多
关键词 image encryption algorithm compressive sensing integer wavelet transform Hadamard matrix
原文传递
A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform
5
作者 Amishi Mahesh Kapadia P.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期537-552,共16页
Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recurs... Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well. 展开更多
关键词 Reversible data hiding(RDH) integer wavelet transforms(IWT) arnold transform PAYLOAD embedding and extraction
下载PDF
Medical image lossless compression based on combining an integer wavelet transform with DPCM
6
作者 Lihong ZHAO Yanan TIAN +1 位作者 Yonggang SHA Jinghua LI 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2009年第1期1-4,共4页
To improve the classical lossless compression of low efficiency,a method of image lossless compression with high efficiency is presented.Its theory and the algorithm implementation are introduced.The basic approach of... To improve the classical lossless compression of low efficiency,a method of image lossless compression with high efficiency is presented.Its theory and the algorithm implementation are introduced.The basic approach of medical image lossless compression is then briefly described.After analyzing and implementing differential plus code modulation(DPCM)in lossless compression,a new method of combining an integer wavelet transform with DPCM to compress medical images is discussed.The analysis and simulation results show that this new method is simpler and useful.Moreover,it has high compression ratio in medical image lossless compression. 展开更多
关键词 medical image integer wavelet transform differential plus code modulation(DPCM) lossless compression
原文传递
Application of Zero-Watermarking for Medical Image in Intelligent Sensor Network Security
7
作者 Shixin Tu Yuanyuan Jia +1 位作者 Jinglong Du Baoru Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期293-321,共29页
The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot ... The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention.Fortunately,digital watermarking provides an effective method to solve this problem.In order to improve the robustness of the medical image watermarking scheme,in this paper,we propose a novel zero-watermarking algorithm with the integer wavelet transform(IWT),Schur decomposition and image block energy.Specifically,we first use IWT to extract low-frequency information and divide them into non-overlapping blocks,then we decompose the sub-blocks by Schur decomposition.After that,the feature matrix is constructed according to the relationship between the image block energy and the whole image energy.At the same time,we encrypt watermarking with the logistic chaotic position scrambling.Finally,the zero-watermarking is obtained by XOR operation with the encrypted watermarking.Three indexes of peak signal-to-noise ratio,normalization coefficient(NC)and the bit error rate(BER)are used to evaluate the robustness of the algorithm.According to the experimental results,most of the NC values are around 0.9 under various attacks,while the BER values are very close to 0.These experimental results show that the proposed algorithm is more robust than the existing zero-watermarking methods,which indicates it is more suitable for medical image privacy and security protection. 展开更多
关键词 Intelligent sensor network medical image ZERO-WATERMARKING integer wavelet transform schur decomposition
下载PDF
Brain Tumor Classification Using Image Fusion and EFPA-SVM Classifier
8
作者 P.P.Fathimathul Rajeena R.Sivakumar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2837-2855,共19页
An accurate and early diagnosis of brain tumors based on medical ima-ging modalities is of great interest because brain tumors are a harmful threat to a person’s health worldwide.Several medical imaging techniques ha... An accurate and early diagnosis of brain tumors based on medical ima-ging modalities is of great interest because brain tumors are a harmful threat to a person’s health worldwide.Several medical imaging techniques have been used to analyze brain tumors,including computed tomography(CT)and magnetic reso-nance imaging(MRI).CT provides information about dense tissues,whereas MRI gives information about soft tissues.However,the fusion of CT and MRI images has little effect on enhancing the accuracy of the diagnosis of brain tumors.Therefore,machine learning methods have been adopted to diagnose brain tumors in recent years.This paper intends to develop a novel scheme to detect and classify brain tumors based on fused CT and MRI images.The pro-posed approach starts with preprocessing the images to reduce the noise.Then,fusion rules are applied to get the fused image,and a segmentation algorithm is employed to isolate the tumor region from the background to isolate the tumor region.Finally,a machine learning classifier classified the brain images into benign and malignant tumors.Computing statistical measures evaluate the classi-fication potential of the proposed scheme.Experimental outcomes are provided,and the Enhanced Flower Pollination Algorithm(EFPA)system shows that it out-performs other brain tumor classification methods considered for comparison. 展开更多
关键词 Brain tumor classification improved wavelet threshold integer wavelet transform medical image fusion
下载PDF
一种用于图像压缩的积分小波变换算法 被引量:1
9
作者 刘立波 《宁夏大学学报(自然科学版)》 CAS 2003年第4期353-355,370,共4页
提出了一种基于积分小波变换的图像压缩和重建的无损算法,并证明了这种算法所满足的条件.在不经过光滑处理的前提下,应用提升原理可将量化噪声降低到阈值以下.
关键词 图像压缩 积分小波变换 提升原理 量化噪声 重构算法 离散小波变换
下载PDF
An Image Fusion Algorithm Based on Lifting Scheme
10
作者 BAI Di FAN Qibin SHU Qian 《Geo-Spatial Information Science》 2005年第3期171-175,200,共6页
Taking the advantage of the lifting scheme's characters that can build wavelet translorms tor transforming from integer to integer and the quality of the reconstructing image'is independent of the topology way adopt... Taking the advantage of the lifting scheme's characters that can build wavelet translorms tor transforming from integer to integer and the quality of the reconstructing image'is independent of the topology way adopted by the boundary, an image fusion algorithm based on lifting scheme is proposed. This paper discusses the fundamental theory of lifting scheme firstly and then after taking transform analysis according to a kind of images that need to be confused. 展开更多
关键词 lifting schemes image processing integer wavelet transform image fusion
下载PDF
A LOSSLESS COMPRESSION ALGORITHM OF REMOTE SENSING IMAGE FOR SPACE APPLICATIONS 被引量:3
11
作者 Sui Yuping Yang Chengyu +3 位作者 Liu Yanjun Wang Jun Wei Zhonghui He Xin 《Journal of Electronics(China)》 2008年第5期647-651,共5页
A simple and adaptive lossless compression algorithm is proposed for remote sensing image compression, which includes integer wavelet transform and the Rice entropy coder. By analyzing the probability distribution of ... A simple and adaptive lossless compression algorithm is proposed for remote sensing image compression, which includes integer wavelet transform and the Rice entropy coder. By analyzing the probability distribution of integer wavelet transform coefficients and the characteristics of Rice entropy coder, the divide and rule method is used for high-frequency sub-bands and low-frequency one. High-frequency sub-bands are coded by the Rice entropy coder, and low-frequency coefficients are predicted before coding. The role of predictor is to map the low-frequency coefficients into symbols suitable for the entropy coding. Experimental results show that the average Comprcssion Ratio (CR) of our approach is about two, which is close to that of JPEG 2000. The algorithm is simple and easy to be implemented in hardware. Moreover, it has the merits of adaptability, and independent data packet. So the algorithm can adapt to space lossless compression applications. 展开更多
关键词 Remote sensing image Lossless compression Rice entropy coder integer Discrete wavelet transform (DWT)
下载PDF
Wavelet Based Image Authentication and Recovery 被引量:3
12
作者 Rafiullah Chamlaw Asifullah Khan Adnan Idris 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第6期795-804,共10页
In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image d... In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image digest into some wavelet subbands for detecting possible illicit object manipulation undergone in the image. The semi-fragility makes the scheme tolerant against JPEG lossy compression with the quality factor as low as 70%, and locates the tampered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced by using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees safety of a watermark, recovery of image and localization of tampered area. 展开更多
关键词 semi-fragile watermark integer wavelet transform (IWT) discrete cosine transform (DCT) JPEG compression authentication and self-recovery
原文传递
A Novel Zero-Watermark Copyright Authentication Scheme Based on Lifting Wavelet and Harris Corner Detection 被引量:1
13
作者 FAN Li GAO Tiegang YANG Qunting 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期408-414,共7页
In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adapti... In this paper,a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed.This approach utilizes Haar integer wavelet transform based on a lifting scheme and adaptive Harris corner detection to extract image features,which will be used to produce a binary feature map,and the map is very crucial to the generation of watermark registered later.By properly choosing the parameters of aforementioned techniques such as the threshold T and the radius of local feature region R,the feature map is so much more stable and distinguishing that it can be used to construct robust watermark.Simulations demonstrate that the proposed scheme is resistant to many kinds of signal processing and malicious attacks such as Gaussian blurring,additive noising,JPEG lossy compression,cropping,scaling and slight rotation operation.Compared with a relative scheme such as that of Chang's,the scheme in this paper is more practicable and reliable and can be applied to the area of copyright protection. 展开更多
关键词 zero-watermark copyright authentication Harris corner detection integer wavelet transform ROBUSTNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部