期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain 被引量:5
1
作者 Jialing Liu Jingbing Li +4 位作者 Yenwei Chen Xiangxi Zou Jieren Cheng Yanlin Liu Uzair Aslam Bhatti 《Computers, Materials & Continua》 SCIE EI 2019年第7期363-378,共16页
Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical inform... Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks. 展开更多
关键词 ROBUSTNESS CT Image ZERO-WATERMARKING SIFT-DCT encrypted domain
下载PDF
Robust zero-watermarking algorithm based on discrete wavelet transform and daisy descriptors for encrypted medical image
2
作者 Yiyi Yuan Jingbing Li +3 位作者 Jing Liu Uzair Aslam Bhatti Zilong Liu Yen-wei Chen 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期40-53,共14页
In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical ... In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical professionals.To address this problem,the authors propose a robust feature watermarking algorithm for encrypted medical images based on multi-stage discrete wavelet transform(DWT),Daisy descriptor,and discrete cosine transform(DCT).The algorithm initially encrypts the original medical image through DWT-DCT and Logistic mapping.Subsequently,a 3-stage DWT transformation is applied to the encrypted medical image,with the centre point of the LL3 sub-band within its low-frequency component serving as the sampling point.The Daisy descriptor matrix for this point is then computed.Finally,a DCT transformation is performed on the Daisy descriptor matrix,and the low-frequency portion is processed using the perceptual hashing algorithm to generate a 32-bit binary feature vector for the medical image.This scheme utilises cryptographic knowledge and zero-watermarking technique to embed watermarks without modifying medical images and can extract the watermark from test images without the original image,which meets the basic re-quirements of medical image watermarking.The embedding and extraction of water-marks are accomplished in a mere 0.160 and 0.411s,respectively,with minimal computational overhead.Simulation results demonstrate the robustness of the algorithm against both conventional attacks and geometric attacks,with a notable performance in resisting rotation attacks. 展开更多
关键词 daisy descriptor DCT DWT encryption domain medical image ZERO-WATERMARKING
下载PDF
Speech Encryption in Linear Canonical Transform Domain Based on Chaotic Dynamic Modulation
3
作者 Liyun Xu Tong Zhang Chao Wen 《Journal of Beijing Institute of Technology》 EI CAS 2021年第3期295-304,共10页
In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm fi... In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm first uses a chaotic system to obtain the number of sampling points of the grouped encrypted signal.Then three chaotic systems are used to modulate the corres-ponding parameters of the LCT,and each group of transform parameters corresponds to a group of encrypted signals.Thus,each group of signals is transformed by LCT with different parameters.Fi-nally,chaotic encryption is performed on the LCT domain spectrum of each group of signals,to realize the overall encryption of the speech signal.The experimental results show that the proposed algorithm is extremely sensitive to the keys and has a larger key space.Compared with the original signal,the waveform and LCT domain spectrum of obtained encrypted signal are distributed more uniformly and have less correlation,which can realize the safe transmission of speech signals. 展开更多
关键词 communication security linear canonical transform transform domain encryption chaotic system
下载PDF
High Payload Reversible Data Hiding for Encrypted Image with Homomorphic Encryption
4
作者 LI Xinyan MOU Huajian 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第5期445-451,共7页
This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts,... This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts, which are to be encrypted by applying the homomorphic application based on the Paillier algorithm. Then a serial of operations are carried out in the encrypted domain so as to embed the additional data into the encrypted image. Finally, the embedded additional data can be perfectly extracted, and the host image can be recovered without error when the marked image is decrypted directly. Security analysis, extensive experiment results and comparisons illustrate that it has high security, and the original image recovery is free of any error. Meanwhile, the embedding capacity of this algorithm is enhanced when compared with other literatures. 展开更多
关键词 reversible data hiding homomorphic encryption high payload encrypted domain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部