In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction ...In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction of distributed scatterers in Distributed Scatterers InSAR(DS-InSAR)has significantly expanded the application scenarios of InSAR geodetic measurement by increasing the number of measurement points.This study traces the history of DS-InSAR,presents the definition and characteristics of distributed scatterers,and focuses on exploring the relationships and distinctions among proposed algorithms in two crucial steps:statistically homogeneous pixel selection and phase optimization.Additionally,the latest research progress in this field is tracked and the possible development direction in the future is discussed.Through simulation experiments and two real InSAR case studies,the proposed algorithms are compared and verified,and the advantages of DS-InSAR in deformation measurement practice are demonstrated.This work not only offers insights into current trends and focal points for theoretical research on DS-InSAR but also provides practical cases and guidance for applied research.展开更多
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extrac...Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security.展开更多
Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography...Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process(OPSP)acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarmoptimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.展开更多
The Hard X-ray Modulation Telescope(HXMT) will perform an all-sky survey in the hard X-ray band as well as deep imaging of a series of small sky regions.We expect various compact objects to be detected in these imag...The Hard X-ray Modulation Telescope(HXMT) will perform an all-sky survey in the hard X-ray band as well as deep imaging of a series of small sky regions.We expect various compact objects to be detected in these imaging observations. Point source detection performance of HXMT imaging observation depends not only on the instrument but also on the data analysis method that is applied since images are reconstructed from HXMT observed data with numerical methods. The denoising technique used plays an important part in the HXMT imaging data analysis pipeline along with demodulation and source detection. In this paper we have implemented several methods for denoising HXMT data and evaluated the point source detection performances in terms of sensitivities and location accuracies. The results show that direct demodulation with 1-fold cross-correlation should be the default reconstruction and regularization method, although both sensitivity and location accuracy could be further improved by selecting and tuning numerical methods in data analysis used for HXMT imaging observations.展开更多
基金National Natural Science Foundation of China(No.42374013)National Key Research and Development Program of China(Nos.2019YFC1509201,2021YFB3900604-03)。
文摘In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction of distributed scatterers in Distributed Scatterers InSAR(DS-InSAR)has significantly expanded the application scenarios of InSAR geodetic measurement by increasing the number of measurement points.This study traces the history of DS-InSAR,presents the definition and characteristics of distributed scatterers,and focuses on exploring the relationships and distinctions among proposed algorithms in two crucial steps:statistically homogeneous pixel selection and phase optimization.Additionally,the latest research progress in this field is tracked and the possible development direction in the future is discussed.Through simulation experiments and two real InSAR case studies,the proposed algorithms are compared and verified,and the advantages of DS-InSAR in deformation measurement practice are demonstrated.This work not only offers insights into current trends and focal points for theoretical research on DS-InSAR but also provides practical cases and guidance for applied research.
文摘Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security.
基金Taif University Researchers Supporting Project Number(TURSP-2020/154),Taif University,Taif,Saudi Arabia.
文摘Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process(OPSP)acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarmoptimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.
基金supported by the National Natural Science Foundation of China (NSFC, Grant Nos. 11373025, 11173038 and 11403014)the Tsinghua University Initiative Scientific Research Program (Grant No. 20111081102)+1 种基金supported by the Young Scientist Project of the National Natural Science Foundation of China (Grant No. 11303059)the Chinese Academy of Sciences Youth Innovation Promotion Association
文摘The Hard X-ray Modulation Telescope(HXMT) will perform an all-sky survey in the hard X-ray band as well as deep imaging of a series of small sky regions.We expect various compact objects to be detected in these imaging observations. Point source detection performance of HXMT imaging observation depends not only on the instrument but also on the data analysis method that is applied since images are reconstructed from HXMT observed data with numerical methods. The denoising technique used plays an important part in the HXMT imaging data analysis pipeline along with demodulation and source detection. In this paper we have implemented several methods for denoising HXMT data and evaluated the point source detection performances in terms of sensitivities and location accuracies. The results show that direct demodulation with 1-fold cross-correlation should be the default reconstruction and regularization method, although both sensitivity and location accuracy could be further improved by selecting and tuning numerical methods in data analysis used for HXMT imaging observations.