In this paper, a novel image watermarking method is proposed which is based on discrete wave transformation (DWT), Hessenberg decomposition (HD), and singular value decomposition (SVD). First, in the embedding process, the host image is decomposed into a number of sub-bands through multilevel DWT, and the resulting coefficients of which are then used as the input for HD. The watermark is operated on the SVD at the same time. The watermark is finally embedded into the host image by the scaling factor. Fruit fly optimization algorithm, one of the natural-inspired optimization algorithms is devoted to find the scaling factor through the proposed objective evaluation function. The proposed method is compared to other research works under various spoof attacks, such as the filter, noise, JPEG compression, JPEG2000 compression, and sharpening attacks. The experimental results show that the proposed image watermarking method has a good trade-off between robustness and invisibility even for the watermarks with multiple sizes.INDEX TERMS Image watermarking, discrete wave transformation, singular value decomposition, Hessenberg decomposition, fruit fly optimization algorithm.
Due to the potential security problem about key management and distribution for the symmetric image encryption schemes, a novel asymmetric image encryption method is proposed in this paper, which is based on the elliptic curve ElGamal (EC-ElGamal) cryptography and chaotic theory. Specifically, the SHA-512 hash is first adopted to generate the initial values of a chaotic system, and a crossover permutation in terms of chaotic index sequence is used to scramble the plain-image. Furthermore, the generated scrambled image is embedded into the elliptic curve for the encrypted by EC-ElGamal which can not only improve the security but also can help solve the key management problems. Finally, the diffusion combined chaos game with DNA sequence is executed to get the cipher image. The experimental analysis and performance comparisons demonstrate that the proposed method has high security, good efficiency, and strong robustness against the chosen-plaintext attack which make it have potential applications for the image secure communications. INDEX TERMS SHA-512 hash, elliptic curve ElGamal encryption, chaos game, crossover permutation.
The chaotic map has complex dynamics under ideal conditions however it suffers from the problem of performance degradation in the case of finite computing precision. In order to prevent the dynamics degradation, in this paper the continuous Chen chaotic system is used to perturb both the inputs and parameters of Chebyshev map to minimize the chaotic degradation phenomenon under finite precision. Experimental evaluations and corresponding performance analysis demonstrate that the Chebyshev chaotic map has a good randomness and complex dynamic performance by using the proposed perturbation method, and some attributes of the proposed system are stronger than the original system (e.g. chaos attractor and approximate entropy). Finally, the corresponding pseudorandom number generator (PRNG) is constructed by this method and then its randomness is evaluated via NIST SP800-22 and TestU01 test suites, respectively. Statistical test results show that the proposed PRNG has high reliability of randomness, thus it can be used for cryptography and other potential applications.
Cataracts, which are lenticular opacities that may occur at different lens locations, are the leading cause of visual impairment worldwide. Accurate and timely diagnosis can improve the quality of life of cataract patients. In this paper, a feature extraction-based method for grading cataract severity using retinal images is proposed. To obtain more appropriate features for the automatic grading, the Haar wavelet is improved according to the characteristics of retinal images. Retinal images of non-cataract, as well as mild, moderate, and severe cataracts, are automatically recognized using the improved Haar wavelet. A hierarchical strategy is used to transform the four-class classification problem into three adjacent two-class classification problems. Three sets of two-class classifiers based on a neural network are trained individually and integrated together to establish a complete classification system. The accuracies of the two-class classification (cataract and non-cataract) and four-class classification are 94.83% and 85.98%, respectively.The performance analysis demonstrates that the improved Haar wavelet feature achieves higher accuracy than the original Haar wavelet feature, and the fusion of three sets of two-class classifiers is superior to a simple four-class classifier. The discussion indicates that the retinal image-based method offers significant potential for cataract detection.
In terms of Chua's circuit system, compressive sensing (CS) and Haar wavelet, a novel image compression-encryption scheme (CES) is proposed in this paper. Firstly, the plaintext image is decomposed into approximate component and detail components through Haar wavelet. Then the approximate component is diffused by the threshold processing of local binary patterns (LBP) operator-based chaotic sequence which is produced by the combination of Chua's circuit and Logistic map. Next, the Lissajous map is applied to generate the chaos-combined asymptotic deterministic random measurement matrices (CADRMM) which are employed to measure the detail components in different compression ratios. In addition, the combination of mapped approximate and detail components is shuffled by the Logistic map. The experimental results and simulation analysis prove that the proposed cryptosystem is capable of reducing data for transmission and has good security performance under various attacks, especially for the shear and noise attacks.
Perturbation imposed on a chaos system is an effective way to maintain its chaotic features. A novel parameter perturbation method for the tent map based on the Lyapunov exponent is proposed in this paper. The pseudo-random sequence generated by the tent map is sent to another chaos function — the Chebyshev map for the post processing. If the output value of the Chebyshev map falls into a certain range, it will be sent back to replace the parameter of the tent map. As a result, the parameter of the tent map keeps changing dynamically. The statistical analysis and experimental results prove that the disturbed tent map has a highly random distribution and achieves good cryptographic properties of a pseudo-random sequence. As a result, it weakens the phenomenon of strong correlation caused by the finite precision and effectively compensates for the digital chaos system dynamics degradation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.