首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

A wide-band optical frequency hopping (FH) scheme is proposed and analyzed using hyper digital chaos, where the chaotic sequences are applied to encrypt the original data in physical layer during transmission. The multi-fold data encryption is achieved based on the dynamic generation of the optical carrier frequency, FH rate as well as the available frequency set respectively. A hyper digital chaos is used to generate the multiple, independent chaotic sequences for the proposed data encryption, as a result, a huge key space of 1058 is provided to enhance the security. The performances of data transmission and security enhancement against various attacks are evaluated in details.

  相似文献   

2.
一种基于混沌序列的数字图像加密算法   总被引:7,自引:0,他引:7  
李兴华  高飞 《电讯技术》2006,46(1):99-104
对Logistic映射混沌序列生成方法作了一些改进,改进后生成的序列不仅克服了一维混沌序列的短周期行为,而且统计性能有了一定程度的改善。提出了一种基于此混沌序列的JPEG格式数字图像加密算法,通过在图像压缩的同时执行加密运算,使密图具有良好的压缩效率,试验表明加密效果是令人掩意的。  相似文献   

3.
胡克亚  王君  王莹 《激光技术》2019,43(4):532-538
为了提高多图像加密的安全性,同时解决多图像加密系统数据量大的问题,采用了基于分块压缩感知和改进幻方变换的加密方法。加密过程中,充分利用了混沌序列对初始值的敏感性,解决基于传统幻方变换的加密算法周期性的问题;结合分块压缩感知的方法,减少加密系统的数据量。对4幅256×256的灰度图像进行加密测试。结果表明,系统加密时间只需要0.98s,重建图像的质量高,相关系数值均高于0.99,峰值信噪比值均大于35dB; 该算法在减少加密系统的数据量的同时进一步提高了系统的安全性。该算法实现容易,能高效安全地完成多图像加密。  相似文献   

4.
The access and distribution convenience of public networks opens a considerable content security threat when sending, receiving, and using multimedia information. In this paper, a content security protection scheme that integrates encryption and digital fingerprinting is proposed to provide comprehensive security protection for multimedia information during its transmission and usage. In contrast to other schemes, this method is implemented in the JPEG compressed domain with no transcoding or decompression, therefore, this scheme is highly efficient and suitable for multimedia information, which is seldom available in an uncompressed form. In addition, a variable modular encryption method is proposed to solve the invalid variable length coding (VLC) problem when a compressed data stream is encrypted directly. Experimental results demonstrate improved security and the efficiency provided by the proposed scheme. The experiments also demonstrate imperceptibility and collusion resistance of fingerprints.  相似文献   

5.
The recent explosion in multimedia and networking application places a great demand on efficient transmission of images at low bit rate with high security. Mixing several existing standard encryption techniques with image encoding tends to change the compression ratio greatly. In this paper, a novel image encryption algorithm is embedded as a part of JPEG image encoding scheme to meet three major necessities: (1) to provide temporal security against casual observer, (2) to preserve the compression ratio, (3) remain compliant with the JPEG file format. In the proposed algorithm, the modified DCT blocks are confused by a fuzzy PN sequence. In addition to that, the DCT coefficients of each modified DCT block are converted to unique uncorrelated symbols, which are confused by another fuzzy PN sequence. Finally, the variable length encoded bits are encrypted by chaotic stream cipher. An amalgamation of all the three techniques with random combination of seeds will provide the required security against the casual listener/observer where the security needed is only in-terms of few hours.  相似文献   

6.
董莉  王玲  邵鹏飞 《电讯技术》2008,48(1):56-59
结合Logistic映射及混合光学双稳模型,提出一种新的复合混沌加密算法用于医学图像水印加密,并将加密后的水印嵌入医学图像小波域的NROI中。实验证明,复合混沌映射极大地增强了系统的安全性,所提出的盲检测算法在保护ROI的同时提高了水印抗JPEG压缩的鲁棒性,并对篡改、剪切、滤波等均具有良好的鲁棒性和透明性。  相似文献   

7.
Compression and encryption are often performed together for image sharing and/or storage. The order in which the two operations are carried out affects the overall efficiency of digital image services. For example, the encrypted data has less or no compressibility. On the other hand, it is challenging to ensure reasonable security without downgrading the compression performance. Therefore, incorporating one requirement into another is an interesting approach. In this study, we propose a novel hybrid image encryption and compression scheme that allows compression in the encryption domain. The encryption is based on Chaos theory and is carried out in two steps, i.e., permutation and substitution. The lossless compression is performed on the shuffled image and then the compressed bitstream is grouped into 8-bit elements for substitution stage. The lossless nature of the proposed method makes it suitable for medical image compression and encryption applications. The experimental results shows that the proposed method achieves the necessary level of security and preserves the compression efficiency of a lossless algorithm. In addition, to improve the performance of the entropy encoder of the compression algorithm, we propose a data-to-symbol mapping method based on number theory to represent adjacent pixel values as a block. With such representation, the compression saving is improved on average from 5.76% to 15.45% for UCID dataset.  相似文献   

8.
Data hiding approach for efficient image indexing   总被引:7,自引:0,他引:7  
Jiang  J. Armstrong  A. 《Electronics letters》2002,38(23):1424-1425
A data hiding approach to embed the indexing keys inside the JPEG compressed images for their retrieval, inspired from the spirit of digital watermarking, is proposed. At the stage of database population, the existing approach is to compress all images by standard JPEG in order to save their storage space, but this ignores the compression of their indexing keys under the notion that the size of each indexing key is negligible. When a large image database is established, however, this part of storage space becomes non-trivial. By hiding the indexing keys inside the JPEG compressed codes, significant advantages are gained in that the indexing keys can be compressed naturally by JPEG without any additional cost. Experiments on hiding an indexing key of 256 bytes illustrate that: no noticeable distortion is introduced in comparison with non-watermarked images; and their storage space is reduced into the region of 7-27% of their original size.  相似文献   

9.
In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.  相似文献   

10.
Down-scaling for better transform compression   总被引:1,自引:0,他引:1  
The most popular lossy image compression method used on the Internet is the JPEG standard. JPEG's good compression performance and low computational and memory complexity make it an attractive method for natural image compression. Nevertheless, as we go to low bit rates that imply lower quality, JPEG introduces disturbing artifacts. It is known that, at low bit rates, a down-sampled image, when JPEG compressed, visually beats the high resolution image compressed via JPEG to be represented by the same number of bits. Motivated by this idea, we show how down-sampling an image to a low resolution, then using JPEG at the lower resolution, and subsequently interpolating the result to the original resolution can improve the overall PSNR performance of the compression process. We give an analytical model and a numerical analysis of the down-sampling, compression and up-sampling process, that makes explicit the possible quality/compression trade-offs. We show that the image auto-correlation can provide a good estimate for establishing the down-sampling factor that achieves optimal performance. Given a specific budget of bits, we determine the down-sampling factor necessary to get the best possible recovered image in terms of PSNR.  相似文献   

11.
为了解决图像加密后数据量大、传输速率慢的问题,采用了离散余弦变换(DCT)与脱氧核糖核酸(DNA)运算相结合的图像压缩加密方法.首先采用DCT对原始图像进行压缩;再进行DNA编码;最后根据DNA运算的思想,通过Chen混沌系统对原始图像执行DNA加法运算,成功得到了加密图像.结果表明,该算法不仅有效地提高图像传输速度、减少存储空间,同时加密效果好、安全性高.  相似文献   

12.
In this paper, a novel method for lossless image encryption based on set partitioning in hierarchical trees and cellular automata. The proposed encryption method embeds the encryption into the compression process, in which a small part of the data is encrypted quickly, while maintaining the good coding characteristics of set partitioning in hierarchical trees (SPIHT). The proposed encryption system adopts three stages of scrambling and diffusion. In each stage of encryption, different chaotic systems are used to generate the plaintext-related key stream to maintain high security and to resist some attacks. Moreover, the channel length of the coded-and-compressed color image is more uncertain, resulting into higher difficulty for attackers to decipher the algorithm. The experimental results indicate that the length of bitstream is compressed to 50% of the original image, showing that our proposed algorithm has higher lossless compression ratio compared with the existing algorithms. Meanwhile, the encryption scheme passes the entropy analysis, sensitivity analysis, lossless recovery test, and SP800-22 test.  相似文献   

13.

Communication fields are growing rapidly in the recent era, so transmitting the multimedia contents through an open channel becomes a challenging task. The multimedia contents that are transmitted through this channel are highly prone to vulnerabilities and attacks. Therefore, secure and efficient data communication is considered as a major concern in the multimedia communication systems. So, major efforts are taken by researchers to safeguard the originality of each image. In a conventional system, the secure image communication process was achieved by compressing the content first, and then encryption is performed over the compressed data. Even though it met the required security and compression ratio, but some applications may require the reverse system. In this method, the encryption process is conducted prior to compression to improve the privacy of user data. Moreover, the initial concentration is given for improving content privacy rather than concentrating on size reduction. This paper proposes a reversed system that uses block based perceptual encryption algorithm for encryption and vector quantization (VQ) with hybrid Lloyd–Buzo–Gray (LBG)-Adaptive Deer Hunting Optimization (ADHO) algorithm (VQ-LBG-ADHO) for compression. So, the content secrecy gets improved. The involvement of this adaptive optimization method enhances the performance of VQ in the compression process. This method highly concentrates on secure communication, so the reverse process is followed in this method. It not only improves the image secrecy, however, it further enhances the image quality. The performance of this secure communication process is compared with state-of-the-art algorithms, and the results reveal that the proposed method outperforms the other existing methods.

  相似文献   

14.
This paper presents a secure MQ coder (SMQ) for efficient selective encryption of JPEG 2000 images. Being different from existing schemes where encryption overhead is proportional to the size of plain image, SMQ only selectively encrypts tiny and constant volume of data in JPEG 2000 coding regardless of image size. It is extremely fast and suitable for protecting JPEG 2000 images in wireless multimedia sensor networks (WMSNs). Theoretical analysis and experimental results show that SMQ can achieve a balance between security and efficiency, while keeping comparable compression performance and energy consumption with standard JPEG 2000 coding.  相似文献   

15.
The existing image encryption schemes are not suitable for the secure transmission of large amounts of data in range-gated laser imaging under high noise background. Aiming at this problem, a range-gated laser imaging image compression and encryption method based on bidirectional diffusion is proposed. The image data collected from the range-gated laser imaging source is sparsely represented by the discrete wavelet transform. Arnold chaotic system is used to scramble the sparse matrix, and then the measurement matrix is constructed by the quantum cellular neural network (QCNN) to compress the image. In addition, the random sequence generated by QCNN hyperchaotic system is used to carry out "bidirectional diffusion" operation on the compression result, so as to realize the security encryption of image data. The comparative analysis of the security encryption performance of different compression ratios shows that the histogram sample standard of the encrypted image can reach about 10, and the information entropy value is more than 7.99, which indicates that the encryption scheme effectively hides the plaintext information of the original image. When the encrypted image is attacked by different degrees of noise, this method can still reconstruct the image through the effective decryption process. The experimental results show that this method realizes the secure compression and encryption of gated-laser imaging image data, and effectively ensures the security of data while reducing the amount of channel transmission data.  相似文献   

16.
牛亚坤  赵耀  李晓龙 《信号处理》2022,38(6):1170-1179
数字图像被动取证是利用图像的固有属性对其真实性认证、拼接区域定位及篡改历史分析的技术。由于大多数图像都需要进行JPEG压缩以便存储和传输,基于JPEG格式的数字图像被动取证越来越受到关注。为了更加全面地对现有取证方法进行梳理与归纳,本文着重对JPEG图像相关的取证技术进行介绍,详细论述了双重JPEG压缩检测、量化矩阵估计和拼接检测与定位方法中的关键技术,分析现有方法存在的问题与面临的困难,并对未来发展方向进行展望。   相似文献   

17.
Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Although suggested in a number of specific cases, selective encryption could be much more widely used in consumer electronic applications ranging from mobile multimedia terminals through digital cameras were it subjected to a more thorough security analysis. We describe selective encryption and develop a simple scaler quantizer example to demonstrate the power of the concept, list a number of potential consumer electronics applications, and then describe an appropriate method for developing and analyzing selective encryption for particular compression algorithms. We summarize results from application of this method to the MPEG-2 video compression algorithm.  相似文献   

18.
改进的DNA图像加密算法   总被引:1,自引:0,他引:1  
针对数字图像加密算法复杂度高、安全性较差问题,通过对相关算法进行研究,提出一种DNA序列与混沌系统相结合的新型算法。该算法突破了先置乱图像像素后改变像素值的方式,利用传统DNA密码学中的并行性和信息密度的特性,对数字图像进行处理,然后结合混沌序列对其进行加密。仿真结果表明,较其他算法相比,不仅具有安全性高,密钥空间大,而且对穷举攻击、统计攻击、差分攻击有良好的鲁棒性。  相似文献   

19.
于会臻  侯国成 《现代电子技术》2007,30(16):135-137,147
因为图像数据量很大,所以在存储和传输图像之前必须进行必要的压缩处理。为了方便用于车载图像的传输,根据车载图像传输系统的要求进行了对JPEG算法进行研究及优化。介绍了JPEG标准,同时根据设计要求选择了几种适合车载图像传输的优化算法,并基于C语言实现,压缩效果较好,最后讨论了压缩系统的性能。试验结果可用于车载图像传输系统之中,提高了传输的效率,节约了传输成本。  相似文献   

20.
Providing security to the data that stored in personal health record (PHR) is an emerging and critical task in recent years. For this purpose, some of the encryption and key generation techniques are developed in the traditional works. But it has the drawbacks such as lacks in access control policies, reduced security, and ineffective. So this work implemented the efficient techniques, namely, elliptic curve Diffie‐Hellman for the secret key generation and identity attribute–based encryption for improving the security of the cloud data. Initially, the cloud user can request the patient's data to the PHR admin, and then they can generate the secret by using the elliptic curve Diffie‐Hellman algorithm. The key that used for encryption and decryption is generated by using the identity attribute–based encryption technique. Then, the access control is provided to the users based on their roles. The requested data are encrypted by applying the advanced encryption standard technique. After that, the elliptic curve digital signature algorithm is used to generate the digital signature for the encrypted data. Furthermore, it is verified with the user's digital signature; if it matches, the data can be accessed by the user with the help of advanced encryption standard decryption mechanism. Finally, the authenticated user can able to access the patient's data from PHR. In experiments, the performance of the proposed encryption and key generation technique is evaluated and compared with the existing techniques for proving the effectiveness of the implemented system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号