14 research outputs found

    Multiple-image encryption by compressive holography

    Get PDF
    We present multiple-image encryption (MIE) based on compressive holography. In the encryption, a holographic technique is employed to record multiple images simultaneously to form a hologram. The two-dimensional Fourier data of the hologram are then compressed by nonuniform sampling, which gives rise to compressive encryption. Decryption of individual images is cast into a minimization problem. The minimization retains the sparsity of recovered images in the wavelet basis. Meanwhile, total variation regularization is used to preserve edges in the reconstruction. Experiments have been conducted using holograms acquired by optical scanning holography as an example. Computer simulations of multiple images are subsequently demonstrated to illustrate the feasibility of the MIE scheme.published_or_final_versio

    Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

    Get PDF
    Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submitted over the Internet, for example, since a potential attacker needs to first detect, then extract and then decrypt the embedded data in order to recover the original information. After providing an extensive survey of the current methods available, we present a new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption. The application of this technique, which is based on a technique called ‘Stochastic Diffusion’ are wide ranging and include covert image information interchange, digital image authentication, video authentication, copyright protection and digital rights management of image data in general

    Digital watermarking and novel security devices

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Adaptive Watermarking Scheme Using Biased Shift of Quantization Index

    Get PDF

    Research and Application of Computer Generated Hologram on Digital Watermarking

    Get PDF
    随着多媒体技术和网络技术的发展,数字多媒体产品的版权保护和安全问题成为一个相当重要而又富有挑战性的研究课题。作为一种数字产品版权保护的有效解决方案,数字水印技术被广泛地研究。由于全息图具有天然的加密特性以及很强的抗干扰能力,全息技术被引入到数字水印领域,为保护数字产品提供新的有效途径。本文对计算全息图在数字图像水印技术中的应用进行了深入的研究,主要研究内容和成果如下: 1) 提出用一个聚类中心迭代选择过程来代替聚类中心随机初始化过程,对FCM(FuzzyC-Means)聚类算法进行改进。在此基础上,提出一种自适应计算全息图像水印算法。结合人眼视觉掩蔽特性,该水印算法首先利用改进的FCM算法在...With the great development of multimedia and internet techniques, the copyright protection and security of digital media become an important and challenging research topic. Digital watermarking which is regarded as an efficient approach for the protection of digital data has been widely explored. Recently, a new approach which uses digital holograms as the watermarks has been introduced because of...学位:理学博士院系专业:物理与机电工程学院物理学系_光学学号:1982008015051

    Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

    Get PDF
    A novel optical encryption method is proposed in this paper to achieve 3-D image encryption. This proposed encryption algorithm combines the use of computational integral imaging (CII) and linear-complemented maximum- length cellular automata (LC-MLCA) to encrypt a 3D image. In the encryption process, the 2-D elemental image array (EIA) recorded by light rays of the 3-D image are mapped inversely through the lenslet array according the ray tracing theory. Next, the 2-D EIA is encrypted by LC-MLCA algorithm. When decrypting the encrypted image, the 2-D EIA is recovered by the LC-MLCA. Using the computational integral imaging reconstruction (CIIR) technique and a 3-D object is subsequently reconstructed on the output plane from the 2-D recovered EIA. Because the 2-D EIA is composed of a number of elemental images having their own perspectives of a 3-D image, even if the encrypted image is seriously harmed, the 3-D image can be successfully reconstructed only with partial data. To verify the usefulness of the proposed algorithm, we perform computational experiments and present the experimental results for various attacks. The experiments demonstrate that the proposed encryption method is valid and exhibits strong robustness and security

    Research on digital image watermark encryption based on hyperchaos

    Get PDF
    The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value
    corecore