1
|
Chang CC, Wu HC. A copyright protection scheme of images based on visual cryptography. IMAGING SCIENCE JOURNAL 2016. [DOI: 10.1080/13682199.2001.11784377] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
2
|
Khashan OA, Zin AM, Sundararajan EA. Performance study of selective encryption in comparison to full encryption for still visual images. ACTA ACUST UNITED AC 2014. [DOI: 10.1631/jzus.c1300262] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
|
3
|
Chiou SF, Lu YC, Liao IE, Hwang MS. An efficient reversible data hiding scheme based on SMVQ. THE IMAGING SCIENCE JOURNAL 2013. [DOI: 10.1179/1743131x12y.0000000035] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
|
4
|
Lee WB, Chen TH, Lee CC. Security of new encryption algorithm for image cryptosystems. IMAGING SCIENCE JOURNAL 2013. [DOI: 10.1179/174313106x93723] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
|
5
|
Qi L, Zhang Y, Zhang X, Wang S, Xie F. Statistical behavior analysis and precision optimization for the laser stripe center detector based on Steger's algorithm. OPTICS EXPRESS 2013; 21:13442-13449. [PMID: 23736597 DOI: 10.1364/oe.21.013442] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
Abstract
Triangulation laser range scanning, which has been wildly used in various applications, can reconstruct the 3D geometric of the object with high precision by processing the image of laser stripe. The unbiased line extractor proposed by Steger is one of the most commonly used algorithms in laser stripe center extraction for its precision and robustness. Therefore, it is of great significance to assess the statistical performance of the Steger method when it is applied on laser stripe with Gaussian intensity profile. In this paper, a statistical behavior analysis for the laser stripe center extractor based on Steger method has been carried out. Relationships between center extraction precision, image quality and stripe characteristics have been examined analytically. Optimal scale of Gaussian smoothing kernel can be determined for each laser stripe image to achieve the highest precision according to the derived formula. Flexible three-step noise estimation procedure has been proposed to evaluate the center extraction precision of a typical triangulation laser scanning system by simply referring to the acquired images. The validity of our analysis has been verified by experiments on both artificial and natural images.
Collapse
Affiliation(s)
- Li Qi
- Institute of Optical Communication Engineering, Nanjing University, 2012 Nanjing, Jiangsu, China
| | | | | | | | | |
Collapse
|
6
|
Chun HY, Son J, Jung H, Kim MT, Kim TY, Kim KG, Kim JH. Load and speed effects on thyroid ultrasonography. Biomed Eng Lett 2013. [DOI: 10.1007/s13534-013-0089-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022] Open
|
7
|
Ohsawa Y, Yamaguchi K, Ichikawa T, Sakamoto Y. Computer-generated holograms using multiview images captured by a small number of sparsely arranged cameras. APPLIED OPTICS 2013; 52:A167-A176. [PMID: 23292389 DOI: 10.1364/ao.52.00a167] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/09/2012] [Accepted: 10/04/2012] [Indexed: 06/01/2023]
Abstract
Computer-generated holograms (CGHs) using multiview images (MVIs) are holograms generated with multiple ordinary cameras. This process typically requires a huge number of cameras arranged at high density. In this paper, we propose a method to improve CGH using MVIs that obtains the MVIs by using voxel models rather than cameras. In the proposed method the voxel model is generated using the shape-from-silhouette (SFS) technique. We perform SFS using a small number of cameras arranged sparsely to create voxel models of objects and then generate the required number of images from these models by volume rendering. This enables us to generate CGHs using MVIs with just a small number of sparsely arranged cameras. Moreover, the proposed method arrange CGHs using MVIs at arbitrary positions.
Collapse
Affiliation(s)
- Yusuke Ohsawa
- Graduate School of Information Science and Technology, Hokkaido University, Sapporo 060-0814, Japan.
| | | | | | | |
Collapse
|
8
|
A New Chaos-Based Image-Encryption and Compression Algorithm. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING 2012. [DOI: 10.1155/2012/179693] [Citation(s) in RCA: 33] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
We propose a new and efficient method to develop secure image-encryption techniques. The new algorithm combines two techniques: encryption and compression. In this technique, a wavelet transform was used to decompose the image and decorrelate its pixels into approximation and detail components. The more important component (the approximation component) is encrypted using a chaos-based encryption algorithm. This algorithm produces a cipher of the test image that has good diffusion and confusion properties. The remaining components (the detail components) are compressed using a wavelet transform. This proposed algorithm was verified to provide a high security level. A complete specification for the new algorithm is provided. Several test images are used to demonstrate the validity of the proposed algorithm. The results of several experiments show that the proposed algorithm for image cryptosystems provides an efficient and secure approach to real-time image encryption and transmission.
Collapse
|
9
|
Abstract
In this paper, a novel gray-level image-hiding scheme is proposed. The goal of this scheme is to hide multiple important gray-level images into another meaningful gray-level image. The secret images to be protected are first compressed using the vector quantization scheme. Then, the DES cryptosystem is conducted on the VQ indices and related parameters to generate the encrypted message. Finally, the encrypted message is embedded into the rightmost two bits of each pixel in the cover image. According to the experimental results, average image qualities of 44.320 dB and 30.885 dB are achieved for the embedded images and the retrieved secret images, respectively. In other words, multiple secret images can be effectively hidden into one host image of the same size. In addition, the proposed scheme strengthens the protection of the secret images by conducting the DES cryptosystem on the related parameters and the VQ indices of the compressed secret images. Therefore, the proposed scheme provides a secure approach to embed multiple important images into another meaningful image of the same size.
Collapse
Affiliation(s)
- YU-CHEN HU
- Department of Computer Science and Information Management, Providence University, Taichung, Taiwan 433, R.O.C
| | - MIN-HUI LIN
- Department of Computer Science and Information Management, Providence University, Taichung, Taiwan 433, R.O.C
| |
Collapse
|
10
|
Shie SC, Lin SD, Jiang JH. Visually imperceptible image hiding scheme based on vector quantization. Inf Process Manag 2010. [DOI: 10.1016/j.ipm.2009.07.001] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
11
|
Chen TH, Wu CS. Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf Sci (N Y) 2010. [DOI: 10.1016/j.ins.2009.12.021] [Citation(s) in RCA: 37] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
12
|
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Comput Secur 2009. [DOI: 10.1016/j.cose.2009.03.006] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
13
|
|
14
|
Rahim F, Keikhaei B, Ebadi A. Clinical Manifestation of Pulmonary Dysfunction in β-Thalassemia Major. JOURNAL OF MEDICAL SCIENCES 2008. [DOI: 10.3923/jms.2008.484.490] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022] Open
|
15
|
Chang CC, Wu WC. Fast planar-oriented ripple search algorithm for hyperspace VQ codebook. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2007; 16:1538-47. [PMID: 17547132 DOI: 10.1109/tip.2007.894256] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/15/2023]
Abstract
This paper presents a fast codebook search method for improving the quantization complexity of full-search vector quantization (VQ). The proposed method is built on the planar Voronoi diagram to label a ripple search domain. Then, the appropriate codeword can easily be found just by searching the local region instead of global exploration. In order to take a step further and obtain the close result full-search VQ would, we equip the proposed method with a duplication mechanism that helps to bring down the possible quantizing distortion to its lowest level. According to the experimental results, the proposed method is indeed capable of providing better outcome at a faster quantization speed than the existing partial-search methods. Moreover, the proposed method only requires a little extra storage for duplication.
Collapse
Affiliation(s)
- Chin-Chen Chang
- Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 621, Taiwan, ROC.
| | | |
Collapse
|
16
|
Chang CC, Chou H, Lin CC. Colour image-hiding scheme using human visual system. THE IMAGING SCIENCE JOURNAL 2006. [DOI: 10.1179/174313106x93750] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
|
17
|
Chang CC, Chan CS, Tai WL. Hiding a halftone secret image in two camouflaged halftone images. PATTERN RECOGNITION AND IMAGE ANALYSIS 2006. [DOI: 10.1134/s1054661806030163] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
18
|
Wu HC, Wu NI, Tsai CS, Hwang MS. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. ACTA ACUST UNITED AC 2005. [DOI: 10.1049/ip-vis:20059022] [Citation(s) in RCA: 314] [Impact Index Per Article: 16.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
|
19
|
|
20
|
Yeh CH, Chang HT, Chien HC, Kuo CJ. Design of cascaded phase keys for a hierarchical security system. APPLIED OPTICS 2002; 41:6128-6134. [PMID: 12389981 DOI: 10.1364/ao.41.006128] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/23/2023]
Abstract
An image cryptosystem based on multiple phase-only masks is proposed. The proposed cryptosystem is a hierarchical security system that can use multiple phase keys to retrieve different amounts of data. In addition to the sequential order of the phase keys, the distance parameters among the phase keys are introduced to increase the system security. Even when an illegal user steals all the phase keys, the system cannot be broken without the correct sequential order and the distance parameters. However, the proposed system can verify the identities of the persons by the cascaded structure for the phase keys to generate different verification images. Simulation results are further demonstrated to verify the proposed method.
Collapse
Affiliation(s)
- Chia H Yeh
- Department of Electrical Engineering, National Chung Cheng Universityi, Chiayi, Taiwan
| | | | | | | |
Collapse
|
21
|
|
22
|
|
23
|
|
24
|
Tsai CS, Chang CC, Chen TS. Image steganography using vector quantization and discrete cosine transform. THE IMAGING SCIENCE JOURNAL 2000. [DOI: 10.1080/13682199.2000.11784363] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|