• 제목/요약/키워드: Image security

검색결과 1,142건 처리시간 0.026초

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • 제5권6호
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

  • Zhang, Xiao;Wang, Chengqi;Zheng, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1785-1801
    • /
    • 2017
  • In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.

에지영상의 비율을 이용한 차종 인식 보안 알고리즘 (Security Algorithm for Vehicle Type Recognition)

  • 이유진
    • 융합정보논문지
    • /
    • 제7권2호
    • /
    • pp.77-82
    • /
    • 2017
  • 본 논문은 차량영상을 입력영상으로 받아 차량의 종류를 인식하는 보안 알고리즘을 연구한다. 차량 인식 보안 알고리즘은 영상입력, 배경제거, 에지영역 추출, 전처리(이진화), 차량인식 등의 5가지 핵심부분으로 구성된다. 그러므로 차량 종류 인식 보안 알고리즘의 최종 인식율은 각 단계의 역할 및 기능에 직간접적인 영향을 받는다. 영상을 그레이 스케일 이미지로 입력시킨 후 배경을 제거하고, 에지영역만 추출한 후 이진화를 거친다. 외곽선을 또렷하게 해주기 위한 전처리 과정을 거친 후 차량의 높이와 넓이의 비율을 통해 차량의 종류를 대형차, 승용차, 오토바이의 3가지 범주로 나누게 했다.

A Hierarchical Bilateral-Diffusion Architecture for Color Image Encryption

  • Wu, Menglong;Li, Yan;Liu, Wenkai
    • Journal of Information Processing Systems
    • /
    • 제18권1호
    • /
    • pp.59-74
    • /
    • 2022
  • During the last decade, the security of digital images has received considerable attention in various multimedia transmission schemes. However, many current cryptosystems tend to adopt a single-layer permutation or diffusion algorithm, resulting in inadequate security. A hierarchical bilateral diffusion architecture for color image encryption is proposed in response to this issue, based on a hyperchaotic system and DNA sequence operation. Primarily, two hyperchaotic systems are adopted and combined with cipher matrixes generation algorithm to overcome exhaustive attacks. Further, the proposed architecture involves designing pixelpermutation, pixel-diffusion, and DNA (deoxyribonucleic acid) based block-diffusion algorithm, considering system security and transmission efficiency. The pixel-permutation aims to reduce the correlation of adjacent pixels and provide excellent initial conditions for subsequent diffusion procedures, while the diffusion architecture confuses the image matrix in a bilateral direction with ultra-low power consumption. The proposed system achieves preferable number of pixel change rate (NPCR) and unified average changing intensity (UACI) of 99.61% and 33.46%, and a lower encryption time of 3.30 seconds, which performs better than some current image encryption algorithms. The simulated results and security analysis demonstrate that the proposed mechanism can resist various potential attacks with comparatively low computational time consumption.

A New Method for Robust and Secure Image Hash Improved FJLT

  • ;김형중
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2009년도 정보통신설비 학술대회
    • /
    • pp.143-146
    • /
    • 2009
  • There are some image hash methods, in the paper four image hash methods have been compared: FJLT (Fast Johnson- Lindenstrauss Transform), SVD (Singular Value Decomposition), NMF (Non-Negative Matrix Factorization), FP (Feature Point). From the compared result, FJLT method can't be used in the online. the search time is very slow because of the KNN algorithm. So FJLT method has been improved in the paper.

  • PDF

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong;Jia, Xiaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4487-4511
    • /
    • 2018
  • A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.

간섭 홀로그램과 광굴절매질을 이용한 안정한 광 정보보호 시스템의 구현 (Implementation of Stable Optical Information Security System using Interference Hologram and Photorefractive Material)

  • 김철수
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2001년도 춘계학술대회논문집:21세기 신지식정보의 창출
    • /
    • pp.64-76
    • /
    • 2001
  • In this paper, A simple image hologram encryption and decryption technique based on the principle of interference are proposed. The technique using the photorefractive material for getting a stable interference pattern is also proposed. And combine these two techniques, I would like to implement a stable optical information security system. In the encrypting process, I would generate binary phase hologram which can reconstruct original image perfectly, and regard this hologram as original image to be encrypted image. And then the hologram is encrypted as randomly generated binary phase image. Reference image is also generated from the encrypted image by applying interference rule. In the decrypting process, I can get a interference intensity by interfering the reference image and the encrypted image in the interferometer. and transform inferference intensity information into phase information. I recover original image by inverse Fourier transforming the phase information. In this process, the intensity information generated by interference of two images is very sensitive to external vibrations. So, I would like to get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) in photorefractive materials, especially BaTiO₃.

  • PDF

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.

이산 카오스 함수와 Permutation Algorithm을 결합한 고신뢰도 광영상 암호시스템 (A high reliable optical image encryption system which combined discrete chaos function with permutation algorithm)

  • 박종호
    • 정보보호학회논문지
    • /
    • 제9권4호
    • /
    • pp.37-48
    • /
    • 1999
  • 현대암호방식은 종래의 선형 대수와 수리이론을 적용한 암호통신을 벗어난 유사 잡음성을 띠는 카오스 신호를 이용한 암호통신을 적용해 오고 있다,[1-2] 본 논문은 1차 permutation 알고 리즘을 이용 하여 변환된 정보를 2차 이산 카오스 변환 함수를 이용해 암호화하는 광영상 암호시스템을 제안하여UT 다. 제안된 시스템은 키수열 발생기의 출력을 통해 영상정보를 permutation 하는 알고리즘 을 설계하였고 이에 대한 검정을 수행하였다. 또한 본 논문에서는 permutation 알고리즘을 통해 제한적인 카오스 함수 의 적용시 발생하는 문제점을 해결하고 비도를 증가시킴으로써 광영상 암호시스템에 적용 시 그 타당성 을 검정하였다. Current encryption methods have been applied to secure communication using discrete chaotic system whose output is a noise-like signal which differs from the conventional encryption methods that employ algebra and number theory[1-2] We propose an optical encryption method that transforms the primary pattern into the image pattern of discrete chaotic function first a primary pattern is encoded using permutation algorithm, In the proposed system we suggest the permutation algorithm using the output of key steam generator and its security level is analyzed. In this paper we worked out problem of the application about few discrete chaos function through a permutation algorithm and enhanced the security level. Experimental results with image signal demonstrate the proper of the implemented optical encryption system.

Visual Cryptography Based on an Interferometric Encryption Technique

  • Lee, Sang-Su;Na, Jung-Chan;Sohn, Sung-Won;Park, Chee-Hang;Seo, Dong-Hoan;Kim, Soo-Joong
    • ETRI Journal
    • /
    • 제24권5호
    • /
    • pp.373-380
    • /
    • 2002
  • This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated nuder the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.

  • PDF