Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Gong, Li-Hua" wg kryterium: Autor


Wyświetlanie 1-5 z 5
Tytuł:
Robust dual color images watermarking scheme with hyperchaotic encryption based on quaternion DFrAT and genetic algorithm
Autorzy:
Luo, Hui-Xin
Gong, Li-Hua
Chen, Su-Hua
Powiązania:
https://bibliotekanauki.pl/articles/27310094.pdf
Data publikacji:
2023
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
color image watermarking
hyperchaotic encryption
quaternion discrete fractional angular transform
quaternion singular value decomposition
genetic algorithm
Opis:
A robust dual color images watermarking algorithm is designed based on quaternion discrete fractional angular transform (QDFrAT) and genetic algorithm. To guarantee the watermark security, the original color watermark image is encrypted with a 4D hyperchaotic system. A pure quaternion matrix is acquired by performing the discrete wavelet transform (DWT), the block division and the discrete cosine transform on the original color cover image. The quaternion matrix is operated by the QDFrAT to improve the robustness and the security of the watermarking scheme with the optimal transform angle and the fractional order. Then the singular value matrix is obtained by the quaternion singular value decomposition (QSVD) to further enhance the scheme’s stability. The encryption watermark is also processed by DWT and QSVD. Afterward, the singular value matrix of the encryption watermark is embedded into the singular value matrix of the host image by the optimal scaling factor. Moreover, the values to balance imperceptibility and robustness are optimized with a genetic algorithm. It is shown that the proposed color image watermarking scheme performs well in imperceptibility, security, robustness and embedding capacity.
Źródło:
Optica Applicata; 2023, 53, 2; 261--280
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system
Autorzy:
Nie, Zhe
Liu, Zheng-Xin
He, Xiang-Tao
Gong, Li-Hua
Powiązania:
https://bibliotekanauki.pl/articles/174108.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
hyper-chaotic system
advanced encryption standard
discrete cosine transform
image encryption
image compression
Opis:
An image compression and encryption algorithm by combining the advanced encryption standard (AES) with the hyper-chaotic system is designed, in which Arnold map is employed to eliminate part of the block effect in the image compression process. The original image is compressed with the assistance of a discrete cosine transform and then its transform coefficients are encrypted with the AES algorithm. Besides, the hyper-chaotic system is adopted to introduce the nonlinear processfor image encryption. Numerical simulations and theoretical analyses demonstrate that the proposed image compression and encryption algorithm is of high security and good compression performance.
Źródło:
Optica Applicata; 2019, 49, 4; 545-558
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hybrid watermarking scheme based on singular value decomposition ghost imaging
Autorzy:
Wu, Jun-Yun
Huang, Wei-Liang
Wen, Ru-Hong
Gong, Li-Hua
Powiązania:
https://bibliotekanauki.pl/articles/1835818.pdf
Data publikacji:
2020
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
digital watermarking
SVD ghost imaging
discrete wavelet transform
imperceptibility
Opis:
A hybrid watermarking algorithm with an optical watermark image based on singular value decomposition (SVD) ghost imaging is designed. Simultaneously, the blended watermarking algorithm is designed based on 4-level discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The 4-level diagonal sub-band image is obtained by performing 4-level two-dimensional wavelet transform on the original image, and the coefficient matrix is produced by applying the discrete cosine transform on the 4-level diagonal sub-band image. Then, three matrices are obtained by performing the singular value decomposition on the coefficient matrix. In addition, the optical watermark image is encrypted by an SVD ghost imaging system. The system could generate a secret key, and unauthorized users could not decrypt and reconstruct the original watermark image without this key. Later the encrypted watermark image is generated into the other three matrices by singular value decomposition. Afterwards, the encrypted watermark is embedded in the host image by mutual operation of different matrices in the algorithm. Simulation results validate the feasibility of the proposed hybrid watermarking scheme.
Źródło:
Optica Applicata; 2020, 50, 4; 633--647
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Double-image encryption algorithm based on discrete fractional angular transform and fractional Fourier transform
Autorzy:
Qiu, Tian
Dai, Wei-Hua
Chen, Su-Hua
Zhou, Hang
Gong, Li-Hua
Powiązania:
https://bibliotekanauki.pl/articles/2172857.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
chaotic system
fractional transform
discrete fractional angular transform
double-image encryption
Opis:
By combining fractional Fourier transform with discrete fractional angular transform, a double-image encryption algorithm is designed. The discrete cosine transform is performed on two grayscale images to generate a spectrum image, and then the generated spectrum image is compressed into an image with Zigzag scanning. The compressed image is processed with the discrete fractional angular transform, and then fractional Fourier transform and double random phase coding are executed on the image. The DNA operation controlled by chaotic system is introduced to change the pixel values. Finally, the ciphertext image is obtained through bit-level permutation and pixel adaptive diffusion. The statistical information of the plaintext images is employed as the input of the SHA-256 to calculate the initial conditions of the chaotic map. Simulation experiments demonstrate that the double-image encryption algorithm can effectively reduce the correlation among adjacent pixels of the plaintext images.
Źródło:
Optica Applicata; 2022, 52, 4; 669--684
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Color image encryption scheme based on quaternion discrete multi-fractional random transform and compressive sensing
Autorzy:
Ye, Huo-Sheng
Dai, Jing-Yi
Wen, Shun-Xi
Gong, Li-Hua
Zhang, Wen-Quan
Powiązania:
https://bibliotekanauki.pl/articles/2033985.pdf
Data publikacji:
2021
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
color image encryption
quaternion discrete multi-fractional random transform
compressive sensing
confusion-diffusion strategy
Opis:
A color image compression-encryption algorithm by combining quaternion discrete multi-fractional random transform with compressive sensing is investigated, in which the chaos-based fractional orders greatly improve key sensitivity. The original color image is compressed and encrypted with the assistance of compressive sensing, in which the partial Hadamard matrix adopted as a measurement matrix is constructed by iterating Chebyshev map instead of utilizing the entire Guassian matrix as a key. The sparse images are divided into 12 sub-images and then represented as three quaternion signals, which are modulated by the quaternion discrete multi-fractional random transform. The image blocking and the quaternion representation make the proposed cryptosystem avoid additional data extension existing in many transform-based methods. To further improve the level of security, the plaintext-related key streams generated by the 2D logistic-sine-coupling map are adopted to diffuse and confuse the intermediate results simultaneously. Consequently, the final ciphertext image is attained. Simulation results reveal that the proposed cryptosystem is feasible with high security and has strong robustness against various attacks.
Źródło:
Optica Applicata; 2021, 51, 3; 349-364
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies