Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "images security" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Biometric watermarking for security enhancement in digital images
Autorzy:
Wójtowicz, W.
Powiązania:
https://bibliotekanauki.pl/articles/115437.pdf
Data publikacji:
2013
Wydawca:
Fundacja na Rzecz Młodych Naukowców
Tematy:
images security
watermarking technique
discrete wavelet transform (DWT)
biometrics
principal component analysis (PCA)
Opis:
In this paper some preliminary investigation on combination of watermarking technique with biometric data to increase security of digital images in case of medical images is proposed. Performance of watermarking algorithm, based on discrete wavelet transform (DWT) decomposition, that incorporates biometric watermark is elaborated. The frequency domain were chosen as it is proven, that this domain provides better robustness against attacks and leads to less perceptibility of an embedded watermark. To assure confidentiality of patient data their hand geometry features are embedded instead of patient’s name. Proposed system is evaluated by measuring the similarity between embedded and extracted biometric codes.
Źródło:
Challenges of Modern Technology; 2013, 4, 4; 7-11
2082-2863
2353-4419
Pojawia się w:
Challenges of Modern Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optical multiple-image encryption in discrete multiple-parameter fractional Fourier transform scheme using complex encoding, theta modulation and spectral fusion
Autorzy:
Luan, Guangyu
Zhong, Zhi
Shan, Mingguang
Powiązania:
https://bibliotekanauki.pl/articles/1835767.pdf
Data publikacji:
2021
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
optical security
optical encryption
multiple images
multiplexing
crosstalk
Opis:
We present a novel encryption method for multiple images in a discrete multiple-parameter fractional Fourier transform scheme, using complex encoding, theta modulation and spectral fusion. All pairs of original images are encoded separately into a complex signal. The spectrum of each complex signal can then be scattered into various positions in the spectral plane and multiplexed into one spectral image with a combination of theta modulation and spectral fusion. After Fourier transforming back to the spatial domain, the multiplexed signal is encrypted in the discrete multiple-parameter fractional Fourier transform domain. Information about the original images can only be successfully decrypted given the possession of all correct keys. The parameters of chaotic pixel scrambling for the proposed method enlarge the key space. Moreover, the proposed method solves the crosstalk problem of multiple images and improves the multiplexing capacity. Numerical simulations demonstrate the effectiveness of the proposed method.
Źródło:
Optica Applicata; 2021, 51, 1; 121-134
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gramian angular field transformation-based intrusion detection
Autorzy:
Terzi, Duygu Sinanc
Powiązania:
https://bibliotekanauki.pl/articles/27312895.pdf
Data publikacji:
2022
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
encoding intrusions as images
convolutional neural networks
Gramian angular fields
intrusion detection
network security
Opis:
Cyber threats are increasing progressively in their frequency, scale, sophistication, and cost. The advancement of such threats has raised the need to enhance intelligent intrusion-detection systems. In this study, a different perspective has been developed for intrusion detection. Gramian angular fields were adapted to encode network traffic data as images. Hereby, a way to reveal bilateral feature relationships and benefit from the visual interpretation capability of deep-learning methods has been opened. Then, image-encoded intrusions were classified as binary and multi-class using convolutional neural networks. The obtained results were compared to both conventional machine-learning methods and related studies. According to the results, the proposed approach surpassed the success of traditional methods and produced success rates that were close to the related studies. Despite the use of complex mechanisms such as feature extraction, feature selection, class balancing, virtual data generation, or ensemble classifiers in related studies, the proposed approach is fairly plain – involving only data-image conversion and classification. This shows the power of simply changing the problem space.
Źródło:
Computer Science; 2022, 23 (4); 571--585
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SETHI: The Flying Lab
Autorzy:
Bruyant, J. P.
Dreuillet, P.
Du Plessis, O. R.
Oriot, H.
Dubois-Fernandez, P.
Cantalloube, H.
Powiązania:
https://bibliotekanauki.pl/articles/226573.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
SETHI
flying lab
SAR
very high resolution
PolInSAR
bistatic images
radar-optronics complementarity
change detection
biomass
climate change
environment
security applications
Opis:
This paper presents the new-generation test bench SETHI, developed by ONERA, the French Aerospace Lab. SETHI is a medium range platform dedicated to environmental, scientific and security applications. The first part of this paper describes the system architecture, the development state and the future capabilities. A set of recent significant results are presented: these results cover various applications, such as high spatial resolution imaging, change detection between two acquisitions, biomass measurement in the rain forest, bistatic imaging and innovative measurements, such as air-to-air imaging or circular imaging.
Źródło:
International Journal of Electronics and Telecommunications; 2011, 57, 1; 29-35
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies