A number of image encryption techniques have been proposed in recent years. These techniques use either spatial or transform domain image processing. A major challenge when designing an image encryption scheme is to conceal the pixel of the input image, especially when the image has a low texture region. Another problem is the encryption computational time. In this paper, these two issues are addressed. As the use of a single substitution box (S-box) to encrypt digital images does not work well for greater as well as a lower number of gray levels. To solve this problem, a new substitution technique using multiple S-boxes with dynamic substitution is proposed. In the second part of this paper, the proposed discrete wavelet transform based scheme is employed to reduce the encryption computational time. A number of parameters like correlation, entropy, energy, contrast, homogeneity, MSE and PSNR are used to analyze the quality of cipher images.
相似文献The purpose of this paper is to propose an algorithm and a novel method for fusion of Passive Millimeter Wave (PMMW) images with their visible images by using Non-subsampled Shearlet Transform (NSST) based on the Spiking Cortical Model (SCM) fusion rule. The parameters of NSST and Improved SCM (ISCM) are selected and optimized based on time consumption and the output of the optimization function like QAB/F. In addition, an effective thresholding method in contourlet transform for PMMW and visible images fusion, which is proposed in our previous paper, is applied to the fusion procedure. Furthermore, NSST is used for analysis of the initial images in different resolutions and directions, followed by using of the ISCM neural network as the fusion rule. Combination of the proposed fusion and thresholding processes resulted in better output images containing visual information close to that of the visible image as well as the hidden object in the millimeter wave image. Moreover, a new evaluation criterion is proposed which does not suffer the shortcomings of the available criteria and improves the previous results for detecting hidden objects by up to 23% with 5% extra time consumption. Finally, the obtained results are evaluated with the available and standard metrics, and all the images exhibited better values than those of the other methods. In fact, the value obtained for the gun image is also acceptable. The results indicate that the proposed fusion method realizes almost all the considered objectives, and the fused image show the objects distinctly in an image with visible details.
相似文献Satellite image segmentation has gotten bunches of consideration of late because of the accessibility of commented on high-goals image informational indexes caught by the last age of satellites. The issue of fragmenting a satellite image can be characterized as ordering (or marking) every pixel of the image as indicated by various classes, for example, structures, streets, water, etc. In this paper centered to build up a satellite image segmenting process by utilizing distinctive optimization methods. The work is prepared dependent on three stages that are RGB change, preprocessing, and division. At first the database images are assembled from the database at that point select the blue band images by performing RGB change. To improve the differentiation and furthermore decreasing the commotion of these chose blue band images, Hopfield neural network (HNN) is utilized. After image upgrade, the images are fragmented dependent on fuzzy C means (FCM) clustering method. The images are clustered and segmented in the way of optimizing the centroid in FCM utilizing oppositional crow search algorithm. The exhibition of the proposed framework is investigated dependent on the presentation measurements, for example, affectability, particularity and accuracy. From the outcomes, the proposed strategy diminished the computational time by expanding the accuracy of 98.3% with HNN system.
相似文献The face authentication is a challenging task to validate the user with uncontrolled environment like variations on expression, pose, illumination and occlusion. In order to address these issues, the proposed work provides solution by considering all these factors in inter and intra personal face authentication. During enrollment process, the facial region of still image for the authorized user is detected and features are extracted using local tetra pattern (LTrP) technique. The features are given as input to the neural network namely fuzzy adaptive learning control network (FALCON) for training and classification of features. During authentication process, an image that can vary with expression, pose, illumination and occlusion factors is taken as test image and the test image is applied with LTrP and FALCON to train the features of test image. Then, these trained features are compared with existing feature set by using new proposed multi factor face authentication algorithm to authenticate a person. This work is evaluated among 1150 face images which are collected from JAFFE, Yale, ORL and AR datasets. The overall performance of the work is evaluated by authenticating 1106 images from 1150 constrained images. The second phase of the research work finally produces highest recognition rate of 96% among conventional methods.
相似文献It is demonstrated that the efficiency of surface plasmon-polariton excitation at a metal-semiconductor interface by active quantum dots can be determined from measurements of the polarization characteristics of the output radiation. Experimentally, the proposed diagnostic method is based on finding the ratio of the intensities of the output radiation with polarizations orthogonal and parallel to the nanoheterostructure plane for two different distances between the quantum-dot layer and the metal-semiconductor interface. These data are then used to obtain the unknown parameters in the proposed mathematical model which makes it possible to calculate the rate of surface plasmon-polariton excitation by active quantum dots. As a result, this rate can be determined without complicated expensive equipment for fast time-resolved measurements.
相似文献Iris Recognition is gaining popularity in various online and offline authentication and multi-model biometric systems. The non-altering and non-obscuring nature of Iris have increased its reliability in authentication systems. The iris images captured in an uncontrolled environment and situation is the challenging issue of the iris recognition. In this paper, a compression robust and KPCA-Gabor fused model is presented to recognize the iris image accurately under these complexities. The illumination and noise robustness is included in this pre-processing stage for gaining the robustness and reliability against complex capturing. The effective compression features are generated as a phase pre-treatment vector using the Logarithmic quantization method. (Kernel Principal Component Analysis) KPCA and Gabor filters are applied to the rectified image for generating the textural features. The compression is also applied to Gabor and KPCA filtered images. The fuzzy adaptive content level fusion is applied to the compression image, KPCA-Compression, and Gabor-Compression iris-image. (K-Nearest Neighbors) KNN based mapping is used to this composite-fused and reduced feature set to recognize the individual. The proposed compression and fusion-feature based model is applied to CASIA-Iris, UBIRIS, and IITD datasets. The comparative evaluations against earlier approaches identify that the proposed model has improved the recognition accuracy and the reduction in error-rate is also achieved.
相似文献Protection of multimedia information from different types of attackers has become important for people and governments. A high definition image has a large amount of data, and thus, keeping it secret is difficult. Another challenge that security algorithms must face with respect to high definition images in medical and remote sensing applications is pattern appearances, which results from existing regions with high density in the same color, such as background regions. An encryption and hiding based new hybrid image security systems are proposed in this paper for the purpose of keeping high definition images secret. First, one hiding method and two encryption methods are used in two hybrid algorithms. The new hiding algorithm proposed here starts by applying reordering and scrambling operations to the six Most Significant Bit planes of the secret image, and then, it hides them in an unknown scene cover image using adding or subtracting operations. Second, two different ciphering algorithms are used to encrypt the stego-image to obtain two different hybrid image security systems. The first encryption algorithm is based on binary code decomposition, while the second algorithm is a modification of an advanced encryption standard. After evaluating each hybrid algorithm alone, a comparison between the two hybrid systems is introduced to determine the best system. Several parameters were used for the performance, including the visual scene, histogram analysis, entropy, security analysis, and execution time.
相似文献The problem of image segmentation (division into homogeneous regions) basing on color and texture region differences is considered. A two-level hierarchical pyramidal segmentation algorithm is proposed for solution of this problem. The homogeneity criterion is the estimated adjacency of the image elements and regions in the combined color-texture feature space. A metric in this space is introduced and studied. The results are verified on a set of test images of different types.
相似文献There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.
相似文献Ultrasound is the most widely used biomedical imaging modality for the purpose of diagnosis. It often comes with speckle that results in reduced quality of images by hiding fine details like edges and boundaries, as well as texture information. In this present study, a novel wavelet thresholding technique for despeckling of ultrasound images is proposed. For analysing performance of the method, it is first tested on synthetic (ground truth) images. Speckle noise with distinct noise levels (0.01–0.04) has been added to the synthetic images in order to examine its efficiency at different noise levels. The proposed technique is applied to various orthogonal and biorthogonal wavelet filters. It has been observed that Daubechies 1 gives the best results out of all wavelet filters. The proposed method is further applied on ultrasound images. Performance of the proposed technique has been validated by comparing it with some state-of-the-art techniques. The results have also been validated visually by the expert. Results reveal that the proposed technique outperforms other state-of-the-art techniques in terms of edge preservation and similarities in structures. Thus, the technique is effective in reducing speckle noise in addition to preserving texture information that can be used for further processing.
相似文献In the next-generation wireless communication systems, the local cooperation between different units may be deployed to satisfy communication requirements. In this case, the interference suppression between different units and the receiving performance improvement for each single unit should be considered. Multiple schemes have been utilized to solve these problems. However, these schemes ordinarily require sufficiently accurate information of channel, if this accuracy can not be maintained (e.g., channel estimation error can not be ignored), these schemes may not obtain the satisfactory performances. To overcome this disadvantage, in this paper, a novel scheme is proposed. The proposed scheme has several characteristics: (i) a low-complexity extra estimation is implemented to acquire more information of channel estimation error; (ii) with the help of channel estimation error information, each unit can separately execute a two-step process for interference suppression and receiving performance improvement; (iii) no exorbitant information interaction and high-overhead algorithm are needed between multiple units. Through characteristic analysis and numerical results, it is found the proposed scheme can achieve the satisfactory effect in the locally cooperative network.
相似文献Research on Computer-Aided Diagnosis (CAD) of medical images has been actively conducted to support decisions of radiologists. Since deep learning has shown distinguished abilities in classification, detection, segmentation, etc. in various problems, many studies on CAD have been using deep learning. One of the reasons behind the success of deep learning is the availability of large application-specific annotated datasets. However, it is quite tough work for radiologists to annotate hundreds or thousands of medical images for deep learning, and thus it is difficult to obtain large scale annotated datasets for various organs and diseases. Therefore, many techniques that effectively train deep neural networks have been proposed, and one of the techniques is transfer learning. This paper focuses on transfer learning and especially conducts a case study on ROI-based opacity classification of diffuse lung diseases in chest CT images. The aim of this paper is to clarify what characteristics of the datasets for pre-training and what kinds of structures of deep neural networks for fine-tuning contribute to enhance the effectiveness of transfer learning. In addition, the numbers of training data are set at various values and the effectiveness of transfer learning is evaluated. In the experiments, nine conditions of transfer learning and a method without transfer learning are compared to analyze the appropriate conditions. From the experimental results, it is clarified that the pre-training dataset with more (various) classes and the compact structure for fine-tuning show the best accuracy in this work.
相似文献The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.
相似文献