The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Verifiability is essential for a secret sharing approach which allows the involved participants to detect cheaters during the secret retrieval process. In this article, we propose a verifiable secret image sharing scheme that can not only resist dishonest participants but can also satisfy the requirements of loss less and camouflage. The new approach conceals the shadows into a pixel pair of the host...
A loss less and visible watermarking algorithm is proposed. The carrier image can restored loss less. The exterior appearance is like to mark by use of image addition technique. The visible watermarking can replace the mark. Because of self-recovery, it offers the original data to the validated user. The Hash function of RH arithmetic operator is constructed by Rijndael encryption algorithm. By using...
Visual secret sharing (VSS) is a technology that encrypts a secret image into several share images. When superimposes the shares, it can restore the secret by human vision. This paper proposes a novel image visual secret sharing scheme to encrypt two secret images in the same time. This scheme turns two secret images into two meaningless shares without any pixel expansion and codebook. In order to...
This paper presents a image encryption algorithm based on Arnold transformation and chaotic mapping. Firstly, Arnold transformation is used to scramble image. Then we use Tent mapping to encrypt scrambled image. The result shows that the algorithm is easy to realize, providing high security.
This paper proposes an automated method for the segmentation of peripheral blood smear images, depicting the differential count of white blood cells. It also proposes a reversible fragile watermarking technique, in which the watermark-related information is embedded in the Region of Non-Interest (RONI) of the image. Image authenticity and integrity, is maintained by embedding the Input message along...
A reversible watermarking algorithm is presented, which achieves content authentication and perfect restoration of the original image during extraction. The proposed algorithm is based on patchwork and chaotic encryption. The patchwork algorithm is used to generate zero-bit watermark for content authentication. The chaotic sequence is used to encrypt the general LSBs(Least Significant Bits) of image...
Image scrambling is a widely applied in digital image watermark technology. Therefore, Arnold transform is often used, but its security is not enough because the form is the only and public. In this paper, an improved Arnold transform is present; it is realized in computer through proving. We can choose different transform coefficient and times in image scrambling, it is difficult to restore the original...
Under the premise of contrasting with different methods of image-hiding, we propose a method of new image-hiding, triangular algorithm, which is lower distortion and higher security, by exploring the differences between the blocks of cover-image and secret-image. This algorithm is simple and practicable. It has greatly improved the security of the system, robustness of image-hiding, and verified the...
This paper presents a new image content protection method. In the image scrambling for encryption, the Arnold transform often used. But Arnold transform is given only one form and it is an open form, so reducing it security. In this paper, a species that contains a lot of transform sets is presented, we call it as FAN transform. Since the type of the FAN transformation is infinite, it will increase...
This paper presents a novel and simple pixel-level image authentication scheme to detect the tampered pixels, which utilizes the extreme sensitivity of Hash function in order to achieve precise tamper localization. Block numbers and image unique index are used to extract watermarks and locate tampered position. Moreover, the property of blocks correlation makes it can effectively resist VQ attack...
A novel secure communication scheme is presented in this paper. A hyper-chaotic system is applied in the secure communication. Although it is three-dimensional system, it has two positive Lyapunov exponents and is a hyper-chaotic system. Because of the high Lyapunov exponent and the nonlinear spread spectrum technology, the randomness and unpredictability of the carrier signal are enhanced. Based...
In this paper we describe a robust watermarking scheme for image tampering identification and localization. A compact representation of the image is first produced by assembling a feature vector consisting of pseudo-random projections of the decimated image. Then, the quantized projections are encoded to form a hash, which is robustly embedded as a watermark in the image. By recovering the watermark...
A new delivery method of true color images based on error-correcting is proposed. It takes the structure of true color images into full consideration, and decreases the complexity. The analytical method of cryptography is first used in this paper to analyze the security of delivery images; at the same time, an method about error-correcting code is designed to prevent passive attacks based on bit modification...
This paper proposes a data hiding method by secret sharing. The proposed method embeds a k-bit secret digit in a secret message (i.e., a bit stream, a secret image) into a cover pixel of a grayscale cover image at a time by generating two shadow pixels. The two shadow images produced by the proposed scheme are meaningful. The experimental results show that the proposed scheme achieves good visual...
This paper proposes a novel multiple watermarking scheme for different purposes: to notify the copyright owner with a reversible visible watermark in the region of interest (ROI) of the original image, and to protect the copyright with an invisible watermark in the remaining part of the image. It can fully remove the visible watermark from the dual watermarked image and restore the ROI. The invisible...
An image encryption algorithm based on a four-dimensional chaotic system is presented in this paper, in view of the existing problems in the image encryption. Firstly, the characteristics of the chaotic system are analyzed. This system has more parameters and is more complex than the low-dimensional chaotic systems. The chaotic sequences are improved to be suitable for image encryption. Secondly,...
The significant essential of secret image sharing approaches is that the revealed content of the secret image must be lossless. Moreover, the distorted stego images can be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system. Then, the information data used to reconstruct original pixels from camouflaged pixels...
In this paper, we propose a novel reversible data hiding algorithm, which can recover the original image if it is deemed authentic or detect the block-wise malicious manipulation if it is classified as manipulated. We explore the strong spatial correlation of neighboring pixels in digital images to achieve very high embedding capacity and keep the distortion low. Also, this technique provides cryptographic...
Because smaller shadows can help speed up the transmission of a secret color image, in this paper we first modify the AMBTC, then combine our modified AMBTC and Shamir's (k, n) threshold scheme to propose a novel secret color image sharing scheme that generates smaller shadows. Experimental results confirm that the proposed scheme successfully reduces shadow size and that each shadow behaves as a...
In data communication, it is coming to be important little by little to maintain the encryption of the image. But, the multiple encryption techniques of present time cannot be sufficient for this demands. From this research, the new encryption technology is proposed and it is implemented. It proposes the encryption strategy of like this chaos form from here and it is implemented. At this encryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.