Related references
Note: Only part of the references are listed.
Article
Optics
Balakrishnan Sriram et al.
Summary: In this study, a chaotic map consisting of two sine functions is investigated to understand its chaotic dynamics. Bifurcation diagrams and Lyapunov exponents of the map reveal the presence of multistability in certain intervals of the bifurcation parameter. Furthermore, an encryption method based on sparse representation and the chaotic map is proposed. The experimental results showcase the improved image reconstruction performance and security level of this method compared to previous approaches.
Review
Radiology, Nuclear Medicine & Medical Imaging
Richa Patel et al.
Summary: With the increase in hepatocellular carcinoma (HCC) and liver-directed therapies, the assessment of lesion response has become more complex. The Liver Imaging Reporting and Data Systems (LI-RADS) treatment response algorithm (LI-RADS TRA) was created to standardize the evaluation of response after locoregional therapy (LRT) using contrast-enhanced CT or MRI. This article reviews the expected MR imaging findings after different forms of LRT, explains the application of LI-RADS TRA for different types of LRT, explores emerging literature on LI-RADS TRA, and highlights future updates to the algorithm.
JOURNAL OF MAGNETIC RESONANCE IMAGING
(2023)
Article
Computer Science, Interdisciplinary Applications
Yuze Shang et al.
Summary: The purpose of this research is to develop a dynamic step path planning algorithm for autonomous vehicles based on the RRT algorithm combined with Q-learning and the Gaussian distribution of obstacles. The authors divide the path planning issue into three key steps, which include accelerating tree expansion, removing invalid nodes through bidirectional pruning, and smoothing the predicted pathways using B-splines. Simulation results demonstrate that the proposed algorithm can provide a smooth and safe route for self-driving vehicles.
ENGINEERING COMPUTATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Cheng-Hsing Yang et al.
Summary: The development of image encryption and reversible data hiding technology offers protection for image copyright and privacy. In this paper, a new technology that combines image encryption and data hiding is proposed. This technology allows independent encryption and data hiding, ensuring full restoration of the image. Experimental results demonstrate high flexibility and embedding capacity compared to other related works.
Article
Optics
Guo Yang et al.
Summary: We propose a system that achieves optical image hiding and reconstruction under low light conditions through deep learning. By optimizing the interferometer system and the neural network model, the secret image can be reconstructed with high quality and reduced visibility.
OPTICS COMMUNICATIONS
(2022)
Article
Optics
Zhe Lu et al.
Summary: This paper introduces an optical information encryption method based on partially-update iteration system with azimuth multiplexing, which utilizes multiple QR codes to store high-definition pictures and enhances the encryption capacity and security with azimuth multiplexing and phase partial update. Simulation results show that this scheme has a large-capacity information storage, high security, robustness, and practicability.
OPTICS COMMUNICATIONS
(2022)
Article
Optics
Miaomiao Tang et al.
Summary: The proposed optical information hiding system utilizes complex-amplitude ptychographic encoding and visual cryptography, resulting in highly uncorrelated ciphertext with high security during extraction. The system is easy to implement, secure, and robust according to simulation results.
OPTICS COMMUNICATIONS
(2022)
Article
Imaging Science & Photographic Technology
K. Prabha et al.
Summary: This paper proposes an optimal blind colour image watermarking algorithm based on Triangular Vertex Transform (TVT), Lifting Wavelet Transform (LWT), and Schur decomposition. The algorithm preserves image quality through TVT and LWT, and enhances perceptual transparency by processing the middle frequency components using Schur decomposition. The embedding strength of the watermark is ensured through an Adaptive Chaotic Grasshopper Optimization Algorithm (ACGOA), and the watermark confidentiality is improved by LSMCL. The efficiency of the ACGOA-based scheme is evaluated, achieving a PSNR value of 54.2987 dB and a reliable NCC value close to 1 for different attacks.
IMAGING SCIENCE JOURNAL
(2022)
Article
Computer Science, Information Systems
Zilong Liu et al.
Summary: This paper proposes a medical image encryption watermarking algorithm based on the Tent-HenonMap double chaos watermarking encryption method and ridgelet-DCT transform, effectively solving the problem of medical image information security in cloud environment.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Yong Zhang
Summary: Image encryption is essential for ensuring the security of image information in network communications. A new unified image encryption system with identical encryption and decryption algorithms was proposed in this paper, utilizing an external key and the Henon map for key generation. The system achieved encryption/decryption speeds of 59 Mbps on a computer equipped with i7-9750H CPU, demonstrating strong sensitivities to secret keys, plain images, and ciphered images with a maximum relative error of only 0.55%. The proposed system can be considered as a candidate scheme for network image information security.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Artificial Intelligence
O. P. Singh et al.
Summary: The proposed algorithm introduces a robust information hiding technique for secure media applications, achieving good invisibility and robustness effects with high security and hiding efficiency. Simulation results demonstrate a significant improvement in robustness compared to existing schemes, with impressive performance across a range of evaluation metrics.
MACHINE VISION AND APPLICATIONS
(2021)