4.7 Article

Image encryption algorithm based on reversible information hiding and physical chaos in images

Related references

Note: Only part of the references are listed.
Article Optics

A chaotic map with trigonometric functions: Dynamical analysis and its application in image encryption based on sparse representation and convolutional filters

Balakrishnan Sriram et al.

Summary: In this study, a chaotic map consisting of two sine functions is investigated to understand its chaotic dynamics. Bifurcation diagrams and Lyapunov exponents of the map reveal the presence of multistability in certain intervals of the bifurcation parameter. Furthermore, an encryption method based on sparse representation and the chaotic map is proposed. The experimental results showcase the improved image reconstruction performance and security level of this method compared to previous approaches.

OPTIK (2023)

Review Radiology, Nuclear Medicine & Medical Imaging

Updates on LI-RADS Treatment Response Criteria for Hepatocellular Carcinoma: Focusing on MRI

Richa Patel et al.

Summary: With the increase in hepatocellular carcinoma (HCC) and liver-directed therapies, the assessment of lesion response has become more complex. The Liver Imaging Reporting and Data Systems (LI-RADS) treatment response algorithm (LI-RADS TRA) was created to standardize the evaluation of response after locoregional therapy (LRT) using contrast-enhanced CT or MRI. This article reviews the expected MR imaging findings after different forms of LRT, explains the application of LI-RADS TRA for different types of LRT, explores emerging literature on LI-RADS TRA, and highlights future updates to the algorithm.

JOURNAL OF MAGNETIC RESONANCE IMAGING (2023)

Article Computer Science, Interdisciplinary Applications

Research on path planning of autonomous vehicle based on RRT algorithm of Q-learning and obstacle distribution

Yuze Shang et al.

Summary: The purpose of this research is to develop a dynamic step path planning algorithm for autonomous vehicles based on the RRT algorithm combined with Q-learning and the Gaussian distribution of obstacles. The authors divide the path planning issue into three key steps, which include accelerating tree expansion, removing invalid nodes through bidirectional pruning, and smoothing the predicted pathways using B-splines. Simulation results demonstrate that the proposed algorithm can provide a smooth and safe route for self-driving vehicles.

ENGINEERING COMPUTATIONS (2023)

Article Computer Science, Artificial Intelligence

High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption

Cheng-Hsing Yang et al.

Summary: The development of image encryption and reversible data hiding technology offers protection for image copyright and privacy. In this paper, a new technology that combines image encryption and data hiding is proposed. This technology allows independent encryption and data hiding, ensuring full restoration of the image. Experimental results demonstrate high flexibility and embedding capacity compared to other related works.

SOFT COMPUTING (2022)

Article Optics

Optical image hiding under low light illumination based on deep learning

Guo Yang et al.

Summary: We propose a system that achieves optical image hiding and reconstruction under low light conditions through deep learning. By optimizing the interferometer system and the neural network model, the secret image can be reconstructed with high quality and reduced visibility.

OPTICS COMMUNICATIONS (2022)

Article Optics

Optical information encryption based on partially-update iterative system with azimuth multiplexing

Zhe Lu et al.

Summary: This paper introduces an optical information encryption method based on partially-update iteration system with azimuth multiplexing, which utilizes multiple QR codes to store high-definition pictures and enhances the encryption capacity and security with azimuth multiplexing and phase partial update. Simulation results show that this scheme has a large-capacity information storage, high security, robustness, and practicability.

OPTICS COMMUNICATIONS (2022)

Article Optics

Optical information hiding based on complex-amplitude ptychographic encoding and visual cryptography

Miaomiao Tang et al.

Summary: The proposed optical information hiding system utilizes complex-amplitude ptychographic encoding and visual cryptography, resulting in highly uncorrelated ciphertext with high security during extraction. The system is easy to implement, secure, and robust according to simulation results.

OPTICS COMMUNICATIONS (2022)

Article Imaging Science & Photographic Technology

Optimal blind colour image watermarking based on adaptive chaotic grasshopper optimization algorithm

K. Prabha et al.

Summary: This paper proposes an optimal blind colour image watermarking algorithm based on Triangular Vertex Transform (TVT), Lifting Wavelet Transform (LWT), and Schur decomposition. The algorithm preserves image quality through TVT and LWT, and enhances perceptual transparency by processing the middle frequency components using Schur decomposition. The embedding strength of the watermark is ensured through an Adaptive Chaotic Grasshopper Optimization Algorithm (ACGOA), and the watermark confidentiality is improved by LSMCL. The efficiency of the ACGOA-based scheme is evaluated, achieving a PSNR value of 54.2987 dB and a reliable NCC value close to 1 for different attacks.

IMAGING SCIENCE JOURNAL (2022)

Article Computer Science, Information Systems

A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

Zilong Liu et al.

Summary: This paper proposes a medical image encryption watermarking algorithm based on the Tent-HenonMap double chaos watermarking encryption method and ridgelet-DCT transform, effectively solving the problem of medical image information security in cloud environment.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2022)

Article Computer Science, Information Systems

A new unified image encryption algorithm based on a lifting transformation and chaos

Yong Zhang

Summary: Image encryption is essential for ensuring the security of image information in network communications. A new unified image encryption system with identical encryption and decryption algorithms was proposed in this paper, utilizing an external key and the Henon map for key generation. The system achieved encryption/decryption speeds of 59 Mbps on a computer equipped with i7-9750H CPU, demonstrating strong sensitivities to secret keys, plain images, and ciphered images with a maximum relative error of only 0.55%. The proposed system can be considered as a candidate scheme for network image information security.

INFORMATION SCIENCES (2021)

Article Computer Science, Artificial Intelligence

A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD

O. P. Singh et al.

Summary: The proposed algorithm introduces a robust information hiding technique for secure media applications, achieving good invisibility and robustness effects with high security and hiding efficiency. Simulation results demonstrate a significant improvement in robustness compared to existing schemes, with impressive performance across a range of evaluation metrics.

MACHINE VISION AND APPLICATIONS (2021)