Recent Advanced in Image Security Technologies: Intelligent Image, Signal, and Video Processing

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book provides the readers with a comprehensive overview of principles methodologies and recent advances in image, signal, and video processing using different system. This book is used as the handbook of postgraduates course, such as image processing, signal processing, and optical information security.

Author(s): Hang Chen, Zhengjun Liu
Series: Studies in Computational Intelligence, 1079
Publisher: Springer
Year: 2023

Language: English
Pages: 194
City: Cham

Preface
Contents
Optical Information Cryptosystems Based on Structured Phase Encoding
1 Introduction
2 Structured Phase Mask
2.1 Radial Hilbert Phase Mask
2.2 Fresnel Zone Plate Phase Mask
2.3 Spiral Zone Plate Phase Mask
2.4 Chaotic Spiral Zone Plate Phase Mask
3 Gyrator Transform
4 Optical Information Cryptosystem Using Structured Phase Encoding
4.1 Optical Information Cryptosystem Using Radial Hilbert Phase Mask in Gyrator Transform Domain
4.2 Optical Information Cryptosystem Using Fresnel Zone Plate Phase Mask in Gyrator Transform Domain
4.3 Asymmetric Information Cryptosystem Based on Spiral Zone Plate Phase Mask and Optical Interference Principle
4.4 Asymmetric Multiple Information Cryptosystem Based on Chaotic Spiral Phase Mask and Random Spectrum Decomposition
5 General Conclusions
References
Encryption/Decryption with Optical Transform
1 Introduction
2 Optical Image Encryption by Using eFrFT
2.1 Optical Encryption Scheme
2.2 Numerical Simulation
3 Image Encryption by Using Phase-Only Encoding
3.1 Phase Encoding
3.2 Proposed Encryption System
3.3 Numerical Simulation
4 Phase-Amplitude Retrieval in Gyrator Domains
4.1 Optical System and Phase Retrieval Scheme
4.2 Analysis and Discussion
5 Phase-Only Encoding in Fresnel Domains
5.1 Optical System and Scheme of Attack on DRPE
5.2 Numerical Result and Discussion
6 General Conclusions
References
Optical Cryptosystems Based on Spiral Phase Modulation
1 Introduction
2 Spiral Phase Transform (SPT)
3 Optical Cryptosystems Based Spiral Phase Modulation
3.1 Nonlinear Optical Cryptosystem Based on SPT in Fresnel Domain
3.2 Multiuser Optical Authentication Using Photon Counting in SPT Domain
3.3 Optical Cryptosystem for Color Image Encryption Based on SPT and Chaotic Pixel Scrambling
4 Concluding Remarks
References
Image Cryptosystem for Different Kinds of Image by Using Improved Arnold Map
1 Introduction
2 Three Kinds of Improved Arnold Maps
2.1 Modified Arnold Mapping Model with Variable Parameters (M-Arnold)
2.2 LFSR-Cascaded Arnold Diffusion Model (LFSR-CADM)
2.3 Block Mobile Model of 3D Arnold Map (BMM)
2.4 Triangular Association Encryption Model (TAEM)
3 Optical Cryptosystem Based on Arnold Map and Improved Transformations in Gyrator Domains
3.1 An Image Encryption and Hiding Algorithm Based on M-Arnold Model in Gyrator Domains
3.2 Securing Color Image by Using Bit-Level LFSR-Cascaded Arnold Diffusion Model (LFSR-CADM) in Gyrator Domains
3.3 A Novel Signature and Authentication Cryptosystem for Hyperspectral Data by Using Triangular Association Encryption Algorithm in Gyrator Domains
4 General Conclusions
References
Image Encryption Using a Chaotic/Hyperchaotic Multidimensional Discrete System
1 Introduction
2 Multidimensional Chaotic Discrete System
2.1 Mathematical Description of the 4-D Map
2.2 Dynamical Behaviors of the 4-D System
3 Algorithm for Colour Image Encryption
4 Performance Analysis
4.1 Key Space Analysis
4.2 Histograms Analysis
4.3 Correlation
4.4 Resistance to the Differential Attack
4.5 Cropping Attack Test
4.6 Entropy Information Analysis
4.7 Noise Resistance Test
4.8 Complexity
5 Conclusion
References
Video Cryptosystem Using Chaotic Systems
1 Introduction
2 State of the Art in Video Security Methods
2.1 Complete Security Algorithms
2.2 Selective Encryption Algorithms
3 Proposed Chaos-Based Video Cryptosystem
3.1 Chaotic Keys Generator
3.2 Encryption/Decryption Algorithm
4 Performances Evaluation
4.1 Assessing Video Quality Degradation
4.2 Security Analysis
4.3 Temporal Performances
5 Synthesis
6 Conclusion
References
Neural Network Image Restoration Techniques
1 Introduction
2 Description of Image Restoration
3 Evaluation of Image Restoration
4 Neural Network Image Restoration
4.1 Energy Functions
4.2 Suboptimal Algorithm of Continuous Hopfield Neural Network
4.3 Continuous Hopfield Neural Network Suboptimal Restoration Algorithm Based on Harmonic Model
4.4 Adaptive CHNN Suboptimal Restoration Algorithm Based on Reconciliation Model
5 Conclusions
References