Halftone-Image Security Improving Using Overall Minimal-Error Searching

2011 ◽  
Vol 20 (10) ◽  
pp. 2800-2812 ◽  
Author(s):  
Jing-Ming Guo ◽  
Yun-Fu Liu
2014 ◽  
Vol 989-994 ◽  
pp. 3571-3574
Author(s):  
Jing Huan Ge ◽  
Jie Pan ◽  
Meng Xiao Li

Moire effect is a special optical phenomenon caused by the interference of light. In the printing industry, it is also called Moire phenomenon which is caused by superposition of the multicolor printing dots for halftone images. Now it is widely used in the anti-counterfeiting areas. In this paper, we firstly introduce the basic principle of Moire effect. Then we describe several main applications of the Moire effect in the field of halftone image security. We review the main types of Moire-based anti-counterfeiting methods, compare them, and explain how they can be used for such security applications. It will provide the necessary technical information for the persons that in anti-counterfeiting area.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


The movement along the glide path of an unmanned aerial vehicle during landing on an aircraft carrier is investigated. The implementation of this task is realized in the conditions of radio silence of the aircraft carrier. The algorithm for treatment information from an optical landing system installed on an aircraft carrier is developed. The algorithm of the color signal recognition assumes the usage of the image frame preliminary treatment method via a downsample function, that performs the decimation process, the HSV model, the Otsu’s method for calculating the binarization threshold for a halftone image, and the method of separating the connected Two-Pass components. Keywords unmanned aerial vehicle; aircraft carrier; approach; glide path; optical landing system; color signal recognition algorithm; decimation; connected components; halftone image binarization


2020 ◽  
Vol 167 ◽  
pp. 1291-1299
Author(s):  
P. Karthika ◽  
R. Ganesh Babu ◽  
K. Jayaram

Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 510
Author(s):  
Taiyong Li ◽  
Duzhong Zhang

Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches conduct encryption on pixel-level, bit-level, DNA-level data or their combinations, lacking diversity of processed data levels and limiting security. This paper proposes a novel hyperchaotic image encryption scheme via multiple bit permutation and diffusion, namely MBPD, to cope with this issue. Specifically, a four-dimensional hyperchaotic system with three positive Lyapunov exponents is firstly proposed. Second, a hyperchaotic sequence is generated from the proposed hyperchaotic system for consequent encryption operations. Third, multiple bit permutation and diffusion (permutation and/or diffusion can be conducted with 1–8 or more bits) determined by the hyperchaotic sequence is designed. Finally, the proposed MBPD is applied to image encryption. We conduct extensive experiments on a couple of public test images to validate the proposed MBPD. The results verify that the MBPD can effectively resist different types of attacks and has better performance than the compared popular encryption methods.


2020 ◽  
Vol 167 ◽  
pp. 107287 ◽  
Author(s):  
Wanteng Liu ◽  
Xiaolin Yin ◽  
Wei Lu ◽  
Junhong Zhang ◽  
Jinhua Zeng ◽  
...  

2013 ◽  
Vol 416-417 ◽  
pp. 1210-1213
Author(s):  
Hua Wen Ai ◽  
Ping Feng Liu ◽  
Sheng Cong Dong

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.


Author(s):  
Oluwayomi Adamo ◽  
Saraju P. Mohanty ◽  
Elias Kougianos ◽  
Murali Varanasi ◽  
Wei Cai

Sign in / Sign up

Export Citation Format

Share Document