首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used in connection with the JPEG compression standard. The image encryption process takes advantage of fast linear transforms parametrized with private keys and is carried out prior to the compression stage in a way that does not alter those statistical characteristics of the input image that are crucial from the point of view of the subsequent compression. This feature makes the encryption process transparent to the compression stage and enables the JPEG algorithm to maintain its full compression capabilities even though it operates on the encrypted image data. The main advantage of the considered approach is the fact that the JPEG algorithm can be used without any modifications as a part of the encrypt-then-compress image processing framework. The paper includes a detailed mathematical model of the examined scheme allowing for theoretical analysis of the impact of the image encryption step on the effectiveness of the compression process. The combinatorial and statistical analysis of the encryption process is also included and it allows to evaluate its cryptographic strength. In addition, the paper considers several practical use-case scenarios with different characteristics of the compression and encryption stages. The final part of the paper contains the additional results of the experimental studies regarding general effectiveness of the presented scheme. The results show that for a wide range of compression ratios the considered scheme performs comparably to the JPEG algorithm alone, that is, without the encryption stage, in terms of the quality measures of reconstructed images. Moreover, the results of statistical analysis as well as those obtained with generally approved quality measures of image cryptographic systems, prove high strength and efficiency of the scheme’s encryption stage.  相似文献   

2.
According to encrypting principles of digital images, integrating the characteristic of JPEG image, and using discrete chaotic sequence, this paper has studied encryption and decryption of JPEG image, and has compared and analyzed the corresponding relations between the encryption and decryption effects and their security of two different encrypting schemes of the JPEG image chaotic encryption studied by this paper. In a basic unit of an 8 × 8 data block, image encryption and decryption not only are fast, but also match with JPEG format. The JPEG image encryption can meet the security requirement of the storage and transmission of JPEG images in some common application occasions, and provides an effective and feasible way of encrypting JPEG images.  相似文献   

3.
基于谱间DPCM和整数小波变换的超光谱图像无损压缩   总被引:2,自引:1,他引:1  
吴冬梅  王军  张海宁 《光子学报》2008,37(1):156-159
分析了干涉成像光谱仪所获取图像的谱间和空间相关性,提出了一种混合无损压缩方案.首先进行谱间DPCM预测,再对残差图像采用整数小波变换,最后对小波系数进行二值自适应算术编码.实验结果表明,该算法可实现无损压缩,压缩比平均可达2.018,较二维整数小波变换算法提高40.3%.并且算法复杂度较低,只有加减和移位运算,易于硬件实现.  相似文献   

4.
杜述松  袁艳  相里斌  陶然  张文喜 《光子学报》2007,36(9):1672-1676
基于均匀值量化压缩算法和AR模型算法,对干涉型超光谱成像仪直接产生的实际干涉图像序列进行了近无损压缩仿真实验.AR模型算法对残差采用Lloyd-Max量化器进行量化,对量化输出结果用Huffman编码器进行编码.分析了AR模型阶数对压缩性能的影响.结果指出,均匀值量化和AR模型算法均能满足干涉光谱图像序列压缩的要求.  相似文献   

5.
崔夏荣 《光子学报》2008,37(12):2580-2584
为了探索二次JPEG压缩对数字图像与数码相机的噪音相关性的影响,提高利用噪音相关性鉴别数字图像来源的正确性,降低鉴别过程的复杂性,利用高品质的JPEG格式图像进行JPEG压缩实验,从噪音相关性的分布、噪音相关性的大小、鉴别阈值和错误拒绝率四个角度分析了JPEG压缩对噪音相关性的影响.实验结果表明,JPEG压缩会改变噪音相关性的分布特性,噪音相关性与品质因素是二次曲线关系,当品质因素小于90时,鉴别阈值取平均值,错误拒绝率不会产生明显的误差,从而找到了一种利用噪音相关性鉴别二次JPEG压缩图像来源的新捷径.  相似文献   

6.
在图像的传输和存储过程中,为减少传输时间与存储空间,必须进行图像压缩。同时,图像压缩技术也是多媒体技术中的一项关键技术。本文介绍一种静态实时图像压缩处理系统。该系统选用专用图像压缩处理器CL550、以JPEG标准完成对静态图像的实时编码压缩处理。文中简要介绍了CL550处理器的性能特点以及该系统的构成  相似文献   

7.
For efficiency and security of image transmission and storage, the joint image compression and encryption method that performs compression and encryption in a single step is a promising solution due to better security. Moreover, on some important occasions, it is necessary to save images in high quality by lossless compression. Thus, a joint lossless image compression and encryption scheme based on a context-based adaptive lossless image codec (CALIC) and hyperchaotic system is proposed to achieve lossless image encryption and compression simultaneously. Making use of the characteristics of CALIC, four encryption locations are designed to realize joint image compression and encryption: encryption for the predicted values of pixels based on gradient-adjusted prediction (GAP), encryption for the final prediction error, encryption for two lines of pixel values needed by prediction mode and encryption for the entropy coding file. Moreover, a new four-dimensional hyperchaotic system and plaintext-related encryption based on table lookup are all used to enhance the security. The security tests show information entropy, correlation and key sensitivity of the proposed methods reach 7.997, 0.01 and 0.4998, respectively. This indicates that the proposed methods have good security. Meanwhile, compared to original CALIC without security, the proposed methods increase the security and reduce the compression ratio by only 6.3%. The test results indicate that the proposed methods have high security and good lossless compression performance.  相似文献   

8.
基于Markov性质的一阶安全算术编码及应用   总被引:2,自引:0,他引:2       下载免费PDF全文
段黎力  廖晓峰  向涛 《物理学报》2010,59(10):6744-6751
基于压缩编码的加密方式能够同时完成加密和压缩的功能,通过压缩减少了信息的冗余,同时引入加密使对试图推测出明文信息和找到密钥的攻击具有非常好的鲁棒性.本文提出了一种基于一阶Markov模型的安全算术编码,在编码过程中通过随机密钥保证图像压缩编码的安全性,且显著提高编码的压缩效率,使其方便在网络中安全传输.实验结果和安全性分析表明,算法能够抵抗现有的各种基于算术编码的安全性攻击和其他密码学分析。  相似文献   

9.
基于1+2维小波变换的多光谱图像压缩   总被引:10,自引:3,他引:7  
王琪  郭雷 《光子学报》2003,32(9):1126-1129
提出利用1+2维小波变换技术对多光谱遥感图像进行近无损压缩.使用嵌入式块截断算法压缩谱内图像;谱间变换使用短滤波器进行1维小波变换,去除多光谱图像的谱间冗余.实验证明,加入谱间的1维变换比不加入变换,而仅仅对每个波段图像进行压缩的压缩比提高20%.整个算法是嵌入式的,复杂度适中.编码的比特流具有渐进式特性,可以过渡为高压缩比的有损压缩.  相似文献   

10.
肖迪  谢沂均 《物理学报》2013,62(24):240508-240508
为了研究针对联合图像专家小组压缩标准(joint photographic experts group,JPEG)彩色图像特点的加密算法,综合选择加密和在编码过程中加密两种思路,提出了一种空域和频域结合的加密算法. 首先在空域对8×8分块进行扩散置乱,然后利用边缘检测手段找出包含细节信息较多的重要分块,先加密所有分块中的直流(direct current,DC)系数,再选择重要分块中的一部分交流(alternating current,AC)系数进行加密,最后将分块重要性标记信息嵌入AC系数中进行传输. 通过理论分析和大量实验证明,算法格式兼容,密文图像视觉效果好、色彩分布均匀;算法密钥空间大,密钥敏感性强,安全性良好. 关键词: JPEG彩色图像 边缘检测 选择加密 结合编码加密  相似文献   

11.
This paper examines the effects of data compression on fringe images. Using the JPEG still image compression method firstly comparisons of errors introduced in a standard test image and in fringe images are made. The work shows that at compression levels of 6 : 1 a 512×512×8 bit fringe image can be reduced in size to allow a CCD digital camera to be directly connected for image input to the parallel port of a PC. The errors introduced into angular and smooth fringe images by the compression and decompression process are small, 0.06% and 0.14%, respectively. This enabled successful fringe analysis by a phase stepping system, with compression levels up to 16 : 1 using JPEG, before any significant artefacts were introduced into the processed images.  相似文献   

12.
基于三维集合分裂嵌入式零块编码算法的超光谱图像压缩   总被引:4,自引:2,他引:2  
侯颖  刘贵忠 《光学学报》2008,28(1):67-73
基于超光谱图像的特点,提出了一种三维集合分裂嵌入式零块编码(3D SPEZBC)的超光谱图像压缩算法。该算法首先采用三维小波包变换有效地去除超光谱图像的空间和谱间相关性,然后对于所生成的每个二维子带利用基于集合分裂的方法进行零块编码,最后再采用基于上下文的自适应算术编码来进一步提高编码性能。实验结果表明,3D SPEZBC算法具有与三维嵌入式零块编码(3D EZBC)算法相同的压缩编码性能,在各比特率下编码性能均明显优于三维集合分裂嵌入式块编码(3D SPECK)、三维等级树集合分裂(3D SPIHT)和非对称三维等级树集合分裂(AT-3D SPIHT)算法,并且略好于多分量JPEG2000编码(JPEG2000-MC)算法。此外,3D SPEZBC编码算法不但可以提供较好的率失真性能,而且相对于3D EZBC编码算法可以节省大量的存储空间。  相似文献   

13.
JPEG图像压缩对测量类图像的影响   总被引:2,自引:0,他引:2  
在JPEG图像压缩的量化过程中,丢弃了部分高频信息,使图像的清晰度下降。通过对频谱的对照分析和对实际图像进行实验后表明,JPEG图像压缩对测量和处理结果的影响与原图像的特点、取样方式、滤波过程和压缩算法有关。经摄像机和图像卡获得的图像,其压缩比可达到10;经扫描仪获得的图像,其压缩比可达到6;经数码相机获得的图像,其压缩比可达到6~8;对特定的医学图像、晶相图像等来说,利用图像的特征构造最优匹配的JPEG压缩量化表,其压缩比可达到10。采用合适的压缩比和改进的压缩方法,图像的细节损失可以控制在较小的范围内,基本上不影响检测类图像的边界提取、分割、尺寸测量时的处理结果。  相似文献   

14.
提出了一种以联合变换相关器和离散余弦变换为基础的数字水印方法。利用联合变换相关器光学加密系统对需要隐藏的信息进行加密,然后嵌入到宿主图像8×8分块的离散余弦变换中频系数上。与其他基于双随机相位编码的数字水印技术相比,该技术在加密阶段和解密阶段的密钥相同,省去了制作复共轭密钥的麻烦。数值仿真结果表明,这种数字水印技术具有很好的不可见性和很高的安全性,对JPEG压缩、剪切、滤波和加噪声等多种数字图像处理操作都具有很强的鲁棒性。  相似文献   

15.
针对多光谱图像存储和传输安全性问题,提出一种将混沌思想、小波变换和KL(karhunen-loeve)变换相结合的多光谱图像压缩加密算法。首先,采用K-means聚类方案将多光谱图像聚类为通用像素,通过选择合适的K值使算法的性能最优,同时便于后续处理;然后对通用像素进行二维离散9/7小波变换,对变换后的系数进行Arnold变换以及加密处理,消除多光谱图像大部分空间冗余,减少压缩过程中的块效应;之后对产生的小波系数进行改进的KL变换,消除残余空间冗余和光谱冗余;最后采用差分脉冲滤波器对系数进行编码,并采用Tent映射对码流进行混淆扩散加密。通过实验可知,本算法的信息熵达到11.794 3(选取12位多光谱图像),信息熵更接近最大值12,优于现有算法,可以更好的隐藏原图特征;该算法的像素变化率(NPCR)和归一化平均变化强度(UACI)分别为99.81%和34.19,优于现有的其他算法,本算法可以更好的抵御差分攻击;输出比特流变化率保持在47.62%~47.71%之间,密文比特流变化率保持在47.45%~47.52%,本算法具有较好的密钥敏感性;在压缩比为4∶1~32∶1范围内,系统PSN...  相似文献   

16.
基于光量子的真随机源   总被引:9,自引:0,他引:9       下载免费PDF全文
介绍基于单光子的量子随机性产生二元真随机序列的实验以及所采用的数学处理方法.实验利用单光子探测器,较高速的信号处理电路和计算机数据采集系统,接收记录随机选择反射或折射路径通过50/50分束器的光子,从而获得原始的二元随机序列.用Huffman编码方法把原始数据压缩为符合密码学要求的真随机序列.随机序列采集的速率理论上可达200kbit/s. 关键词: 真随机数源 单光子 光子束器 Huffman编码及数据压缩  相似文献   

17.
叶天语 《光子学报》2012,41(2):210-217
针对数字图像传输时经常面临JPEG压缩和几何攻击,提出一种抗JPEG压缩和几何攻击的鲁棒零水印算法.将原始图像分割成互不重叠的子块,对每个子块进行奇异值分解,对奇异值矩阵进行harr小波变换,通过比较相邻两个子块奇异值矩阵小波低频逼近子带对角线元素的均值大小关系产生零水印序列.数学理论分析表明:通过比较相邻两个子块奇异值矩阵所有奇异值的均值大小关系产生零水印序列,算法实质上没有对原始图像做任何改动,具有非常好的不可见性.实验结果表明,该算法在抵抗JPEG压缩和旋转、尺寸缩放、随机删除行列、偏移行列、打印-扫描几种几何攻击表现出比较强的鲁棒性.  相似文献   

18.
基于数字全息及离散余弦变换的图像数字水印技术   总被引:21,自引:9,他引:21  
尉迟亮  顾济华  刘薇  陶智 《光学学报》2006,26(3):55-361
提出了一种以数字全息和离散余弦变换为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印。考虑到数字全息图的不可撕毁性,使得数字全息水印本身就具有良好的抗剪切能力,并且与传统的二维灰度水印相比嵌入的信息更多。数字全息图通过傅里叶变换全息的方法获得,为了提高抗有损压缩能力,在数字全息水印嵌入过程中采用了基于(JPEG模型和分解离散余弦变换(DCT)系数的方法。实验表明,通过该算法获得的数字全息水印对JPEG有损压缩和剪切等图像处理操作均有很好的稳健性,并且采用密钥加强了水印的安全性。因此该算法能成为数字多媒体产品版权保护的有效方案。  相似文献   

19.
基于分形的小波分析压缩编码   总被引:1,自引:0,他引:1  
分析了小波及分形在图形压缩编码中的特点 ,构造了Haar小波树 ,提出基于分形的小波域图像压缩编码的算法。实验证明 :该方法在相近的压缩比的情况下 ,使重建图像的PSNR增加 4 1,图像压缩速度明显提高 ,并且重建图像的主观视觉质量也优于JPEG。  相似文献   

20.
The transmission of digital medical information is affected by data compression, noise, scaling, labeling, and other factors. At the same time, medical data may be illegally copied and maliciously tampered with without authorization. Therefore, the copyright protection and integrity authentication of medical information are worthy of attention. In this paper, based on the wavelet packet and energy entropy, a new method of medical image authentication is designed. The proposed method uses the sliding window to measure the energy of the detail information. In the time–frequency data distribution, the local details of the data are mined. The complexity of energy is quantitatively described to highlight the valuable information. Based on the energy weight, the local energy entropy is constructed and normalized. The adjusted entropy value is used as the feature vector of the authentication information. A series of experiments show that the authentication method has good robustness against shearing attacks, median filtering, contrast enhancement, brightness enhancement, salt-and-pepper noise, Gaussian noise, multiplicative noise, image rotation, scaling attacks, sharpening, JPEG compression, and other attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号