共查询到20条相似文献,搜索用时 15 毫秒
1.
Mi Zengzhen 《Optik》2014
The performance of image quality assessment method based on SSIM (structural similarity) is better than the PSNR (peak signal to noise ratio), but the assessment effects of SSIM is poor for seriously blurred image, therefore, the model that combined HVS (human visual sensitivity) and SSIM was established. The basic idea is based on the human eye's sensitivity to different frequency distortion image, the image is two-dimensional discrete cosine transform frequency component into low, mid, high-frequency component, to obtain the frequency component of light, contrast and structural information, using Pearson coefficient for weight and sum processing to the sub-image according to frequency bands of different sensitive degree, finally, get the sharpness of the image. Through nonlinear regression analysis of objective assessment and DMOS, experiments showed that this method was closer to human perception than SSIM and GSSIM for serious blurred distortion image. At the same time, compared to conventional algorithm MAE (mean absolute error), MSE (mean square error) and PSNR, this model was more consistent with human visual characteristics. 相似文献
2.
In this paper we applied differential evolution (DE) algorithm to balance the tradeoff between robustness and imperceptibility by exploring multiple scaling factors in image watermarking. First of all, the original image is partitioned into blocks and the blocks are transformed into Discrete Cosine Transform (DCT) domain. The DC coefficients from each block are collected to construct a low-resolution approximation image and apply Singular Value Decomposition (SVD) on this approximation image. After that watermark is embedded by modifying singular values with the singular values of the watermark. The role of DE algorithm is to identify the best multiple scaling factors for embedding process in order to achieve the best performance in terms of robustness without compromising with the quality of the image. To enhance the security, watermark is scrambled by Arnold transform before embedding. Experimental results show that the proposed scheme maintains a satisfactory image quality and watermark can still be identified from a seriously distorted image. 相似文献
3.
An image encryption algorithm to secure three color images simultaneously by combining scrambling with the reality-preserving fractional discrete cosine transform (RPFrDCT) is proposed. The three color images to be encrypted are converted to their indexed formats by extracting their color maps, which can be considered as the three components of a color image. These three components are affected each other by scrambling the interims obtained from vertically and horizontally combining the three indexed formats with the help of the chaos-based cyclic shift. The three scrambled components are separately transformed with the RPFrDCT, in which the generating sequences are determined by the Chirikov standard chaotic map. Arnold transform is used to further enhance the security. Due to the inherent properties of the chaotic maps, the cipher keys are highly sensitive. Additionally, the cipher image is a single color image instead of three color ones, and is convenient for display, storage and transmission due to the reality property of RPFrDCT. Numerical simulations are performed to show the validity of the proposed algorithm. 相似文献
4.
Color image watermarking has become essential and important copyright protection or authentication scheme. It is noted that most of the existing color image watermarking algorithms are performed only in the single domain (spatial domain or frequency domain), and not to integrate these merits of the different domains. By utilizing the generating principle and distribution feature of the direct current (DC) coefficient, a novel blind watermarking algorithm is proposed for color host images in this paper. Firstly, the Y luminance of host image is divided into 8 × 8 sub-blocks and the DC coefficients of each block are directly calculated in the spatial domain without DCT transform. Secondly, according to the watermark information and the quantization step, the DC coefficients are calculated and their increments are further utilized to modify directly the values of all pixels in the spatial domain instead of the DCT domain to embed watermark. When watermark extraction, only the watermarked image and the quantization step are needed in the spatial domain. Experimental results show that the proposed method not only can resist both traditional signal processing attacks and geometric attacks, but also has more efficient in computational complexity. Comparisons also demonstrate the advantages of the method. 相似文献
5.
Jianhua Wu 《Optics Communications》2010,283(9):1720-3242
A novel scheme for image encryption based-on the multiple-order discrete fractional cosine transform (MODFrCT) is proposed. The DFrCT has a similar relationship with the discrete fractional Fourier transform (DFrFT). Not only has the DFrCT many useful properties similar to the conventional discrete cosine transform, but it also has another property, namely its fraction, or its transform order. The image to be encrypted is transformed with the multiple-order DFrCT using a random row cipher key vector and a random column key vector successively, and the corresponding cipher key vectors of decryption are also very sensitive. The transmission of the encrypted image with the algorithm of the multiple-order DFrCT is faster due to its reality. The digital simulation results proved the validity and safety of this algorithm. 相似文献
6.
Chih-Chin Lai 《Optics Communications》2011,284(4):938-944
With the widespread use of the Internet, digital media can be readily manipulated, reproduced, and distributed over information networks. Therefore, illegal reproduction of digital information started to pose a real problem. Digital watermarking has been regarded as an effective solution to protect the copyright of digital media. In this paper, an improved SVD-based watermarking technique considering human visual characteristics is presented. Experimental results are provided to demonstrate the proposed approach is able to withstand a variety of image processing attacks. 相似文献
7.
Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain 总被引:2,自引:0,他引:2
The classical double random phase encoding technique (DRPE) is vulnerable to chosen ciphertext attacks, known-plaintext attacks and chosen-plaintext attacks for its linearity. In order to avoid the disadvantages originated from the linearity and symmetric, an improved method for multiple-image encryption based on nonlinear operations in Fourier domain is proposed. The random phase masks (RPMs) for encryption and additive keys which are determined by the original images and generated by the nonlinear operations in encryption process, are necessary for image decoding. As a result of the nonlinear operations, the increase in the number of keys, removal of linearity and high robustness could be achieved in this cryptosystem. Computer simulations are presented to demonstrate its good performance, and the security is analyzed as well. 相似文献
8.
We propose an image encryption scheme based on double random amplitude coding technique by using random Hartley transform, which is defined according to the random Fourier transform. The significant feature of this algorithm is that the encrypted image is real and convenient for storage as well as transfer of the encrypted information. Moreover, the algorithm has enhanced security and the correct information of original image can be well protected under bare decryption, blind decryption and brute force attacks. Numerical simulation results are also presented in support of the proposed scheme. 相似文献
9.
Gyrator变换全息图及其在图像加密中的应用 总被引:3,自引:0,他引:3
提出了gyrator变换全息图,利用gyrator变换快速算法模拟实现了gyrator变换全息图的产生和再现,并研究了基于相移数字全息的gyrator变换全息图.在此基础上提出了采用正弦相位光栅实现光学图像加密的新方法.该方法利用gyrator变换在相空间的旋转特性,将gyrator变换的角度、光栅的频率及光栅的旋转角度作为加密密钥,并利用两个或两个以上的gyrator变换系统的级联实现图像加密,增加了系统的安全性.依据相移数字全息进行的两个gyrator变换系统级联的仿真实验验证了该方法的可行性、有效性及其良好的安全性能. 相似文献
10.
A novel scheme for image encryption of phase images is proposed, using fractional Hartley transform followed by Arnold transform and singular value decomposition in the frequency domain. Since the plaintext is a phase image, the mask used in the spatial domain is a random amplitude mask. The proposed scheme has been validated for grayscale images and is sensitive to the encryption parameters such as the order of the Arnold transform and the fractional orders of the Hartley transform. We have also evaluated the scheme's resistance to the well-known noise and occlusion attacks. 相似文献
11.
We present an optical method for double image encryption by using linear exchanging operation and double random phase encoding (DRPE) in the gyrator transform (GT) domain. In the linear exchanging operation, two primitive images are linearly recombined via a random orthogonal transform matrix. The resultant blended images are employed to constitute a complex-valued image, which is then encoded into a noise-like encrypted image by a DRPE structure in the GT domain. One can recover the primitive images exactly with all decryption keys correctly applied, including the transform orders, the random phase masks and random angle function used for linear exchanging operation. Computer simulations have been given to demonstrate that the proposed scheme eliminates the difference in key spaces between the phase-based image and the amplitude-based image encountered in the previous schemes. Moreover, our scheme has considerably high security level and certain robustness against data loss and noise disturbance. 相似文献
12.
Liansheng Sui Meiting Xin Ailing Tian Haiyan Jin 《Optics and Lasers in Engineering》2013,51(12):1297-1309
A single-channel color image encryption is proposed based on a phase retrieve algorithm and a two-coupled logistic map. Firstly, a gray scale image is constituted with three channels of the color image, and then permuted by a sequence of chaotic pairs generated by the two-coupled logistic map. Secondly, the permutation image is decomposed into three new components, where each component is encoded into a phase-only function in the fractional Fourier domain with a phase retrieve algorithm that is proposed based on the iterative fractional Fourier transform. Finally, an interim image is formed by the combination of these phase-only functions and encrypted into the final gray scale ciphertext with stationary white noise distribution by using chaotic diffusion, which has camouflage property to some extent. In the process of encryption and decryption, chaotic permutation and diffusion makes the resultant image nonlinear and disorder both in spatial domain and frequency domain, and the proposed phase iterative algorithm has faster convergent speed. Additionally, the encryption scheme enlarges the key space of the cryptosystem. Simulation results and security analysis verify the feasibility and effectiveness of this method. 相似文献
13.
Infrared polarization and intensity imagery provide complementary and discriminative information in image understanding and interpretation. In this paper, a novel fusion method is proposed by effectively merging the information with various combination rules. It makes use of both low-frequency and high-frequency images components from support value transform (SVT), and applies fuzzy logic in the combination process. Images (both infrared polarization and intensity images) to be fused are firstly decomposed into low-frequency component images and support value image sequences by the SVT. Then the low-frequency component images are combined using a fuzzy combination rule blending three sub-combination methods of (1) region feature maximum, (2) region feature weighting average, and (3) pixel value maximum; and the support value image sequences are merged using a fuzzy combination rule fusing two sub-combination methods of (1) pixel energy maximum and (2) region feature weighting. With the variables of two newly defined features, i.e. the low-frequency difference feature for low-frequency component images and the support-value difference feature for support value image sequences, trapezoidal membership functions are proposed and developed in tuning the fuzzy fusion process. Finally the fused image is obtained by inverse SVT operations. Experimental results of visual inspection and quantitative evaluation both indicate the superiority of the proposed method to its counterparts in image fusion of infrared polarization and intensity images. 相似文献
14.
Ghost imaging-based optical cryptosystem for multiple images using integral property of the Fourier transform 下载免费PDF全文
A novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform is proposed. Different from other multiple-image encryption schemes, we mainly construct the modulation patterns related to the plaintext images to realize the encrypted transmission of multiple images. In encryption process, the first image is encrypted by the ghost imaging encryption scheme, and the intensity sequence obtained by the bucket detector is used as the ciphertext. Then modulation patterns of other images are constructed by using the integral property of the Fourier transform and used as the keys. Finally, the ciphertext and keys are transmitted to the receiver to complete the encryption process. During decryption, the receiver uses different keys to decrypt the ciphertext and gets different plaintext images, and decrypted images have no image aliasing problem. Experiments and simulations verify the feasibility, security, and robustness of the proposed scheme. This scheme has high scalability and broad application prospect, which provides a new idea for optical information encryption. 相似文献
15.
A novel optical image encryption scheme is proposed based on quick response code and high dimension chaotic system, where only the intensity distribution of encoded information is recorded as ciphertext. Initially, the quick response code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick response code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme. 相似文献
16.
Zhengjun Liu Lie XuChuang Lin Jingmin DaiShutian Liu 《Optics and Lasers in Engineering》2011,49(4):542-546
An image encryption is discussed based on the random phase encoding method in gyrator domains. An iterative structure of image encryption is designed for introducing more random phases to encrypt image. These random phase functions are generated by a two-dimensional chaotic mapping with the help of computer. The random phases are utilized for increasing the security of this encryption algorithm. In the chaotic mapping relation, the initial value and expression can serve as the key of algorithm. The mapping relation is considered secretly for storage and transmission in practical application in comparison to traditional algorithms. The angle parameter of gyrator transform is an additional key. Some numerical simulations have been given to validate the performance of the encryption scheme. 相似文献
17.
Military, navigation and concealed weapon detection need different imaging modalities such as visible and infrared to monitor a targeted scene. These modalities provide complementary information. For better situation awareness, complementary information of these images has to be integrated into a single image. Image fusion is the process of integrating complementary source information into a composite image. In this paper, we propose a new image fusion method based on saliency detection and two-scale image decomposition. This method is beneficial because the visual saliency extraction process introduced in this paper can highlight the saliency information of source images very well. A new weight map construction process based on visual saliency is proposed. This process is able to integrate the visually significant information of source images into the fused image. In contrast to most of the multi-scale image fusion techniques, proposed technique uses only two-scale image decomposition. So it is fast and efficient. Our method is tested on several image pairs and is evaluated qualitatively by visual inspection and quantitatively using objective fusion metrics. Outcomes of the proposed method are compared with the state-of-art multi-scale fusion techniques. Results reveal that the proposed method performance is comparable or superior to the existing methods. 相似文献
18.
On fusing infrared and visible image, the traditional fusion method cannot get the better image quality. Based on neighborhood characteristic and regionalization in NSCT (Nonsubsampled Contourlet Transform) domain, the fusion algorithm was proposed. Firstly, NSCT was adopted to decompose infrared and visible images at different scales and directions for the low and high frequency coefficients, the low frequency coefficients which were fused with improving regional weighted fusion method based on neighborhood energy, and the high-frequency coefficients were fused with multi-judgment rule based on neighborhood characteristic regional process. Finally, the coefficients were reconstructed to obtain the fused image. The experimental results show that, compared with the other three related methods, the proposed method can get the biggest value of IE (information entropy), MI(VI,F) (mutual information from visible image), MI(VI,F) (mutual information from infrared image), MI (sum of mutual information), and QAB/F (edge retention). The proposed method can leave enough information in the original images and its details, and the fused images have better visual effects. 相似文献
19.
A position multiplexing method based on the modified Gerchberg-Saxton algorithm (MGSA) and a cascaded phase modulation scheme in the Fresnel transform domain is proposed in the multiple-image-encryption framework. First of all, each plain image is encoded into a complex function using the MGSA. The phase components of the created complex functions are then multiplexed with different position parameters, and summed. The phase part of the summation result is recorded in the first phase-only mask (POM). The MGSA is applied on the amplitude part of the summation result to determine another phase only function which is then recorded in the second POM. The simulation results show that the crosstalk between multiplexed images is significantly reduced compared with an existing similar method [20]. Therefore, the multiplexing capacity in encrypting multiple grayscale images can be increased accordingly. 相似文献
20.
Condition monitoring and life prediction of the vehicle engine is an important and urgent problem during the vehicle development process. The vibration signals that are closely associated with the engine running condition and its development trend are complex and nonlinear. The chaos theory is used to treat the nonlinear dynamical system recently. A novel chaos method in conjunction with SVD (singular value decomposition)denoising skill are used to predict the vibration time series. Two types of time series and their prediction errors are provided to illustrate the practical utility of the method. 相似文献