首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 13 毫秒
1.
The performance of image quality assessment method based on SSIM (structural similarity) is better than the PSNR (peak signal to noise ratio), but the assessment effects of SSIM is poor for seriously blurred image, therefore, the model that combined HVS (human visual sensitivity) and SSIM was established. The basic idea is based on the human eye's sensitivity to different frequency distortion image, the image is two-dimensional discrete cosine transform frequency component into low, mid, high-frequency component, to obtain the frequency component of light, contrast and structural information, using Pearson coefficient for weight and sum processing to the sub-image according to frequency bands of different sensitive degree, finally, get the sharpness of the image. Through nonlinear regression analysis of objective assessment and DMOS, experiments showed that this method was closer to human perception than SSIM and GSSIM for serious blurred distortion image. At the same time, compared to conventional algorithm MAE (mean absolute error), MSE (mean square error) and PSNR, this model was more consistent with human visual characteristics.  相似文献   

2.
In this paper we applied differential evolution (DE) algorithm to balance the tradeoff between robustness and imperceptibility by exploring multiple scaling factors in image watermarking. First of all, the original image is partitioned into blocks and the blocks are transformed into Discrete Cosine Transform (DCT) domain. The DC coefficients from each block are collected to construct a low-resolution approximation image and apply Singular Value Decomposition (SVD) on this approximation image. After that watermark is embedded by modifying singular values with the singular values of the watermark. The role of DE algorithm is to identify the best multiple scaling factors for embedding process in order to achieve the best performance in terms of robustness without compromising with the quality of the image. To enhance the security, watermark is scrambled by Arnold transform before embedding. Experimental results show that the proposed scheme maintains a satisfactory image quality and watermark can still be identified from a seriously distorted image.  相似文献   

3.
An image encryption algorithm to secure three color images simultaneously by combining scrambling with the reality-preserving fractional discrete cosine transform (RPFrDCT) is proposed. The three color images to be encrypted are converted to their indexed formats by extracting their color maps, which can be considered as the three components of a color image. These three components are affected each other by scrambling the interims obtained from vertically and horizontally combining the three indexed formats with the help of the chaos-based cyclic shift. The three scrambled components are separately transformed with the RPFrDCT, in which the generating sequences are determined by the Chirikov standard chaotic map. Arnold transform is used to further enhance the security. Due to the inherent properties of the chaotic maps, the cipher keys are highly sensitive. Additionally, the cipher image is a single color image instead of three color ones, and is convenient for display, storage and transmission due to the reality property of RPFrDCT. Numerical simulations are performed to show the validity of the proposed algorithm.  相似文献   

4.
Color image watermarking has become essential and important copyright protection or authentication scheme. It is noted that most of the existing color image watermarking algorithms are performed only in the single domain (spatial domain or frequency domain), and not to integrate these merits of the different domains. By utilizing the generating principle and distribution feature of the direct current (DC) coefficient, a novel blind watermarking algorithm is proposed for color host images in this paper. Firstly, the Y luminance of host image is divided into 8 × 8 sub-blocks and the DC coefficients of each block are directly calculated in the spatial domain without DCT transform. Secondly, according to the watermark information and the quantization step, the DC coefficients are calculated and their increments are further utilized to modify directly the values of all pixels in the spatial domain instead of the DCT domain to embed watermark. When watermark extraction, only the watermarked image and the quantization step are needed in the spatial domain. Experimental results show that the proposed method not only can resist both traditional signal processing attacks and geometric attacks, but also has more efficient in computational complexity. Comparisons also demonstrate the advantages of the method.  相似文献   

5.
A novel scheme for image encryption based-on the multiple-order discrete fractional cosine transform (MODFrCT) is proposed. The DFrCT has a similar relationship with the discrete fractional Fourier transform (DFrFT). Not only has the DFrCT many useful properties similar to the conventional discrete cosine transform, but it also has another property, namely its fraction, or its transform order. The image to be encrypted is transformed with the multiple-order DFrCT using a random row cipher key vector and a random column key vector successively, and the corresponding cipher key vectors of decryption are also very sensitive. The transmission of the encrypted image with the algorithm of the multiple-order DFrCT is faster due to its reality. The digital simulation results proved the validity and safety of this algorithm.  相似文献   

6.
With the widespread use of the Internet, digital media can be readily manipulated, reproduced, and distributed over information networks. Therefore, illegal reproduction of digital information started to pose a real problem. Digital watermarking has been regarded as an effective solution to protect the copyright of digital media. In this paper, an improved SVD-based watermarking technique considering human visual characteristics is presented. Experimental results are provided to demonstrate the proposed approach is able to withstand a variety of image processing attacks.  相似文献   

7.
The classical double random phase encoding technique (DRPE) is vulnerable to chosen ciphertext attacks, known-plaintext attacks and chosen-plaintext attacks for its linearity. In order to avoid the disadvantages originated from the linearity and symmetric, an improved method for multiple-image encryption based on nonlinear operations in Fourier domain is proposed. The random phase masks (RPMs) for encryption and additive keys which are determined by the original images and generated by the nonlinear operations in encryption process, are necessary for image decoding. As a result of the nonlinear operations, the increase in the number of keys, removal of linearity and high robustness could be achieved in this cryptosystem. Computer simulations are presented to demonstrate its good performance, and the security is analyzed as well.  相似文献   

8.
We propose an image encryption scheme based on double random amplitude coding technique by using random Hartley transform, which is defined according to the random Fourier transform. The significant feature of this algorithm is that the encrypted image is real and convenient for storage as well as transfer of the encrypted information. Moreover, the algorithm has enhanced security and the correct information of original image can be well protected under bare decryption, blind decryption and brute force attacks. Numerical simulation results are also presented in support of the proposed scheme.  相似文献   

9.
Qu Wang  Qing Guo  Liang Lei  Jinyun Zhou 《Optik》2013,124(24):6707-6712
We present an optical method for double image encryption by using linear exchanging operation and double random phase encoding (DRPE) in the gyrator transform (GT) domain. In the linear exchanging operation, two primitive images are linearly recombined via a random orthogonal transform matrix. The resultant blended images are employed to constitute a complex-valued image, which is then encoded into a noise-like encrypted image by a DRPE structure in the GT domain. One can recover the primitive images exactly with all decryption keys correctly applied, including the transform orders, the random phase masks and random angle function used for linear exchanging operation. Computer simulations have been given to demonstrate that the proposed scheme eliminates the difference in key spaces between the phase-based image and the amplitude-based image encountered in the previous schemes. Moreover, our scheme has considerably high security level and certain robustness against data loss and noise disturbance.  相似文献   

10.
A single-channel color image encryption is proposed based on a phase retrieve algorithm and a two-coupled logistic map. Firstly, a gray scale image is constituted with three channels of the color image, and then permuted by a sequence of chaotic pairs generated by the two-coupled logistic map. Secondly, the permutation image is decomposed into three new components, where each component is encoded into a phase-only function in the fractional Fourier domain with a phase retrieve algorithm that is proposed based on the iterative fractional Fourier transform. Finally, an interim image is formed by the combination of these phase-only functions and encrypted into the final gray scale ciphertext with stationary white noise distribution by using chaotic diffusion, which has camouflage property to some extent. In the process of encryption and decryption, chaotic permutation and diffusion makes the resultant image nonlinear and disorder both in spatial domain and frequency domain, and the proposed phase iterative algorithm has faster convergent speed. Additionally, the encryption scheme enlarges the key space of the cryptosystem. Simulation results and security analysis verify the feasibility and effectiveness of this method.  相似文献   

11.
An image encryption is discussed based on the random phase encoding method in gyrator domains. An iterative structure of image encryption is designed for introducing more random phases to encrypt image. These random phase functions are generated by a two-dimensional chaotic mapping with the help of computer. The random phases are utilized for increasing the security of this encryption algorithm. In the chaotic mapping relation, the initial value and expression can serve as the key of algorithm. The mapping relation is considered secretly for storage and transmission in practical application in comparison to traditional algorithms. The angle parameter of gyrator transform is an additional key. Some numerical simulations have been given to validate the performance of the encryption scheme.  相似文献   

12.
A novel optical image encryption scheme is proposed based on quick response code and high dimension chaotic system, where only the intensity distribution of encoded information is recorded as ciphertext. Initially, the quick response code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick response code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.  相似文献   

13.
Military, navigation and concealed weapon detection need different imaging modalities such as visible and infrared to monitor a targeted scene. These modalities provide complementary information. For better situation awareness, complementary information of these images has to be integrated into a single image. Image fusion is the process of integrating complementary source information into a composite image. In this paper, we propose a new image fusion method based on saliency detection and two-scale image decomposition. This method is beneficial because the visual saliency extraction process introduced in this paper can highlight the saliency information of source images very well. A new weight map construction process based on visual saliency is proposed. This process is able to integrate the visually significant information of source images into the fused image. In contrast to most of the multi-scale image fusion techniques, proposed technique uses only two-scale image decomposition. So it is fast and efficient. Our method is tested on several image pairs and is evaluated qualitatively by visual inspection and quantitatively using objective fusion metrics. Outcomes of the proposed method are compared with the state-of-art multi-scale fusion techniques. Results reveal that the proposed method performance is comparable or superior to the existing methods.  相似文献   

14.
On fusing infrared and visible image, the traditional fusion method cannot get the better image quality. Based on neighborhood characteristic and regionalization in NSCT (Nonsubsampled Contourlet Transform) domain, the fusion algorithm was proposed. Firstly, NSCT was adopted to decompose infrared and visible images at different scales and directions for the low and high frequency coefficients, the low frequency coefficients which were fused with improving regional weighted fusion method based on neighborhood energy, and the high-frequency coefficients were fused with multi-judgment rule based on neighborhood characteristic regional process. Finally, the coefficients were reconstructed to obtain the fused image. The experimental results show that, compared with the other three related methods, the proposed method can get the biggest value of IE (information entropy), MI(VI,F) (mutual information from visible image), MI(VI,F) (mutual information from infrared image), MI (sum of mutual information), and QAB/F (edge retention). The proposed method can leave enough information in the original images and its details, and the fused images have better visual effects.  相似文献   

15.
A position multiplexing method based on the modified Gerchberg-Saxton algorithm (MGSA) and a cascaded phase modulation scheme in the Fresnel transform domain is proposed in the multiple-image-encryption framework. First of all, each plain image is encoded into a complex function using the MGSA. The phase components of the created complex functions are then multiplexed with different position parameters, and summed. The phase part of the summation result is recorded in the first phase-only mask (POM). The MGSA is applied on the amplitude part of the summation result to determine another phase only function which is then recorded in the second POM. The simulation results show that the crosstalk between multiplexed images is significantly reduced compared with an existing similar method [20]. Therefore, the multiplexing capacity in encrypting multiple grayscale images can be increased accordingly.  相似文献   

16.
Condition monitoring and life prediction of the vehicle engine is an important and urgent problem during the vehicle development process. The vibration signals that are closely associated with the engine running condition and its development trend are complex and nonlinear. The chaos theory is used to treat the nonlinear dynamical system recently. A novel chaos method in conjunction with SVD (singular value decomposition)denoising skill are used to predict the vibration time series. Two types of time series and their prediction errors are provided to illustrate the practical utility of the method.  相似文献   

17.
We propose a multiple-image hiding scheme based on the amplitude- and phase-truncation approach, and phase retrieval iterative algorithm in the fractional Fourier domain. The proposed scheme offers multiple levels of security with asymmetric keys. Multiple input images multiplied with random phase masks are independently fractional Fourier transformed with different orders. The individual keys and common keys are generated by using phase and amplitude truncation of fractional spectrum. After using two fractional Fourier transform, the resultant encrypted image is hided in a host image with phase retrieval iterative algorithm. Using the correct universal keys, individual keys, and fractional orders, one can recover the original image successfully. Computer simulation results with four gray-scale images support the proposed method. To measure the validity of the scheme, we calculated the mean square error between the original and the decrypted images. In this scheme, the encryption process and generation of decryption keys are complicated and should be realized using computer. For decryption, an optoelectronic setup has been suggested.  相似文献   

18.
It is the first time so far as we know that two arrays of multi-channel soft x-ray detectors are used to generate twodimensional (2D) images of sawtooth oscillation on the HT-7 tokamak using the Fourier-Bessel harmonic reconstruction method, and using the singular value decomposition to analyse the data from soft x-ray cameras. By these two arrays, 2D image reconstruction of soft x-ray emissivity can be obtained without assumption of plasma rigid rotation. Tomographic reconstruction of the m=1 mode structure is obtained during the precursor oscillation of the sawtooth crash. The crescent-shaped mode structure appearing on the contour map of the soft x-ray emissivity is consistent with the quasiinterchange mode. The characteristics of the m=1/n=1 mode structure observed in the soft x-ray tomography are as follows: the magnetic surface is made up of the crescent-shaped “hot core” and the circular “cold bubble”. The structure of the magnetic surface rotates in the direction of the electron diamagnetic drift and the rotation frequency is the oscillation frequency of soft x-ray signals.  相似文献   

19.
In this paper, we have proposed a new multiple image encryption and watermarking technique. Several gray images can be watermarked in the three channels of an enlarged color image. The neighbor pixel value addition and subtraction algorithm is used to realize blind watermarking, therefore the original host color image does not need in extraction the watermark image. The gray images are encrypted with FRFT and Region Shift Encoding techniques before hiding to enhance the security. The robustness against occlusion attacks and noise attacks are also analyzed. And some computer simulations are presented to verify the possibility.  相似文献   

20.
Y. Chai  H.F. Li  J.F. Qu 《Optics Communications》2010,283(19):3591-100
This paper presents a new multi-source image fusion scheme based on lifting stationary wavelet transform (LSWT) and a novel dual-channel pulse-coupled neural network (PCNN). By using LSWT, we can calculate a flexible multiscale and shift-invariant representation of registered images. After decomposing the original images using LSWT, a new dual-channel pulse coupled neural network, which can overcome some shortcomings of original PCNN for image fusion and putout the fusion image directly, is proposed and used for the fusion of sub-band coefficients of LSWT. In this fusion scheme, a new sum-modified-laplacian(NSML) of the low frequency sub-band image, which represent the edge-feature of the low frequency sub-band image in SLWT domain, is presented and input to motivate the dual-channel PCNN. For the fusion of high frequency sub-band coefficients, a novel local neighborhood modified-laplacian (LNML) measurement is developed and used as external stimulus to motivate the dual-channel PCNN. This fusion scheme is verified on several sets of multi-source images, and the experiments show that the algorithms proposed in the paper can significantly improve image fusion performance, compared with the fusion algorithms such as traditional wavelet, LSWT, and LSWT-PCNN in terms of objective criteria and visual appearance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号