首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Encrypting image by assembling the fractal-image addition method and the binary encoding method
Authors:Kuang Tsan Lin  Sheng Lih Yeh
Institution:1. Department of Psychology, University of Waterloo, Canada;2. Department of Psychology, Yale University, USA;1. School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China;2. College of Information & Computer, Taiyuan University of Technology, Taiyuan 030024, China;3. School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;1. School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China;2. Peng Cheng Laboratory, Shenzhen, China;3. School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, China;4. Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University, Ministry of Education, China
Abstract:The fractal-image addition method and the binary encoding method are assembled to form a hybrid method for encrypting a digital covert image. For this hybrid method, a host image is used to create an overt image with the information of the covert image. First, the fractal-image addition method is used to add some fractal images and the covert image to form an image-mixing matrix. Then, all the pixel values of the image-mixing matrix are transferred into binary data. Finally, the binary data are encoded into the host image to create an overt image. The pixels of the overt image contain eight groups of codes used for reconstructing the covert image. The eight groups of codes are identification codes, row amount codes, covert-image dimension codes, fractal-image amount codes, starting-pixel codes, character amount codes, character codes, and information codes. The overt image and the host image look almost the same for eyes. Furthermore, the covert image can be directly reconstructed from the overt image without using the host image. The most important feature is that the reconstructed covert image is identical to the original covert image, i.e. there is no distortion in the decoding work.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号