scholarly journals Robust coding of encrypted images via structural matrix

2015 ◽  
Vol 39 ◽  
pp. 202-211 ◽  
Author(s):  
Yushu Zhang ◽  
Kwok-Wo Wong ◽  
Leo Yu Zhang ◽  
Wenying Wen ◽  
Jiantao Zhou ◽  
...  
Reproduction ◽  
2000 ◽  
pp. 143-150 ◽  
Author(s):  
JM Bedford ◽  
OB Mock ◽  
SK Nagdas ◽  
VP Winfrey ◽  
GE Olson

To obtain further perspective on reproduction and particularly gamete function among so-called primitive mammals presently grouped in the Order Insectivora, we have examined the African hedgehog, Atelerix albiventris, in light of unusual features reported in shrews and moles. Atelerix proves to share many but not all of the characteristics seen in these other insectivores. The penis of Atelerix has a 'snail-like' form, but lacks the surface spines common in insectivores and a number of other mammals. Hedgehog spermatozoa display an eccentric insertion of the tail on the sperm head, and they manifest the barbs on the perforatorium that, in shrews, probably effect the initial binding of the sperm head to the zona pellucida. As a possible correlate, the structural matrix of the hedgehog acrosome comprises only two main components, as judged by immunoblotting, rather than the complex of peptides seen in the matrix of some higher mammals. The Fallopian tube of Atelerix is relatively simple; it displays only minor differences in width and in the arborized epithelium between the isthmus and ampulla, and shows no evidence of the unusual sperm crypts that characterize the isthmus or ampulla, depending on the species, in shrews and moles. In common with other insectivores, Atelerix appears to be an induced ovulator, as judged by the ovulation of some 6-8 eggs by about 23 h after injection of hCG. The dense cumulus oophorus appeared to have little matrix, in keeping with the modest dimensions of the tubal ampulla and, while it was not quite as discrete as that of soricids, it did show the same insensitivity to 0.5% (w/v) ovine or bovine hyaluronidase.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


2015 ◽  
Vol 28 (2) ◽  
pp. 549-572 ◽  
Author(s):  
Shabir A. Parah ◽  
Javaid A. Sheikh ◽  
Umer I. Assad ◽  
Ghulam M. Bhat
Keyword(s):  

2012 ◽  
Vol 19 (4) ◽  
pp. 199-202 ◽  
Author(s):  
Wien Hong ◽  
Tung-Shou Chen ◽  
Han-Yan Wu

2005 ◽  
Vol 33 (9) ◽  
pp. 2865-2877
Author(s):  
John A. Lewallen

Sign in / Sign up

Export Citation Format

Share Document