A Grayscale Image Vulnerability Authentication System Based on Compressed Sensing

2015 ◽  
Vol 738-739 ◽  
pp. 533-537
Author(s):  
Xu Zhan ◽  
Yue Rong Lei ◽  
Hui Ming Zeng ◽  
Jian Ling Chen

In this paper, we study compressed sensing algorithm and image authentication algorithm, present a grayscale image vulnerability authentication system based on compressed sensing. The system extracts the original grayscale image edge information by prewitt algorithm and observes the edge information by compressed sensing algorithm of OMP to generate the observation matrix . Then, the system scrambles the observation matrix by arnold transform algorithm and embeds it into the original grayscale image by singular value decomposition algorithm. We make experiment in order to test the system. The result is shown that the algorithm has good imperceptibility and can resist copying attack.

2020 ◽  
Vol 79 (35-36) ◽  
pp. 25969-25988
Author(s):  
Jau-Ji Shen ◽  
Chin-Feng Lee ◽  
Fang-Wei Hsu ◽  
Somya Agrawal

he proposed paper work is implemented using Stationary Wavelet Transformation (SWT) with Singular Value Decomposition (SVD).Even though, there are many other transformations, the Stationary Wavelet Transformation method is chosen for its shift invariance property. The designed method has three steps; the first step is the decomposing of the Medical image into sub-bands using SWT to find the value of sub band and as a second step is to apply SVD, third step will combine both the images with scaling factor. The experiments were conducted over gray scale of MRI and CT Medical images. The statistics of proposed method indicates that imperceptibility of Watermarked Medical images have a Peak Signal to Noise Ratio (PSNR) value of 50 DB for medical images. The robustness is ensured by having Correlation Coefficient (CC) of 1 for the retrieved watermark images. Security for the watermark is extended by encrypting the watermark with chaotic sequence.


2013 ◽  
Vol 380-384 ◽  
pp. 2925-2929
Author(s):  
Yue Rong Lei ◽  
Xu Zhan ◽  
Ling Yan Du ◽  
Hui Ming Zeng ◽  
Jian Ling Chen

Image authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image volatiles the authenticity of image-ownership. In this regard the digital watermarking-based image authentication system is studied. A color image authentication system is proposed. This system converts a color image into a grayscale image, and divides the grayscale image into 8*8 small pieces. Each small piece is made into DCT transform and extracted low frequencies to form the watermark. Then, the original image uses LSB algorithm and hash algorithm in watermark image to form authentication code. The system makes the authentication code as watermark information to embed watermark. The system is made in experiment. The result shows the system has good imperceptibility.


Energies ◽  
2021 ◽  
Vol 14 (8) ◽  
pp. 2314
Author(s):  
Piotr Wróblewski ◽  
Wojciech Drożdż ◽  
Wojciech Lewicki ◽  
Paweł Miązek

The article presents the methodology of isolating aperiodic phenomena constituting the basis of the energy balance of vehicles for the analysis of electromobility system indicators. The symptom observation matrix (SOM) and experimental input data are used to analyze periodic phenomena symptoms. The multidimensional nature of the engine efficiency shortage has been well defined and analyzed in terms of errors in the general model using neural networks, singular value decomposition, and principal component analysis. A more difficult task is the analysis of a multidimensional decision-making process. The research used a data fusion method and the concept of symptom reliability, which is applied to the generalized failure symptom obtained by applying the singular value decomposition (SVD). The model research has been based on the gray system theory (GST) and GM forecasting models (1,1). Input data were obtained from the assessment of driving cycles and analysis of the failure frequency for 1200 vehicles and mileage of 150,000 km. Based on this analysis, it can be concluded that with the current infrastructure and operating costs and the frequency of failure of PHEV and BEV drives, ICEV vehicles are unrivaled in terms of their operating costs.


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Maretha Ruswiansari ◽  
Atik Novianti ◽  
Wirawan Wirawan

Keaslian informasi dalam berbagai bentuk dan media tidak lagi terjaga karena setiap orang dapat mengubah dan memodifikasinya untuk kemudian disebarkan kembali. Tanda air (watermarking) dapat diartikan sebagai suatu teknik penyisipan dan atau penyembunyian informasi yang bersifat rahasia pada suatu data lainnya untuk “ditumpangi” (kadang disebut dengan host data), tetapi orang lain tidak menyadari adanya kehadiran data tambahan pada data host-nya (istilah host digunakan untuk data atau sinyal digital yang disisipi), sehingga seolah-olah tidak ada perbedaan berarti antara data host sebelum dan sesudah proses watermarking. Pada penelitian ini dilakukan simulasi algoritma watermarking dengan menyisipkan citra watermark ke citra asli menggunakan Discrete Wavelet Transform (DWT) dan Singular Value Decomposition (SVD). Penelitian ini menggunakan citra host berwarna sehingga perlu dilakukan proses konversi citra RGB menjadi komponen Y, Cb, dan Cr. Metode DWT-SVD lebih tahan terhadap attack dibandingkan dengan metode DWT. Prosespenyisipan watermark dengan Arnold transform menghasilkan PSNR lebih tinggi dibandingkan tanpa Arnold transform, dimana dengan Arnold transform PSNR = 85.7959 dB, dan tanpa Arnold transform PSNR = 85.3901 dB. Semakin rendah PSNR maka semakin tinggi nilai similarity factor (SF) dan semakin jelas watermark-nya.


Sign in / Sign up

Export Citation Format

Share Document