scholarly journals Method of covert information transfer in still images using a chaotic oscillator.

Author(s):  
Rodion Khamzaevich Baltaev

The subject of the research is the steganographic method of embedding information in digital images. Steganography is able to hide not only the content of information, but also the fact of its existence. The paper presents a method of embedding and extracting information into digital images using a chaotic dynamic system. Chaotic systems are sensitive to certain signals and at the same time immune to noise. These properties allow the use of chaotic systems for embedding information with small image distortions in statistical and visual terms. The methodological basis of the study is the methods of the theory of dynamical systems, mathematical statistics, as well as the theory of image processing. The novelty of the study lies in the development of a new method of embedding information in static images. The author examines in detail the problem of using a chaotic dynamic Duffing system for embedding and extracting information in digital still images. It is shown that the proposed method allows you to embed information in digital images without significant distortion.

1998 ◽  
Vol 08 (06) ◽  
pp. 1363-1369 ◽  
Author(s):  
Xiao Fan Wang ◽  
Zhi Quan Wang

This Letter proposes a new synchronization theorem for a subclass of chaotic Lur'e systems. We take a specific state variable of the drive system as the driving signal. We prove that globally synchronization can be attained via the simple linear error feedback. The approach is illustrated using Chua's chaotic oscillator and a hyperchaotic oscillator.


2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.


2012 ◽  
Author(s):  
Nooritawati Md Tahir ◽  
Aini Hussain ◽  
Salina Abdul Samad ◽  
Hafizah Husain

Dalam kajian ini, teknik profil sentroid yang berdasarkan pendekatan berasaskan model digunakan bagi tugas pengecaman insan. Kaedah ini dilaksanakan secara mengekstrak ciri–ciri unik perwakilan isyarat gaya lenggang insan serta bukan insan secara automatik dan pasif berasaskan imej pegun. Untuk menilai kekuatan algoritma sarian teknik profil sentroid yang dihasilkan, Rangkaian Neural Buatan (RNB) digunakan sebagai pengelas. Keputusan yang diperolehi membuktikan ciri sarian profil sentroid sesuai digunakan sebagai perwakilan vektor ciri bagi pengelasan insan dengan kadar pengelasan RNB yang dicapai melebihi 98%. Kata kunci: Pengecaman insan; rangkaian neural tiruan; profil sentroid In this study, centroidal profile which is a model based approach is employed for human recognition task. This is done by extracting unique representation of gait features of the subject automatically and passively from static images of human or non human. To evaluate the effectiveness of the generated centroidal profile, Artificial Neural Network (RNB) is used as classifier. Results attained proven that the centroidal profile is appropriate as feature extraction to be used as feature vectors for human shape classification based on classification rate of RNB achieved specifically above 98%. Key words: Human recognition; artificial neural network (ANN); centroidal profile


2004 ◽  
Vol 14 (04) ◽  
pp. 1431-1437 ◽  
Author(s):  
JUNGUO LU ◽  
YUGENG XI ◽  
XIAOFAN WANG

This letter proposes a new global synchronization theorem for a class of chaotic systems. Specially, in the synchronization theorem neither the linear part nor the nonlinear part of the chaotic system requires the special structure indicated in [Wang & Wang, 1998]. We take a linear combination of the original system state variables as the scale-driving signal. We prove that the global synchronization can be attained through the simple linear output error feedback. The linear output error feedback gain is a function of a free parameter. We use Chua's chaotic oscillator and Saito's hyperchaotic system to illustrate the applicability of our synchronization scheme and discuss the issues concerning robustness.


F1000Research ◽  
2019 ◽  
Vol 7 ◽  
pp. 1813 ◽  
Author(s):  
Kenichi Nagae ◽  
Yasufumi Asao ◽  
Yoshiaki Sudo ◽  
Naoyuki Murayama ◽  
Yuusuke Tanaka ◽  
...  

Background: A breast-specific photoacoustic imaging (PAI) system prototype equipped with a hemispherical detector array (HDA) has been reported as a promising system configuration for providing high morphological reproducibility for vascular structures in living bodies. Methods: To image the vasculature of human limbs, a newly designed PAI system prototype (PAI-05) with an HDA with a higher density sensor arrangement was developed. The basic device configuration mimicked that of a previously reported breast-specific PAI system. A new imaging table and a holding tray for imaging a subject's limb were adopted. Results: The device’s performance was verified using a phantom. Contrast of 8.5 was obtained at a depth of 2 cm, and the viewing angle reached up to 70 degrees, showing sufficient performance for limb imaging. An arbitrary wavelength was set, and a reasonable PA signal intensity dependent on the wavelength was obtained. To prove the concept of imaging human limbs, various parts of the subject were scanned. High-quality still images of a living human with a wider size than that previously reported were obtained by scanning within the horizontal plane and averaging the images. The maximum field of view (FOV) was 270 mm × 180 mm. Even in movie mode, one-shot 3D volumetric data were obtained in an FOV range of 20 mm in diameter, which is larger than values in previous reports. By continuously acquiring these images, we were able to produce motion pictures. Conclusion: We developed a PAI prototype system equipped with an HDA suitable for imaging limbs. As a result, the subject could be scanned over a wide range while in a more comfortable position, and high-quality still images and motion pictures could be obtained.


Author(s):  
Anna Pawiak ◽  

The article aims at drawing attention to opportunities of reputation management by researchers using new media, considering the importance of internet tools for image creation and identifying opportunities and threats. The research problem of the article focuses on answers to the question formulated as follows: What might the possible importance of the Internet for reputation building be? The problem relates to the issue of researchers’ active participation in creating and shaping their reputation online. The presented considerations have been based on literature and studies on the subject. The article attempts to clarify the distinction between the concepts of identity, image, and reputation. It discusses image-creating factors and refers to the question of immanent credibility and guise in research. The author describes examples of internet tools and points to their importance for reputation management, which concerns the sum of partial images accumulating over time. Communication plays an important role in building reputation. Owing to its availability, interactivity and variety of forms, as well as the speed of information transfer, the Internet has become an indispensable channel of communication. All researchers should recognise the fact in order to build their reputation thoughtfully. Their reputation involves a multitude of accumulated images formed as a result of interactions between factors associated with the subjects themselves, information the recipients obtain, and factors relating to the recipients. The conclusions of the study point to the necessity of reputation management by planned and deliberate actions taking advantage of internet tools. Thus, every effort should be made to prevent a situation where reputation is shaped irrespective of the interested person’s participation.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Dhinakaran Veeman ◽  
Hayder Natiq ◽  
Nadia M. G. Al-Saidi ◽  
Karthikeyan Rajagopal ◽  
Sajad Jafari ◽  
...  

Recently, megastable systems have grabbed many researchers’ interests in the area of nonlinear dynamics and chaotic systems. In this paper, the oscillatory terms’ coefficients of the simplest megastable oscillator are forced to blink in time. The forced system can generate an infinitive number of hidden attractors without changing parameters. The behavior of these hidden attractors can be chaotic, tori, and limit cycle. The attractors’ topology of the system seems unique and looks like picture frames. Besides, the existence of different coexisting attractors with different kinds of behaviors reflects the system's high sensitivity. Using the sample entropy algorithm, the system’s complexity for different initial values is assessed. In addition, the circuit of the introduced forced system is designed, and the possibility of implicating the system with analog elements is investigated.


Author(s):  
Xia Zhou ◽  
Dongpeng Zhou ◽  
Xiu Liu ◽  
Jinde Cao ◽  
Changfeng Xue

The stability and boundedness for delayed impulsive SDEs driven by fBm are studied in this paper. Two kinds of noises, i.e, additive fBm noise and mul-tiplicative fBm noise are both taken into consideration. By using stochastic Lyapunov technique and impulsive control theory, sufficient criteria for pth moment exponential stability and mean square ultimate boundedness are derived, for two kinds of fBm driven delayed impulsive SDEs, respectively. As application, the obtained results are used to do practical synchronization w.r.t. a class of chaotic systems, in which the response system is perturbed by additive fBm noises. Finally, A Chua chaotic oscillator is given to verify the validity and applicability of the derived results.


AI ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 312-328
Author(s):  
Jayme Garcia Arnal Barbedo

Pest management is among the most important activities in a farm. Monitoring all different species visually may not be effective, especially in large properties. Accordingly, considerable research effort has been spent towards the development of effective ways to remotely monitor potential infestations. A growing number of solutions combine proximal digital images with machine learning techniques, but since species and conditions associated to each study vary considerably, it is difficult to draw a realistic picture of the actual state of the art on the subject. In this context, the objectives of this article are (1) to briefly describe some of the most relevant investigations on the subject of automatic pest detection using proximal digital images and machine learning; (2) to provide a unified overview of the research carried out so far, with special emphasis to research gaps that still linger; (3) to propose some possible targets for future research.


Sign in / Sign up

Export Citation Format

Share Document