arnold transform
Recently Published Documents


TOTAL DOCUMENTS

171
(FIVE YEARS 51)

H-INDEX

19
(FIVE YEARS 3)

2021 ◽  
Vol 13 (2) ◽  
pp. 48-55
Author(s):  
Ledya Novamizanti ◽  
Irma Safitri ◽  
Hafizhan Bhamakerti Arindaka ◽  
Iwan Iwut Tritoasmoro

In telemedicine, data transmission in digital medical images and electronic medical records through the internet is vulnerable to various threats of theft and manipulation. Image watermarking is needed to provide authentication and security to medical images. This paper proposes an image watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and Discrete Cosine Transform (DCT) with watermark encryption using Arnold transform. First, the original host medical image was decomposed into four subbands using RDWT. Then, DCT is applied to the LH subband of the RDWT. On the other hand, the watermark is scrambled using Arnold transform to ensure identity security. The singular value of the watermarked image is obtained by modifying the singular value of the host image and the watermark. Tests were carried out on different medical images, namely X-ray, MRI, CT, and ultrasound, with a watermark in a proprietary logo. The host medical image is the same size as the watermark image. The result of this study can provide high authentication, imperceptibility and security in medical images, with an average PSNR value of 65.67 dB, SSIM 1, BER 0, NC 1. This scheme is resistant to JPEG compression, noise addition, filtering, image sharpening, image enhancement, geometric operations, motion blur, image sharpening, and histogram equalization.


Author(s):  
Chao Chen ◽  
Hongying Zhang ◽  
Bin Wu

In view of the problem of cracking easily and partial distortion of images after encryption or decryption, a novel image encryption and decryption algorithm based on Arnod Transform and fractional chaotic is proposed. To begin with, the Arnold transform is used to encrypt. So that the spatial confidence of the original image has been comprehensively disturbed. Secondly, the XOR involving the fractional order chaotic sequence is used to encrypt. The key sequence is dynamically generated to ensure the randomness and difference of key generation. When decryption is required, the first decryption is performed using the key and XOR. Then the second decryption is carried out by using the inverse Arnold transform, and finally the decrypted image is obtained. Experimental results show that the improved algorithm has achieved better performance in encryption and decryption.


Security plays a crucial role in the field of Social media network. Securing the data become one among the largest challenges in the present scenario. Whenever we expect concerning the cyber security, the primary issue that involves our mind is ‘cyber crimes’ that are increasing vastly day by day. Embedding secret message into the image (Steganography) is associated with art and science of secure data communication wherever the key information or confidential information is hidden in host file. It's employed incompletely different helpful applications like secure electronic communication, health care and military. Confidential information’s are unremarkably keep in digital media and transmitted via network cause of rapid growth of internet. In this paper, steganography techniques which might be used to safeguard the information from intruders. Here, Steganographic technique is used to hide multiple secret images into a single 24-bit cover image using Least Significant Bit (LSB) and dual steganography method. Multiple secret images are scrambled and encoded before hiding into cover image using Arnold Transform and Block Code Encoding. The Proposed technique is Block Code Encoding to convert Secret message to binary and bit pairs to form safer information. The main goals of proposed work offers security and high limit based steganography plan of concealing a massive size secret image into a bit size cover image, to enhance security using dual steganography, image quality and to reduce error.


Author(s):  
Pritom Adhikary ◽  
Amit Phadikar ◽  
Himadri Mandal ◽  
Prakash Kumar Singh

Author(s):  
Santhosh Voruganti

Internet has caused an extraordinary increase in the transfer and sharing of digital data like text, videos, images, audio, etc. over it. However, with the advent of modern access technology, multimedia data is more prone to security risks as data can be modified or redistributed without prior permission. Chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and colour images. Discrete cosine transform (DCT) is used before embedding the watermark in the host image. Arnold transform is used in addition to chaotic encryption to add double-layer security to the watermark. Three different variants of the proposed algorithm have been tested and analysed. The simulation results show that the proposed scheme is robust to most of the image processing operations like joint picture expert group compression, sharpening, cropping, and median filtering. To validate the efficiency of the proposed technique, the simulation results are compared with certain state-of-art techniques.


Sign in / Sign up

Export Citation Format

Share Document