image protection
Recently Published Documents


TOTAL DOCUMENTS

113
(FIVE YEARS 14)

H-INDEX

11
(FIVE YEARS 0)

Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3086
Author(s):  
Wenqiang Yang ◽  
Li Xiao ◽  
Junjian Huang ◽  
Jinyue Yang

This paper considers the fixed-time synchronization (FIXTS) of neural networks (NNs) by using quantized intermittent control (QIC). Based on QIC, a fixed-time controller is designed to ensure that the NNs achieve synchronization in finite time. With this controller, the settling time can be estimated regardless of initial conditions. After ensuring that the system has stabilized through this strategy, it is suitable for image protection given the behavior of the system. Meanwhile, the encryption effect of the image depends on the encryption algorithm, and the quality of the decrypted image depends on the synchronization error of NNs. The numerical results show that the designed controller is effective and validate the practical application of FIXTS of NNs in image protection.





Author(s):  
SangHee Nam ◽  
YoungDo Kim ◽  
JaeYoon Chang

본 연구의 목적은 사회경제적 지위(socio-economic status)가 채용장면에서 정직한 인상관리 책략(honest impression management tactics) 및 기만적 인상관리 책략(deceptive impression management tactics) 사용에 미치는 영향을 확인하고, 이 관계를 통제감(sense of control)이 매개하는지 살펴보는 것이다. 채용면접 경험이 있는 대학생 253명을 대상으로 정직한 인상관리에서는 자기홍보(self-promotion), 정직한 환심사기(honest ingratiation), 정직한 방어(honest defensive impression management)의, 기만적 인상관리에서는 가벼운 이미지 창조(slight image creation), 포괄적 이미지 창조(extensive image creation), 기만적 환심사기(deceptive ingratiation), 이미지 보호(image protection)의 총 7가지 책략에 대해 설문조사를 실시한 결과, 주관적 사회경제적 지위(subjective socio-economic status)는 정직한 인상관리 책략 중 자기홍보 및 정직한 방어를 정적으로 예측하였으며, 이 관계를 통제감이 매개하였다. 하지만 주관적 사회경제적 지위는 정직한 환심사기 및 기만적 인상관리 책략과는 통계적으로 유의한 관계를 보이지 않았다. 객관적 사회경제적 지위(objective socio-economic status)가 높을수록 통제감이 높았으나, 정직한 인상관리 책략 및 기만적 인상관리 책략 중 어떤 것과도 통계적으로 유의한 관련을 가지지 않았다. 본 연구는 사회경제적 지위에 따라 구직자들의 행동에 차이가 나타난다는 것을 보여줌으로써, 채용 장면에서 사회경제적 지위를 고려할 필요성을 보여주었다는 측면에서 의의가 있으며, 그 기제로 통제감의 역할을 밝힘으로써 사회경제적 지위의 효과를 설명할 수 있는 기초 자료를 제공하였다는 점에서 의의가 있다.



2021 ◽  
Author(s):  
Praveen Kumar Mannepalli ◽  
Vineet Richhariya ◽  
Susheel Kumar Gupta ◽  
Piyush Kumar Shukla ◽  
Pushan Kumar Dutta

Abstract Image protection is essential part of the scientific community today. The invisible watermark is widely being used in past to secure the medical imaging data from copyright protection. In this paper novel hybrid combination of the invisible image watermarking and the Blockchain based encryption is proposed to design. The watermarking is implemented using edge detection (ED) of discrete wavelet transform (DWT) coefficient. The medical image is decomposed using L level DWT transform to generate multi-resolution coefficients. The edge detection is applied to HH wavelet band to generate the edge coefficients. To improve robustness difference of dilation and edge coefficient are used for watermark embedding. The watermark image is encrypted using Blockchain based hash algorithm for medical images. Then at the decoding end first decryption is achieved and then image is reconstructed. The results are sequentially presented for both stages. The PSNR performance is compared with additional level of security.



2021 ◽  
Author(s):  
Jiankun Gong ◽  
Kwan-Hoon Ng ◽  
David Yoong ◽  
jinghong Xu

BACKGROUND On April 13, 2021, the Japanese government announced releasing its radiated Fukushima wastewater into the Pacific Ocean as they are running out of storage space. Despite fierce opposition by neighboring China and South Korea, Japan has downplayed ecological and health risks possibilities. Extant literature indicates that when a message is disseminated, what matters most is not what is said but how it is said. Thus, this research examines how these countries' governments present their arguments, as propagated through their mainstream newspapers. Examining how these ideas are framed in news media enables us to explain how public beliefs are shaped and manipulated. OBJECTIVE The goal of this study is twofold: to identify the salient frames and themes of communicating Fukushima wastewater risk in three mainstream newspapers. It hopes to avoid risk amplification, enticing readers to "read between the lines", activating their ideological repertoire. Also, it aims to increase critical literacy skills among readers, and improve public health. METHODS A total of 88 news articles from January 1, 2021, to May 31, 2021, were collected from the LexisNexis database using the keywords: "Fukushima" and "nuclear": The Japan Times (TJT) 35, China Daily (CD) 34, and The Korea Herald (TKH) 19. Open-coding and thematic analysis were conducted. The coded themes were then further sorted into broader categories based on the news framing analytical framework. RESULTS Divergent frames and themes emerged in selected newspapers. TJT was of self-defence, with image protection and counter-blaming frames. In contrast, CD and TKH displayed commonalities regarding the decision, such as being irresponsible, lacking transparency, and blaming Japan and economic concern. CONCLUSIONS This study timely mapped out Japan's wastewater decision coverage in the neighboring countries’ leading newspapers. Our results indicated that the Japanese risk communication of Fukushima wastewater still lacks full consideration of open communication channels, geopolitics, and public health. This could shape not only public perception, amplify risk but also increase geopolitical distrusts and community tensions. Instead, the Japanese government should heed the news frames of its neighbors and address the fears and concerns raised. It reminded relevant policymakers to accentuate geopolitics and multilateral agreements. Also, it served as a reminder for media practitioners and journalists to report news constructively and with accountability.



2021 ◽  
Author(s):  
Anthony Vincent B ◽  
Cecil Donald A ◽  
B J Hubert Shanthan ◽  
Ankur Singh Bist ◽  
Haider mehraj ◽  
...  

Abstract The advent of the Internet of Things (IoT) is to transform the health care sector and lead to the development of the Internet of Health Things (IoHT). This technology exceeds existing human services mechanically, financially, and socially. This paper used an advanced cryptographic framework that includes optimization strategies to look at IoHT medical image protection. The patient data kept on a cloud server which was detected and sensed from the IoHT Healthcare devices. It's critical to ensure the safety and privacy of patient clinical images in the cloud; here, an enhanced security framework for health information promotes trust. Next, we presented health care providers who could provide the full range of medical facilities for IoHT participants. In the process of encrypting/decrypting elliptical curves, the optimal key is selected using the Grasshopper Particle Swarm Optimization (GOPSO) to increase the security standard of medical images. Medical images are protected within IoHT by using this approach.The implementation results were analyzed and compared with a variety of encryption algorithms and their optimization techniques. The effectiveness of the proposed methods and the results show that the medical image is secure and prevents attacks in IoHT-based health care systems.



2021 ◽  
Author(s):  
Li Qi ◽  
Wang Xingyuan ◽  
Wang He ◽  
Ye Xiaolin ◽  
Zhou Shuang ◽  
...  
Keyword(s):  


2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
Zhuo Liu ◽  
Yong Wang ◽  
Leo Yu Zhang ◽  
Jun Ma

The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original two-dimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.



2021 ◽  
Vol 12 ◽  
Author(s):  
Xianglian Xue ◽  
Haiyan Jin ◽  
Dongsheng Zhou ◽  
Changjun Zhou

Current image encryption algorithms have various deficiencies in effectively protecting medical images with large storage capacity and high pixel correlation. This article proposed a new image protection algorithm based on the deoxyribonucleic acid chain of dynamic length, which achieved image encryption by DNA dynamic coding, generation of DNA dynamic chain, and dynamic operation of row chain and column chain. First, the original image is encoded dynamically according to the binary bit from a pixel, and the DNA sequence matrix is scrambled. Second, DNA sequence matrices are dynamically segmented into DNA chains of different lengths. After that, row and column deletion operation and transposition operation of DNA dynamic chain are carried out, respectively, which made DNA chain matrix double shuffle. Finally, the encrypted image is got after recombining DNA chains of different lengths. The proposed algorithm was tested on a list of medical images. Results showed that the proposed algorithm showed excellent security performance, and it is immune to noise attack, occlusion attack, and all common cryptographic attacks.



Sign in / Sign up

Export Citation Format

Share Document