𝔖 Scriptorium
✦   LIBER   ✦

📁

Recent Advanced in Image Security Technologies: Intelligent Image, Signal, and Video Processing

✍ Scribed by Hang Chen, Zhengjun Liu


Publisher
Springer
Year
2023
Tongue
English
Leaves
195
Series
Studies in Computational Intelligence, 1079
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides the readers with a comprehensive overview of principles methodologies and recent advances in image, signal, and video processing using different system. This book is used as the handbook of postgraduates course, such as image processing, signal processing, and optical information security.

✦ Table of Contents


Preface
Contents
Optical Information Cryptosystems Based on Structured Phase Encoding
1 Introduction
2 Structured Phase Mask
2.1 Radial Hilbert Phase Mask
2.2 Fresnel Zone Plate Phase Mask
2.3 Spiral Zone Plate Phase Mask
2.4 Chaotic Spiral Zone Plate Phase Mask
3 Gyrator Transform
4 Optical Information Cryptosystem Using Structured Phase Encoding
4.1 Optical Information Cryptosystem Using Radial Hilbert Phase Mask in Gyrator Transform Domain
4.2 Optical Information Cryptosystem Using Fresnel Zone Plate Phase Mask in Gyrator Transform Domain
4.3 Asymmetric Information Cryptosystem Based on Spiral Zone Plate Phase Mask and Optical Interference Principle
4.4 Asymmetric Multiple Information Cryptosystem Based on Chaotic Spiral Phase Mask and Random Spectrum Decomposition
5 General Conclusions
References
Encryption/Decryption with Optical Transform
1 Introduction
2 Optical Image Encryption by Using eFrFT
2.1 Optical Encryption Scheme
2.2 Numerical Simulation
3 Image Encryption by Using Phase-Only Encoding
3.1 Phase Encoding
3.2 Proposed Encryption System
3.3 Numerical Simulation
4 Phase-Amplitude Retrieval in Gyrator Domains
4.1 Optical System and Phase Retrieval Scheme
4.2 Analysis and Discussion
5 Phase-Only Encoding in Fresnel Domains
5.1 Optical System and Scheme of Attack on DRPE
5.2 Numerical Result and Discussion
6 General Conclusions
References
Optical Cryptosystems Based on Spiral Phase Modulation
1 Introduction
2 Spiral Phase Transform (SPT)
3 Optical Cryptosystems Based Spiral Phase Modulation
3.1 Nonlinear Optical Cryptosystem Based on SPT in Fresnel Domain
3.2 Multiuser Optical Authentication Using Photon Counting in SPT Domain
3.3 Optical Cryptosystem for Color Image Encryption Based on SPT and Chaotic Pixel Scrambling
4 Concluding Remarks
References
Image Cryptosystem for Different Kinds of Image by Using Improved Arnold Map
1 Introduction
2 Three Kinds of Improved Arnold Maps
2.1 Modified Arnold Mapping Model with Variable Parameters (M-Arnold)
2.2 LFSR-Cascaded Arnold Diffusion Model (LFSR-CADM)
2.3 Block Mobile Model of 3D Arnold Map (BMM)
2.4 Triangular Association Encryption Model (TAEM)
3 Optical Cryptosystem Based on Arnold Map and Improved Transformations in Gyrator Domains
3.1 An Image Encryption and Hiding Algorithm Based on M-Arnold Model in Gyrator Domains
3.2 Securing Color Image by Using Bit-Level LFSR-Cascaded Arnold Diffusion Model (LFSR-CADM) in Gyrator Domains
3.3 A Novel Signature and Authentication Cryptosystem for Hyperspectral Data by Using Triangular Association Encryption Algorithm in Gyrator Domains
4 General Conclusions
References
Image Encryption Using a Chaotic/Hyperchaotic Multidimensional Discrete System
1 Introduction
2 Multidimensional Chaotic Discrete System
2.1 Mathematical Description of the 4-D Map
2.2 Dynamical Behaviors of the 4-D System
3 Algorithm for Colour Image Encryption
4 Performance Analysis
4.1 Key Space Analysis
4.2 Histograms Analysis
4.3 Correlation
4.4 Resistance to the Differential Attack
4.5 Cropping Attack Test
4.6 Entropy Information Analysis
4.7 Noise Resistance Test
4.8 Complexity
5 Conclusion
References
Video Cryptosystem Using Chaotic Systems
1 Introduction
2 State of the Art in Video Security Methods
2.1 Complete Security Algorithms
2.2 Selective Encryption Algorithms
3 Proposed Chaos-Based Video Cryptosystem
3.1 Chaotic Keys Generator
3.2 Encryption/Decryption Algorithm
4 Performances Evaluation
4.1 Assessing Video Quality Degradation
4.2 Security Analysis
4.3 Temporal Performances
5 Synthesis
6 Conclusion
References
Neural Network Image Restoration Techniques
1 Introduction
2 Description of Image Restoration
3 Evaluation of Image Restoration
4 Neural Network Image Restoration
4.1 Energy Functions
4.2 Suboptimal Algorithm of Continuous Hopfield Neural Network
4.3 Continuous Hopfield Neural Network Suboptimal Restoration Algorithm Based on Harmonic Model
4.4 Adaptive CHNN Suboptimal Restoration Algorithm Based on Reconciliation Model
5 Conclusions
References


📜 SIMILAR VOLUMES


Recent Advances in Intelligent Image Sea
✍ Chengjun Liu (eds.) 📂 Library 📅 2017 🏛 Springer International Publishing 🌐 English

<p><p>This book initially reviews the major feature representation and extraction methods and effective learning and recognition approaches, which have broad applications in the context of intelligent image search and video retrieval. It subsequently presents novel methods, such as improved soft ass

Recent Trends in Signal and Image Proces
✍ Siddhartha Bhattacharyya (editor), Leo Mršić (editor), Maja Brkljačić (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book gathers selected papers presented at the Third International Symposium on Signal and Image Processing (ISSIP 2020), organized by the Department of Information Technology, RCC Institute of Information Technology, Kolkata, during March 18–19, 2020. It presents fascinating, state-of-the

Recent Trends in Signal and Image Proces
✍ Siddhartha Bhattacharyya, Anirban Mukherjee, Hrishikesh Bhaumik, Swagatam Das, K 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p>This book contains interesting findings of some state-of-the-art research in the field of signal and image processing. It contains twenty one chapters covering a wide range of signal processing applications involving filtering, encoding, classification, segmentation, clustering, feature extractio