scispace - formally typeset
Search or ask a question
Journal ArticleDOI

An Efficient Image Cryptographic Algorithm based on Frequency Domain using Haar Wavelet Transform

TL;DR: An efficient lossless image cryptographic algorithm to transmit pictorial data securely and some parametric tests show that the proposed work is resilient and robust in the field of cryptography.
Abstract: Presently a number of techniques are used to restrict confidential image data from unauthorized access. In this paper, the authors have proposed an efficient lossless image cryptographic algorithm to transmit pictorial data securely. Initially we take a 64 bit key, we convert our decimal pixel value into binary 8 bits and we XOR the first 8 bits of the key with the pixel value. After that we take the next 8 bits of the key and XOR with the next pixel value. We perform the circular right shit operation when the key gets exhausted. We perform the first level haar wavelet decomposition thereafter. Dividing the LL1 into four equal sections we perform some swapping operations. Decryption follows the reverse of the encryption .Evaluation is done by some parametric tests which includes correlation analysis, NPCR, UACI readings etc. show that the proposed work is resilient and robust in the field of cryptography.
Citations
More filters
Book ChapterDOI
01 Jan 2018
TL;DR: The main goal of this chapter is to give a comprehensive study of multiobjective optimization techniques in biomedical image analysis problem that consolidated some of the recent works along with future directions.
Abstract: Multiobjective optimization methods in image analysis are one of the active research domains in the current years. These methods are used for the decision-making process in case of image segmentation. Multiobjective techniques are popular and suitable model for many difficult optimization problems. In various practical problems, different objectives are to be considered. Now, most of the problems have some objectives those are conflicting in nature. Hence, only one objective cannot be optimized or prioritize because it can result in some adverse effect on other objective, and can produce some undesired results in terms of the other objectives. The main goal of this chapter is to give a comprehensive study of multiobjective optimization techniques in biomedical image analysis problem. The different models are categorized depending on the relevant features. For example, the different aspects of the optimization methods employed, different formulations of the problems, categories of data, and the domain of the application. This study mainly focuses on the multiobjective optimization techniques that can be used to analyze digital images specially biomedical images. Here, some of the problems, and challenges related to images are diagnosed and analyzed with multiple objectives. It is a comprehensive study that consolidated some of the recent works along with future directions.

28 citations

Book ChapterDOI
01 Jan 2020
TL;DR: In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented and can be helpful for the researchers to understand the recent developments and drawbacks of the present systems.
Abstract: Biomedical image analysis methods are gradually shifting towards computer-aided solutions from manual investigations to save time and improve the quality of the diagnosis. Deep learning-assisted biomedical image analysis is one of the major and active research areas. Several researchers are working in this domain because deep learning-assisted computer-aided diagnostic solutions are well known for their efficiency. In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented. This chapter can be helpful for the researchers to understand the recent developments and drawbacks of the present systems. The discussion is made from the perspective of the computer vision, pattern recognition, and artificial intelligence. This chapter can help to get future research directions to exploit the blessings of deep learning techniques for biomedical image analysis.

28 citations

Proceedings ArticleDOI
01 Feb 2019
TL;DR: A contrast optimization method based on well-known metaheuristic technique called genetic algorithm with elitism is used that can enhance the biomedical images for better analysis that can illustrate the efficiency of the proposed algorithm.
Abstract: Biomedical image analysis is one of the most challenging and inevitable part of the computer aided diagnostic systems. Automated analysis of the image can detect various diseases automatically without human intervention. Computer vision and artificial intelligence can sometimes defeat human diagnostic power and can reveal some hidden information from the biomedical images. In the field of health care, accurate results are highly required within stipulated amount of time. But to increase accuracy, proper preprocessing with sophisticated algorithms is required. Low quality image can affect processing algorithm which can leads to the poor result. Therefore, sophisticated preprocessing methods are required to get reliable results. Contrast is one of the most important parameter for any image. Poor contrast may cause several problems for computer vision algorithms. Conventional algorithms for contrast adjustment may not be suitable for many purposes. Sometimes, these methods can generate some images that may lose some critical information. In this work, a contrast optimization method based on well-known metaheuristic technique called genetic algorithm with elitism is used that can enhance the biomedical images for better analysis. A new kernel has been proposed to detect the edges. Obtained results illustrate the efficiency of the proposed algorithm.

26 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: In this work, some of the methods have been reported which can be helpful in analyzing some practical problem by employing a suitable technique.
Abstract: Cellular image analysis is considered one of the important job in biomedical image analysis. Analysis of cellular images obtained using a microscope is necessary in various disciplines including engineering and medical imaging. Cell detection is necessary in various jobs of microscopic analysis that helps physicians to diagnose and extract features. Accurate identification of cells is necessary for precise diagnosis. Analysis methods based on morphology is one of the major research area and also useful in biomedical image analysis as well as in bioinformatics. Morphology based analysis acts as the helping hand for physicians. Morphology based analysis methods are useful in determining cell shape, irregularity, feature extraction and classification. In this work, some of the methods have been reported which can be helpful in analyzing some practical problem by employing a suitable technique.

25 citations

Book ChapterDOI
01 Jan 2020
TL;DR: This chapter proposes a new filter (kernel), and the compass operator is applied on it to detect edges more efficiently, and the results are compared with some of the previously proposed filters both qualitatively and quantitatively.
Abstract: Image segmentation has been an active topic of research for many years. Edges characterize boundaries, and therefore, detection of edges is a problem of fundamental importance in image processing. Edge detection in images significantly reduces the amount of data and filters out useless information while preserving the important structural properties in an image. Edges carry significant information about the image structure and shape, which is useful in various applications related with computer vision. In many applications, the edge detection is used as a pre-processing step. Edge detection is highly beneficial in automated cell counting, structural analysis of the image, automated object detection, shape analysis, optical character recognition, etc. Different filters are developed to find the gradients and detect edges. In this chapter, a new filter (kernel) is proposed, and the compass operator is applied on it to detect edges more efficiently. The results are compared with some of the previously proposed filters both qualitatively and quantitatively.

24 citations

References
More filters
Book
19 Dec 2003
TL;DR: In this article, the MPEG-4 and H.264 standards are discussed and an overview of the technologies involved in their development is presented. But the focus is on the performance and not the technical aspects.
Abstract: About the Author.Foreword.Preface.Glossary.1. Introduction.2. Video Formats and Quality.3. Video Coding Concepts.4. The MPEG-4 and H.264 Standards.5. MPEG-4 Visual.6. H.264/MPEG-4 Part 10.7. Design and Performance.8. Applications and Directions.Bibliography.Index.

2,491 citations

Proceedings ArticleDOI
01 Feb 1997
TL;DR: One of the methods is almost as e@cient as the existing video encoding and decoding process while providing considerable level of security without affeciing the quality of images when decrypted, and based on the wideiy used JPEG and MPEG standards.
Abstract: Mu!timedta data security is very important for rrtultimedia commerce on the Internet such as video-ondemand and rea!-time video mu[ticast. Howeverl traditional cryptographic algor’zthms for data secrecy such as DES are not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints required by the multimedia applications. How to incorporate cryptographic technology with digital image processing technology to provide multimedia security does not seem to be considered in the previous literatures. The main contribution of this paper is the idea of incorporating cryptographic techniques (random algorithms) wath digata[ amage processing techniques (image compression algorithms) to achieve compression (decompression) and encryption (decryption) in one step. One of our methods is almost as e@cient as the existing video encoding and decoding process while providing considerable level of security without affeciing the quality of images when decrypted. Our methods are also adjustable to provide diflerent levels of security for different requirements of the multimedia applications. Our methods are based on the wideiy used JPEG and MPEG standards. We also conduct a series of experimental studies to test and evaluate our algorithms.

443 citations


"An Efficient Image Cryptographic Al..." refers methods in this paper

  • ...Tang [2] proposed the zigzag permutation method applied on the transformed block obtained by the result of the discrete cosine transform....

    [...]

Journal ArticleDOI
TL;DR: The proposed method combined with four differential chaotic systems and pixel shuffling can fully banish the outlines of the original image, disorders the distributive characteristics of RGB levels, and dramatically decreases the probability of exhaustive attacks.

296 citations


"An Efficient Image Cryptographic Al..." refers background in this paper

  • ...Test Image Proposed Tedmori and Najdawi [5] Ye [6] Sethi and Sharma [7] Huang and Nien [8] NPC R% UA CI% NPCR % UAC I% NPC R% UA CI% NPCR % UACI% NPCR % UACI%...

    [...]

  • ...Test Image Proposed Tedmori and Najdawi [5] Samsom and Sastry [4] Sethi and Sharma [7] Huang and Nien [8] O-D O-E O-D O-E O-D O-E O-D O-E O-D O-E...

    [...]

Journal ArticleDOI
Ruisong Ye1
TL;DR: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the gray values ofimage pixels to confuse the relationship between cipher-image and plain-image, which can resist statistical attack, differential attack, known-plaintext as well as chosen-plain Text attack.

201 citations


"An Efficient Image Cryptographic Al..." refers background or methods in this paper

  • ...NPCR and UACI can be defined using Equation 7 and Equation 8 respectively [6]....

    [...]

  • ...Test Image Proposed Tedmori and Najdawi [5] Ye [6] Sethi and Sharma [7] Huang and Nien [8] NPC R% UA CI% NPCR % UAC I% NPC R% UA CI% NPCR % UACI% NPCR % UACI%...

    [...]

Journal ArticleDOI
TL;DR: A triple image encryption scheme by use of fractional Fourier transform is proposed, a multiple image algorithm is expanded and designed and all information of images is preserved in theory when image are decrypted with correct key.

86 citations


"An Efficient Image Cryptographic Al..." refers methods in this paper

  • ...[3], proposed a triple image encryption method using Fractional Fourier Transform....

    [...]

  • ...Correlation coefficients are calculated for the selected pairs using Equation 1 [3]....

    [...]