An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy
Chunyun Xu,
No information about this author
Yubao Shang,
No information about this author
Yongwei Yang
No information about this author
et al.
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: Jan. 22, 2025
The
continuous
evolution
of
information
technology
underscores
the
growing
emphasis
on
data
security.
In
realm
medical
imaging,
various
diagnostic
images
represent
privacy
individuals,
and
potential
repercussions
their
unauthorized
disclosure
are
substantial.
Therefore,
this
study
introduces
a
novel
chaotic
system
(TLCMCML)
employs
it
to
propose
multi-image
image
encryption
algorithm.
To
simultaneously
augment
security
optimize
efficiency,
we
undertake
dual-pronged
approach.
Firstly,
identify
regions
interest
(ROIs)
within
individual
images,
subsequently
applying
an
independent
scrambling
technique
based
odd-even
interleaving
configuration.
Secondly,
integrate
all
through
horizontal
concatenation,
forming
comprehensive
large-scale
image,
upon
which
implement
synchronized
bit-level
permutation-diffusion
mechanism.
Following
extensive
testing,
enhancements
were
verified
across
metrics
including
entropy
analysis,
adjacent
pixel
correlation
examination,
differential
attack
simulations,
robustness
assessments,
thereby
attesting
exceptional
efficacy
proposed
Language: Английский
Mapping model based on invertible networks for image hiding
Signal Image and Video Processing,
Journal Year:
2025,
Volume and Issue:
19(3)
Published: Jan. 28, 2025
Language: Английский
Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images
Riadh Bouarroudj,
No information about this author
Feryel Souami,
No information about this author
Fatma Zohra Bellala
No information about this author
et al.
Computers & Electrical Engineering,
Journal Year:
2025,
Volume and Issue:
123, P. 110072 - 110072
Published: Jan. 29, 2025
Language: Английский
RFDB: Robust watermarking scheme with Fuzzy-DnCNN using blockchain technique for identity verification
Expert Systems with Applications,
Journal Year:
2024,
Volume and Issue:
255, P. 124554 - 124554
Published: June 25, 2024
Language: Английский
ZWNet: DarkNet53-based zero watermarking method for authentication of medical images inspired by Fibonacci Q-matrix and stationary wavelet transform
Biomedical Signal Processing and Control,
Journal Year:
2024,
Volume and Issue:
100, P. 107044 - 107044
Published: Oct. 19, 2024
Language: Английский
Secure and Robust Dual Watermarking for Western Blot Images
IETE Journal of Research,
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 12
Published: Oct. 22, 2024
The
rapid
growth
of
digital
data
sharing
has
created
a
pressing
need
to
safeguard
the
integrity,
authenticity,
and
security
bioanalytical
images,
such
as
Western
blots,
online.
To
address
this
challenge,
we
propose
novel
hybrid
biometric
watermarking
technique
that
combines
randomised
singular
value
decomposition
(RSVD),
discrete
wavelet
transform
(DWT),
schur
transform,
pseudo
magic
cube,
chaotic
encryption,
making
blot
images
more
secure,
robust,
imperceptible.
Our
approach
surpasses
state-of-the-art
methods,
ensuring
imperceptible
robust
protection
against
tampering
unauthorised
use.
By
integrating
spatial
transform-domain
techniques,
achieve
superior
performance,
outperforming
existing
methods
with
peak
signal-to-noise
ratio
(PSNR)
48.7581,
structural
similarity
index
(SSIM)
0.9998,
normalised
correlation
(NC)
0.9996,
an
average
number
changing
pixel
rate
(NPCR)
0.9961,
unified
intensity
(UACI)
0.3334.
sets
new
standard
for
image
in
scientific
research,
addressing
critical
challenges
tampering,
copyright
protection,
security.
With
its
high
performance
security,
our
enables
trustworthy
publication
era.
Language: Английский
An adaptive robust watermarking scheme based on chaotic mapping
Yumin Dong,
No information about this author
Rui Yan,
No information about this author
Chenhao Yin
No information about this author
et al.
Scientific Reports,
Journal Year:
2024,
Volume and Issue:
14(1)
Published: Oct. 21, 2024
Digital
images
have
become
an
important
way
of
transmitting
information,
and
the
risk
attacks
during
transmission
is
increasing.
Image
watermarking
technical
means
protecting
image
information
security
plays
role
in
field
security.
In
technology,
achieving
a
balance
between
imperceptibility,
robustness,
embedding
capacity
key
issue.
To
address
this
issue,
paper
proposes
high-capacity
color
adaptive
scheme
based
on
discrete
wavelet
transform
(DWT),
Heisenberg
decomposition
(HD),
singular
value
(SVD).
order
to
enhance
watermark,
Logistic
chaotic
mapping
was
used
encrypt
watermark
image.
By
adaptively
calculating
factor
through
entropy
cover
image,
then
combining
it
with
Alpha
blending
embedded
into
Y
component
YCbCr
space
imperceptibility
algorithm.
addition,
robustness
algorithm
further
improved
correction
methods.
The
experimental
results
show
that
average
PSNR
SSIM
are
45.3437dB
0.9987,
respectively.
When
facing
various
attacks,
NCC
extracted
reaches
above
0.95,
indicating
good
robustness.
0.6667bpp,
which
higher
than
other
schemes,
running
time
1.1136
seconds,
better
most
schemes.
Language: Английский
Design and Implementation of Image Acquisition and Signal Transmission Functions based on FPGA
Journal of Physics Conference Series,
Journal Year:
2024,
Volume and Issue:
2872(1), P. 012050 - 012050
Published: Oct. 1, 2024
Abstract
In
recent
years,
video
network
monitoring
systems
have
evolved
rapidly,
from
the
first
generation
of
digital-analogue
to
fully
IP-based
systems.
Based
on
FPGA
core,
this
design
focuses
image
acquisition
and
information
transmission.
The
expansion
board
contains
several
peripheral
modules,
including
OV7670
camera
captures
images,
DRAM
stores
data,
FIFO
handles
cross-clock
domain
signal
While
reference
clock
is
40ns,
in
system,
period
20ns,
making
two
cycles
equal
one
cycle.
Then,
counters
are
used,
another
line
synchronization
(cnt1)
count
800
per
line.
end
a
indicated
by
end_cnt0,
data
stored
SDRAM.
Configuring
VGA
display
driver
allows
be
transmitted
displayed
screen.
system
features
simple
structure,
high
resource
utilization,
strong
reliability.
Language: Английский