Design and Implementation of Image Acquisition and Signal Transmission Functions based on FPGA DOI Open Access
Lifeng Li, Hui Zhang, Hongying Zhang

et al.

Journal of Physics Conference Series, Journal Year: 2024, Volume and Issue: 2872(1), P. 012050 - 012050

Published: Oct. 1, 2024

Abstract In recent years, video network monitoring systems have evolved rapidly, from the first generation of digital-analogue to fully IP-based systems. Based on FPGA core, this design focuses image acquisition and information transmission. The expansion board contains several peripheral modules, including OV7670 camera captures images, DRAM stores data, FIFO handles cross-clock domain signal While reference clock is 40ns, in system, period 20ns, making two cycles equal one cycle. Then, counters are used, another line synchronization (cnt1) count 800 per line. end a indicated by end_cnt0, data stored SDRAM. Configuring VGA display driver allows be transmitted displayed screen. system features simple structure, high resource utilization, strong reliability.

Language: Английский

An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy DOI Creative Commons

Chunyun Xu,

Yubao Shang,

Yongwei Yang

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: Jan. 22, 2025

The continuous evolution of information technology underscores the growing emphasis on data security. In realm medical imaging, various diagnostic images represent privacy individuals, and potential repercussions their unauthorized disclosure are substantial. Therefore, this study introduces a novel chaotic system (TLCMCML) employs it to propose multi-image image encryption algorithm. To simultaneously augment security optimize efficiency, we undertake dual-pronged approach. Firstly, identify regions interest (ROIs) within individual images, subsequently applying an independent scrambling technique based odd-even interleaving configuration. Secondly, integrate all through horizontal concatenation, forming comprehensive large-scale image, upon which implement synchronized bit-level permutation-diffusion mechanism. Following extensive testing, enhancements were verified across metrics including entropy analysis, adjacent pixel correlation examination, differential attack simulations, robustness assessments, thereby attesting exceptional efficacy proposed

Language: Английский

Citations

1

Mapping model based on invertible networks for image hiding DOI
Yuwei Wang, Zhao Yan, Liang Han

et al.

Signal Image and Video Processing, Journal Year: 2025, Volume and Issue: 19(3)

Published: Jan. 28, 2025

Language: Английский

Citations

1

Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images DOI
Riadh Bouarroudj,

Feryel Souami,

Fatma Zohra Bellala

et al.

Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 123, P. 110072 - 110072

Published: Jan. 29, 2025

Language: Английский

Citations

1

RFDB: Robust watermarking scheme with Fuzzy-DnCNN using blockchain technique for identity verification DOI
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava

et al.

Expert Systems with Applications, Journal Year: 2024, Volume and Issue: 255, P. 124554 - 124554

Published: June 25, 2024

Language: Английский

Citations

4

ZWNet: DarkNet53-based zero watermarking method for authentication of medical images inspired by Fibonacci Q-matrix and stationary wavelet transform DOI
Mostafa M. Abdel-Aziz, Nabil A. Lashin, Hanaa M. Hamza

et al.

Biomedical Signal Processing and Control, Journal Year: 2024, Volume and Issue: 100, P. 107044 - 107044

Published: Oct. 19, 2024

Language: Английский

Citations

2

Secure and Robust Dual Watermarking for Western Blot Images DOI
Harendra Singh, Maroti Deshmukh, Lalit Kumar Awasthi

et al.

IETE Journal of Research, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 12

Published: Oct. 22, 2024

The rapid growth of digital data sharing has created a pressing need to safeguard the integrity, authenticity, and security bioanalytical images, such as Western blots, online. To address this challenge, we propose novel hybrid biometric watermarking technique that combines randomised singular value decomposition (RSVD), discrete wavelet transform (DWT), schur transform, pseudo magic cube, chaotic encryption, making blot images more secure, robust, imperceptible. Our approach surpasses state-of-the-art methods, ensuring imperceptible robust protection against tampering unauthorised use. By integrating spatial transform-domain techniques, achieve superior performance, outperforming existing methods with peak signal-to-noise ratio (PSNR) 48.7581, structural similarity index (SSIM) 0.9998, normalised correlation (NC) 0.9996, an average number changing pixel rate (NPCR) 0.9961, unified intensity (UACI) 0.3334. sets new standard for image in scientific research, addressing critical challenges tampering, copyright protection, security. With its high performance security, our enables trustworthy publication era.

Language: Английский

Citations

2

An adaptive robust watermarking scheme based on chaotic mapping DOI Creative Commons
Yumin Dong, Rui Yan,

Chenhao Yin

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Oct. 21, 2024

Digital images have become an important way of transmitting information, and the risk attacks during transmission is increasing. Image watermarking technical means protecting image information security plays role in field security. In technology, achieving a balance between imperceptibility, robustness, embedding capacity key issue. To address this issue, paper proposes high-capacity color adaptive scheme based on discrete wavelet transform (DWT), Heisenberg decomposition (HD), singular value (SVD). order to enhance watermark, Logistic chaotic mapping was used encrypt watermark image. By adaptively calculating factor through entropy cover image, then combining it with Alpha blending embedded into Y component YCbCr space imperceptibility algorithm. addition, robustness algorithm further improved correction methods. The experimental results show that average PSNR SSIM are 45.3437dB 0.9987, respectively. When facing various attacks, NCC extracted reaches above 0.95, indicating good robustness. 0.6667bpp, which higher than other schemes, running time 1.1136 seconds, better most schemes.

Language: Английский

Citations

1

Design and Implementation of Image Acquisition and Signal Transmission Functions based on FPGA DOI Open Access
Lifeng Li, Hui Zhang, Hongying Zhang

et al.

Journal of Physics Conference Series, Journal Year: 2024, Volume and Issue: 2872(1), P. 012050 - 012050

Published: Oct. 1, 2024

Abstract In recent years, video network monitoring systems have evolved rapidly, from the first generation of digital-analogue to fully IP-based systems. Based on FPGA core, this design focuses image acquisition and information transmission. The expansion board contains several peripheral modules, including OV7670 camera captures images, DRAM stores data, FIFO handles cross-clock domain signal While reference clock is 40ns, in system, period 20ns, making two cycles equal one cycle. Then, counters are used, another line synchronization (cnt1) count 800 per line. end a indicated by end_cnt0, data stored SDRAM. Configuring VGA display driver allows be transmitted displayed screen. system features simple structure, high resource utilization, strong reliability.

Language: Английский

Citations

0