Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System

    Zhiqing Dong1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1977-1993, 2024, DOI:10.32604/cmc.2024.047233

    Abstract With the advent of the information security era, it is necessary to guarantee the privacy, accuracy, and dependable transfer of pictures. This study presents a new approach to the encryption and compression of color images. It is predicated on 2D compressed sensing (CS) and the hyperchaotic system. First, an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security. Then, the processed images are concurrently encrypted and compressed using 2D CS. Among them, chaotic sequences replace traditional random measurement matrices to increase the system’s security. Third, the processed images are re-encrypted using a combination of… More >

  • Open Access

    ARTICLE

    Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine

    Arslan Akram1,2, Imran Khan1, Javed Rashid2,3, Mubbashar Saddique4,*, Muhammad Idrees4, Yazeed Yasin Ghadi5, Abdulmohsen Algarni6

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1311-1328, 2024, DOI:10.32604/cmc.2023.040512

    Abstract Algorithms for steganography are methods of hiding data transfers in media files. Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information, and these methods have made it feasible to handle a wide range of problems associated with image analysis. Images with little information or low payload are used by information embedding methods, but the goal of all contemporary research is to employ high-payload images for classification. To address the need for both low- and high-payload images, this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to… More >

  • Open Access

    ARTICLE

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    Raheem Ogla1,*, Eman Shakar Mahmood1, Rasha I. Ahmed1, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3075-3096, 2023, DOI:10.32604/cmc.2023.039818

    Abstract The transmission of video content over a network raises various issues relating to copyright authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a significant issue in the video industry, and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media. However, there are still many unresolved challenges. This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos, which can help prove the credibility of video content by detecting any fake objects inserted by hackers. The… More >

  • Open Access

    ARTICLE

    Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi

    Doaa Sami Khafaga1, Sarah M. Alhammad1,*, Amal Magdi2, Osama ElKomy2, Nabil A. Lashin2, Khalid M. Hosny2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1967-1986, 2023, DOI:10.32604/csse.2023.040345

    Abstract Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access. Due to the wide use of the Internet nowadays, the need to ensure data integrity and authentication increases. Many techniques, such as watermarking and encryption, are used for securing images transmitted via the Internet. The majority of watermarking systems are PC-based, but they are not very portable. Hardware-based watermarking methods need to be developed to accommodate real-time applications and provide portability. This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding with Contrast Enhancement Using Bi-histogram Shifting and Image Adjustment for Color Images

    Goma Tshivetta Christian Fersein Jorvialom1,2, Lord Amoah1,2,*

    Journal of Quantum Computing, Vol.4, No.3, pp. 183-197, 2022, DOI:10.32604/jqc.2022.039913

    Abstract Prior versions of reversible data hiding with contrast enhancement (RDHCE) algorithms strongly focused on enhancing the contrast of grayscale images. However, RDHCE has recently witnessed a rise in contrast enhancement algorithms concentrating on color images. This paper implies a method for color images that uses the RGB (red, green, and blue) color model and is based on bi-histogram shifting and image adjustment. Bi-histogram shifting is used to embed data and image adjustment to achieve contrast enhancement by adjusting the images resulting from each channel of the color images before combining them to generate the final enhanced image. Images are first… More >

  • Open Access

    ARTICLE

    An Optimized Implementation of a Novel Nonlinear Filter for Color Image Restoration

    Turki M. Alanazi*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1553-1568, 2023, DOI:10.32604/iasc.2023.039686

    Abstract Image processing is becoming more popular because images are being used increasingly in medical diagnosis, biometric monitoring, and character recognition. But these images are frequently contaminated with noise, which can corrupt subsequent image processing stages. Therefore, in this paper, we propose a novel nonlinear filter for removing “salt and pepper” impulsive noise from a complex color image. The new filter is called the Modified Vector Directional Filter (MVDF). The suggested method is based on the traditional Vector Directional Filter (VDF). However, before the candidate pixel is processed by the VDF, the MVDF employs a threshold and the neighboring pixels of… More >

  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor calculated by the standard deviation… More >

  • Open Access

    ARTICLE

    Simulated Annealing with Deep Learning Based Tongue Image Analysis for Heart Disease Diagnosis

    S. Sivasubramaniam*, S. P. Balamurugan

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 111-126, 2023, DOI:10.32604/iasc.2023.035199

    Abstract Tongue image analysis is an efficient and non-invasive technique to determine the internal organ condition of a patient in oriental medicine, for example, traditional Chinese medicine (TCM), Japanese traditional herbal medicine, and traditional Korean medicine (TKM). The diagnosis procedure is mainly based on the expert's knowledge depending upon the visual inspection comprising color, substance, coating, form, and motion of the tongue. But conventional tongue diagnosis has limitations since the procedure is inconsistent and subjective. Therefore, computer-aided tongue analyses have a greater potential to present objective and more consistent health assessments. This manuscript introduces a novel Simulated Annealing with Transfer Learning… More >

  • Open Access

    ARTICLE

    A Color Image Encryption Scheme Based on Singular Values and Chaos

    Adnan Malik1, Muhammad Ali1, Faisal S. Alsubaei2, Nisar Ahmed3,*, Harish Kumar4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 965-999, 2023, DOI:10.32604/cmes.2023.022493

    Abstract The security of digital images transmitted via the Internet or other public media is of the utmost importance. Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities. This study provides an approach to color image encryption that could find practical use in various contexts. The proposed method, which combines four chaotic systems, employs singular value decomposition and a chaotic sequence, making it both secure and compression-friendly. The unified average change intensity, the number of pixels’ change rate, information entropy analysis, correlation coefficient analysis,… More >

  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation. Furthermore, a… More >

Displaying 1-10 on page 1 of 31. Per Page