Search scope:
排序: Display mode:
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Research Articles
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1900709
Keywords: 分数阶离散系统;神经网络;DNA加密;彩色图像加密
A two-stage parametric subspace model for efficient contrast-preserving decolorization Article
Hong-yang LU, Qie-gen LIU, Yu-hao WANG, Xiao-hua DENG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1874-1882 doi: 10.1631/FITEE.1600017
Keywords: Color-to-gray conversion Subspace modeling Two-order polynomial model Gradient correlation similarity Discrete searching
Discrete fractional watermark technique Correspondence
Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.2000133
Keywords: 离散分数阶微积分;图像加密;水印
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7, Pages 1045-1061 doi: 10.1631/FITEE.2200372
Keywords: Color medical image Quaternion Adaptive watermarking Encryption Fractional transform Three-dimensional chaotic logistic map (3D-CLM)
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 940-956 doi: 10.1631/FITEE.2000071
Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗
Wang Anquan,Cheng Xiaofang,Lu Shaosong
Strategic Study of CAE 2002, Volume 4, Issue 8, Pages 54-57
The principle of primary-color method for temperature measurement is firstly introduced in this article. Based on the lineal model of spectral emissivity in the range of visible spectrum, the formulation of radiative chrominance of real bodies is put forward. Afterwards, it's made clear that two temperature solutions can be derived from one specific chrominance at most. The radiative color gamut is determined and divided into two components, the single-solution gamut and the dual-solution gamut.
Keywords: temperature measurement primary-color method color gamut emissivity
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 946-963 doi: 10.1631/FITEE.1700667
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.
Keywords: Copyright protection Data hiding Multi-resolution decomposition De-correlation Security
Image Engineering and Its Research Status in China
Zhang Yujin
Strategic Study of CAE 2000, Volume 2, Issue 8, Pages 91-94
This paper provides a well-regulated explanation of the definition as well as contents of image engineering, a classification of the theories of image engineering and the applications of image technology. In addition, a comprehensive survey on important Chinese publications about image engineering in the past five years is carried out. An analysis and a discussion of the statistics made on the classification results are also presented. This work shows a general and up-to-date picture of the current status, progress trends and application areas of image engineering in China. It also supplies useful information for readers doing research and/or application works in this field, and provides a helpful reference for editors of journals and potential authors of papers.
Keywords: image engineering publication survey
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Research Article
Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1169-1180 doi: 10.1631/FITEE.2200498
Keywords: Hidden Markov model Weighted diffusion Balance between usability and privacy Image encryption
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6, Pages 813-827 doi: 10.1631/FITEE.2200645
Keywords: Compressive sensing Coupled map lattice (CML) DNA operations Semi-tensor product
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
the generating lock
the central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Will Cryptocurrencies Break the Energy Bank?
Mitch Leslie
Engineering 2020, Volume 6, Issue 5, Pages 489-490 doi: 10.1016/j.eng.2020.03.011
High-payload completely reversible data hiding in encrypted images by an interpolation technique Article
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1732-1743 doi: 10.1631/FITEE.1601067
Keywords: Encrypted image Data hiding Image recovery Real reversibility Interpolation
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing Computational Diffie-Hellman problem
Title Author Date Type Operation
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Journal Article
A two-stage parametric subspace model for efficient contrast-preserving decolorization
Hong-yang LU, Qie-gen LIU, Yu-hao WANG, Xiao-hua DENG
Journal Article
Discrete fractional watermark technique
Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr
Journal Article
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com
Journal Article
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Journal Article
Determination and Division of Radiative Color Gamut in Primary-Color Method for Temperature Measurement
Wang Anquan,Cheng Xiaofang,Lu Shaosong
Journal Article
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn
Journal Article
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Journal Article
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
High-payload completely reversible data hiding in encrypted images by an interpolation technique
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Journal Article