Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System

    Zhiqing Dong1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1977-1993, 2024, DOI:10.32604/cmc.2024.047233 - 27 February 2024

    Abstract With the advent of the information security era, it is necessary to guarantee the privacy, accuracy, and dependable transfer of pictures. This study presents a new approach to the encryption and compression of color images. It is predicated on 2D compressed sensing (CS) and the hyperchaotic system. First, an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security. Then, the processed images are concurrently encrypted and compressed using 2D CS. Among them, chaotic sequences replace traditional random measurement matrices to increase the system’s security. Third, the processed images are More >

  • Open Access

    ARTICLE

    Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine

    Arslan Akram1,2, Imran Khan1, Javed Rashid2,3, Mubbashar Saddique4,*, Muhammad Idrees4, Yazeed Yasin Ghadi5, Abdulmohsen Algarni6

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1311-1328, 2024, DOI:10.32604/cmc.2023.040512 - 30 January 2024

    Abstract Algorithms for steganography are methods of hiding data transfers in media files. Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information, and these methods have made it feasible to handle a wide range of problems associated with image analysis. Images with little information or low payload are used by information embedding methods, but the goal of all contemporary research is to employ high-payload images for classification. To address the need for both low- and high-payload images, this work provides a machine-learning approach to steganography image classification… More >

  • Open Access

    ARTICLE

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    Raheem Ogla1,*, Eman Shakar Mahmood1, Rasha I. Ahmed1, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3075-3096, 2023, DOI:10.32604/cmc.2023.039818 - 08 October 2023

    Abstract The transmission of video content over a network raises various issues relating to copyright authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a significant issue in the video industry, and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media. However, there are still many unresolved challenges. This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos, which can help prove the credibility of video content by detecting any fake… More >

  • Open Access

    ARTICLE

    Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi

    Doaa Sami Khafaga1, Sarah M. Alhammad1,*, Amal Magdi2, Osama ElKomy2, Nabil A. Lashin2, Khalid M. Hosny2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1967-1986, 2023, DOI:10.32604/csse.2023.040345 - 28 July 2023

    Abstract Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access. Due to the wide use of the Internet nowadays, the need to ensure data integrity and authentication increases. Many techniques, such as watermarking and encryption, are used for securing images transmitted via the Internet. The majority of watermarking systems are PC-based, but they are not very portable. Hardware-based watermarking methods need to be developed to accommodate real-time applications and provide portability. This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the… More >

  • Open Access

    ARTICLE

    An Optimized Implementation of a Novel Nonlinear Filter for Color Image Restoration

    Turki M. Alanazi*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1553-1568, 2023, DOI:10.32604/iasc.2023.039686 - 21 June 2023

    Abstract Image processing is becoming more popular because images are being used increasingly in medical diagnosis, biometric monitoring, and character recognition. But these images are frequently contaminated with noise, which can corrupt subsequent image processing stages. Therefore, in this paper, we propose a novel nonlinear filter for removing “salt and pepper” impulsive noise from a complex color image. The new filter is called the Modified Vector Directional Filter (MVDF). The suggested method is based on the traditional Vector Directional Filter (VDF). However, before the candidate pixel is processed by the VDF, the MVDF employs a threshold… More >

  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798 - 26 May 2023

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor More >

  • Open Access

    ARTICLE

    Simulated Annealing with Deep Learning Based Tongue Image Analysis for Heart Disease Diagnosis

    S. Sivasubramaniam*, S. P. Balamurugan

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 111-126, 2023, DOI:10.32604/iasc.2023.035199 - 29 April 2023

    Abstract Tongue image analysis is an efficient and non-invasive technique to determine the internal organ condition of a patient in oriental medicine, for example, traditional Chinese medicine (TCM), Japanese traditional herbal medicine, and traditional Korean medicine (TKM). The diagnosis procedure is mainly based on the expert's knowledge depending upon the visual inspection comprising color, substance, coating, form, and motion of the tongue. But conventional tongue diagnosis has limitations since the procedure is inconsistent and subjective. Therefore, computer-aided tongue analyses have a greater potential to present objective and more consistent health assessments. This manuscript introduces a novel… More >

  • Open Access

    ARTICLE

    A Color Image Encryption Scheme Based on Singular Values and Chaos

    Adnan Malik1, Muhammad Ali1, Faisal S. Alsubaei2, Nisar Ahmed3,*, Harish Kumar4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 965-999, 2023, DOI:10.32604/cmes.2023.022493 - 23 April 2023

    Abstract The security of digital images transmitted via the Internet or other public media is of the utmost importance. Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities. This study provides an approach to color image encryption that could find practical use in various contexts. The proposed method, which combines four chaotic systems, employs singular value decomposition and a chaotic sequence, making it both secure and compression-friendly. The unified average change intensity, the number of pixels’ change rate, information More >

  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655 - 03 April 2023

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed… More >

  • Open Access

    ARTICLE

    An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher

    Ghofran Kh. Shraida1, Hameed A. Younis1, Taief Alaa Al-Amiedy2, Mohammed Anbar2,*, Hussain A. Younis3,4, Iznan H. Hasbullah2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2641-2654, 2023, DOI:10.32604/cmc.2023.035793 - 31 March 2023

    Abstract Nowadays, high-resolution images pose several challenges in the context of image encryption. The encryption of huge images’ file sizes requires high computational resources. Traditional encryption techniques like, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are not only inefficient, but also less secure. Due to characteristics of chaos theory, such as periodicity, sensitivity to initial conditions and control parameters, and unpredictability. Hence, the characteristics of deoxyribonucleic acid (DNA), such as vast parallelism and large storage capacity, make it a promising field. This paper presents an efficient color image encryption method utilizing DNA encoding with… More >

Displaying 1-10 on page 1 of 31. Per Page