GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    In: Journal of Intelligent & Fuzzy Systems, IOS Press, Vol. 38, No. 5 ( 2020-05-29), p. 6403-6414
    Type of Medium: Online Resource
    ISSN: 1064-1246 , 1875-8967
    Language: Unknown
    Publisher: IOS Press
    Publication Date: 2020
    detail.hit.zdb_id: 2070080-5
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    IOS Press ; 2020
    In:  Journal of Intelligent & Fuzzy Systems Vol. 39, No. 3 ( 2020-10-07), p. 2977-2990
    In: Journal of Intelligent & Fuzzy Systems, IOS Press, Vol. 39, No. 3 ( 2020-10-07), p. 2977-2990
    Abstract: Digital image steganography algorithms usually suffer from a lossy restoration of the cover content after extraction of a secret message. When a cover object and confidential information are both utilised, the reversible property of the cover is inevitable. With this objective, several reversible data hiding (RDH) algorithms are available in the literature. Conversely, because both are diametrically related parameters, existing RDH algorithms focus on either a good embedding capacity (EC) or better stego-image quality. In this paper, a pixel expansion reversible data hiding (PE-RDH) method with a high EC and good stego-image quality are proposed. The proposed PE-RDH method was based on three typical RDH schemes, namely difference expansion, histogram shifting, and pixel value ordering. The PE-RDH method has an average EC of 0.75 bpp, with an average peak signal-to-noise ratio (PSNR) of 30.89 dB. It offers 100% recovery of the original image and confidential hidden messages. To protect secret as well as cover the proposed PE-RDH is also implemented on the encrypted image by using homomorphic encryption. The strength of the proposed method on the encrypted image was verified based on a comparison with several existing methods, and the approach achieved better results than these methods in terms of its EC, location map size and imperceptibility of directly decrypted images.
    Type of Medium: Online Resource
    ISSN: 1064-1246 , 1875-8967
    Language: Unknown
    Publisher: IOS Press
    Publication Date: 2020
    detail.hit.zdb_id: 2070080-5
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    IOS Press ; 2021
    In:  Journal of Intelligent & Fuzzy Systems Vol. 40, No. 6 ( 2021-06-21), p. 10385-10400
    In: Journal of Intelligent & Fuzzy Systems, IOS Press, Vol. 40, No. 6 ( 2021-06-21), p. 10385-10400
    Abstract: Digitized forms of images do widely used for medical diagnostics. To maintain the privacy of an individual in e-health care applications, securing the medical image becomes essential. Hence exclusive encryption algorithms have been developed to protect the confidentiality of medical images. As an alternative to software implementations, the realization of image encryption architectures on hardware platforms such as FPGA offers significant benefit with its reconfigurable feature. This paper presents a lightweight image encryption scheme for medical image security feasible to realize as concurrent architectural blocks on reconfigurable hardware like FPGA to achieve higher throughput. In the proposed encryption scheme, Lorentz attractor’s chaotic keys perform the diffusion process. Simultaneously, the pseudo-random memory addresses obtained from a Linear Feedback Shift Register (LFSR) circuit accomplishes the confusion process. The proposed algorithm implemented on Intel Cyclone IV FPGA (EP4CE115F29C7) analyzed the optimal number of concurrent blocks to achieve a tradeoff among throughput and resource utilization. Security analyses such as information entropy, histogram, correlation, and PSNR confirms the algorithm’s encryption quality. The strength of diffusion keys was ensured by randomness verification through the standard test suite from the National Institute of Standards and Technology (NIST). The proposed scheme has a larger keyspace of 2384 that guarantees good confusion through near-zero correlation, and successful diffusion with a PSNR of 〈 5 dB towards the statistical attacks. Based on the hardware analysis, the optimal number of concurrent architectural blocks (2 N) on the chosen FPGA to achieve higher throughput (639.37 Mbps), low power dissipation (138.85 mW), minimal resource utilization (1268 Logic Elements) and better encryption quality for the proposed algorithm is recommended as 4 (with N = 2).
    Type of Medium: Online Resource
    ISSN: 1064-1246 , 1875-8967
    Language: Unknown
    Publisher: IOS Press
    Publication Date: 2021
    detail.hit.zdb_id: 2070080-5
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    IOS Press ; 2021
    In:  Journal of Intelligent & Fuzzy Systems Vol. 41, No. 5 ( 2021-11-17), p. 5583-5594
    In: Journal of Intelligent & Fuzzy Systems, IOS Press, Vol. 41, No. 5 ( 2021-11-17), p. 5583-5594
    Abstract: Reversible Data Hiding (RDH) schemes have recently gained much interest in protecting the secret information and sensitive cover images. For cloud security applications, the third party’s data embedding can be done (e.g., cloud service). In such a scenario, to protect the cover image from unauthorized access, it is essential to encrypt before embedding it. It can be overcome by combining the RDH scheme with encryption. However, the key challenge in integrating RDH with encryption is that the correlation between adjacent pixels begins to disappear after encryption, so reversibility cannot be accomplished. RDH with elliptic curve cryptography is proposed to overcome this challenge. In this paper (ECC-RDH) by adopting additive homomorphism property; the proposed method, the stego image decryption gives the sum of the original image and confidential data. The significant advantages of this method are, the cover image is transferred with high security, the embedding capacity is 0.5 bpp with a smaller location map size of 0.05 bpp. The recovered image and secrets are the same as in the original, and thus 100% reversibility is proved.
    Type of Medium: Online Resource
    ISSN: 1064-1246 , 1875-8967
    Language: Unknown
    Publisher: IOS Press
    Publication Date: 2021
    detail.hit.zdb_id: 2070080-5
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...