ebook img

Recent Advanced in Image Security Technologies: Intelligent Image, Signal, and Video Processing PDF

195 Pages·2023·11.345 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Recent Advanced in Image Security Technologies: Intelligent Image, Signal, and Video Processing

Studies in Computational Intelligence 1079 Hang Chen Zhengjun Liu   Editors Recent Advanced in Image Security Technologies Intelligent Image, Signal, and Video Processing Studies in Computational Intelligence Volume 1079 SeriesEditor JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand withahighquality.Theintentistocoverthetheory,applications,anddesignmethods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms,evolutionarycomputation,artificialintelligence,cellularautomata,self- organizingsystems,softcomputing,fuzzysystems,andhybridintelligentsystems. Ofparticularvaluetoboththecontributorsandthereadershiparetheshortpublica- tiontimeframeandtheworld-widedistribution,whichenablebothwideandrapid disseminationofresearchoutput. IndexedbySCOPUS,DBLP,WTIFrankfurteG,zbMATH,SCImago. AllbookspublishedintheseriesaresubmittedforconsiderationinWebofScience. · Hang Chen Zhengjun Liu Editors Recent Advanced in Image Security Technologies Intelligent Image, Signal, and Video Processing Editors HangChen ZhengjunLiu SchoolofSpaceInformation SchoolofPhysics SpaceEngineeringUniversity HarbinInstituteofTechnology Beijing,China Harbin,China ISSN 1860-949X ISSN 1860-9503 (electronic) StudiesinComputationalIntelligence ISBN 978-3-031-22808-7 ISBN 978-3-031-22809-4 (eBook) https://doi.org/10.1007/978-3-031-22809-4 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature SwitzerlandAG2023 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface With the rapid development of modern photography technology, the application of real-time imaging transmission has been widely used both in commercial and militaryarea,suchasresourcemonitoring,remotesurgery,militarytargetdetection. Meanwhile,theimagesecuritytechnologiesarebecomingmoreandmoreimportant in transmission and storage process. The commonly used video and images can beprotected withdifferent kinds of securitytechnology, which help theowners to preventunauthorizeddistributionanduse.Furthermore,theimage(video)security technologies have remarkable military significance and application in the fields of spaceremotesensing,navigation,andspacecommandoperation. Overthepasttwodecades,theinformationsecuritytechnologieshaveattracted significantattentionandledtoextensivestudyofindividuals,companies,institutes, andgovernmentsectorsallaroundtheworld.Imageencryptiontechniqueisoneway toconvertthesecretinformationtoanunreadableformatoraconfusedimagewhich is hard to understand. However, different from the text message, the image data hassomespecialcharacteristicslikehighcapacity,redundancy,andhighcorrelation amongpixels.Particularly,theopticalinformationsecuritytechnologyhasbecome increasinglyattractivesincethedoublerandomphaseencoding(DRPE)isproposed byRefregierandJavidiin1995duetoitshigh-speedparallelprocessing.Thekey motivationofusingopticsandphotonicsininformationsecurityisthatthevarious complexdegreesoffreedom.Besides,someotherencryptiontechnologiesarealso usedinimagecryptosystem,suchchaotic/hyperchaoticmaps,pixelsencodingtech- nology, FPGA-based implementation, embedded hardware implementation, which canextremelyimprovethesecurityoftheencryptionschemes.Inthepastdecade, theartificialintelligence algorithmsarealsoemployed intheimagecryptosystem, suchasCNNandSVM. This book provides the readers with a comprehensive overview of principles, methodologies,andrecentadvancesinimageandvideosecurityprocessing(contains but not limited to encryption, hiding, and watermarking) using latest technologies throughacollectionofhigh-qualitychapters.Thesechapterspresentoriginalworks offamousresearchesfromseveralcountries.Thisbookisavaluablereferencefor v vi Preface scientists,engineers,scientificresearchers,postgraduatestudents,andseniorunder- graduatestudentswithmajorsinimage,signal,andvideoprocessing.Toenlighten thereader,wewouldliketodividethisbookintoeightchapters: Thefirstchapter-“OpticalInformationCryptosystemsBasedonStructuredPhase Encoding.” Thesecondchapter-“Encryption/DecryptionwithOpticalTransform.” Thethirdchapter-“OpticalCryptosystemsBasedonSpiralPhaseModulation.” Thefourthchapter-“ImageCryptosystemforDifferentKindsofImagebyUsing ImprovedArnoldMap.” Thefifthchapter-“ImageEncryptionUsingaChaotic/HyperchaoticMultidimen- sionalDiscreteSystem.” Thesixthchapter-“VideoCryptosystemUsingChaoticSystems.” Theseventhchapter-“NeuralNetworkImageRestorationTechniques.” Beijing,China HangChen Harbin,China ZhengjunLiu Acknowledgements Theeditorswouldliketotakethisopportunitytoexpresstheirsinceregrat- itudetotheauthorsofthechaptersforextendingtheirwholeheartedsupportinsharingsomeof theirlatestresults.Withouttheirsignificantcontribution,thisbookvolumecouldnothavefulfilled itsmission.TheeditorisverygratefultoEditor-in-ChiefProf.ThomasDitzingerforhishelpon ourbook.AlltheauthorsareindebtedtotheeditorialstaffatSpringer,fortheirhardworkingand selfishattitudeonhelpingourbookplan. Contents OpticalInformationCryptosystemsBasedonStructuredPhase Encoding ......................................................... 1 MuhammadRafiqAbuturab Encryption/DecryptionwithOpticalTransform ...................... 33 ZhengjunLiu,YuJi,ShuruiYang,ShutianLiu,BinGao,andHangChen OpticalCryptosystemsBasedonSpiralPhaseModulation ............ 59 RaviKumar,YiXiong,andSakshi Image Cryptosystem for Different Kinds of Image by Using ImprovedArnoldMap ............................................. 77 HangChen,YanhuaCao,ShutianLiu,ZhengjunLiu,andZhonglinYang ImageEncryptionUsingaChaotic/HyperchaoticMultidimensional DiscreteSystem ................................................... 105 CamelTanougast,BelqassimBouteghrine,SaidSadoudi,andHangChen VideoCryptosystemUsingChaoticSystems .......................... 127 SaidSadoudi,CamelTanougast,BelqassimBouteghrine,HangChen, andSalahMihoub NeuralNetworkImageRestorationTechniques ...................... 163 MingyongJiang,NingboGuo,QunWei,andHangChen vii Optical Information Cryptosystems Based on Structured Phase Encoding MuhammadRafiqAbuturab Abstract The structured phase mask (SPM) is a diffractive optical element. It mainlycomprisesaradialHilbertphasemask(RHPM),aFresnelzoneplatephase mask (FZPM), a spiral zone plate phase mask (SZPM), and a chaotic spiral phase mask (CSPM). It is easier to align with setup axis and it is itself a multiple-key device.OpticalcryptosystemsbasedonRHPMandFZPMinthegyratortransform domainhavebeenpresented.Inthesecryptosystems,theconstructionparametersare usedasencryptionkeys.AnasymmetricinformationcryptosystembasedonSZPM and optical interference principle has been studied. Finally, asymmetric multiple- informationcryptosystembasedonCSPMandrandomspectrumdecompositionhas beendiscussed.Inasymmetriccryptosystems,theconstructionparametersareused asdecryptionkeys.Hybridoptoelectronicsystemscanbeusedfortheimplementation ofcryptosystems.Numericalsimulationsdemonstratetheefficiencyandviabilityof theopticalmethods. 1 Introduction Informationsecurityisofparamountimportanceincommunicationsystems,where the rate of information dissemination is growing phenomenally. The security of traditionalmethodsisimprovedusingstrongercryptographicalgorithms.High-speed computerscanreducethetimetodecryptanencryptedmessage.Whenthelengthof theencryptingkeybecomeslonger,theprocessingspeedbecomesslower.So,optical informationsecuritytechniqueshavebeenwidelyappliedinthefieldofinformation security, owing to their multiple parameters and parallel processing capability [1]. Thesecurityofacryptosystemdependsonthelengthofthesecuritykey/maskand itsrandomness.Thus,thesecuritykeyplaysasignificantroleinachievingahigher level of security of a cryptosystem. In optical cryptosystems, the keys are mostly phase-onlyfunctionscalledrandomphasemasks(RPMs).TheRPMispositionedin B M.R.Abuturab( ) DepartmentofPhysics,MuzaffarpurInstituteofTechnology,Muzaffarpur842003,India e-mail:rafi[email protected] ©TheAuthor(s),underexclusivelicensetoSpringerNatureSwitzerlandAG2023 1 H.ChenandZ.Liu(eds.),RecentAdvancedinImageSecurityTechnologies, StudiesinComputationalIntelligence1079, https://doi.org/10.1007/978-3-031-22809-4_1 2 M.R.Abuturab theFourierplaneofaclassicalFourierprocessortoencrypttheFourierspectrumof animage/data[2].Ithastwoimportantpracticaldisadvantages.Specklenoiseand thesensitivityofthealignmentinthedecoding step.First,speckle masksproduce higher spatial frequency components, which cause interference patterns to change rapidly in certain local areas in the holographic plane. Second, a misalignment of RPMinthedecryptionprocesscausestofailinretrievingtheoriginalimage/data. Therefore,precisealignmentofanopticalcryptosystembasedona4f correlatoris oneoftheimportantpracticalissue. The structured phase masks were introduced to overcome the misalignment problem in the decryption stage. The radially symmetric Hilbert transform (RHT) wasintroducedandappliedtothetwo-dimensionaledgeenhancedimagesofarbi- trarilyshapedinputobjects[3].Itiseasiertoalignwiththesetupaxis[4].Thetoroidal zoneplate(TZP)wasreportedandanalyzeditssensitivitytomisalignment[5].The Fresnelzoneplate(FZP)wasproposedingyratortransformdomaintosolvealign- ment problems in optical cryptosystem based on a 4f correlator [6, 7]. The spiral zone plate (SZP) was put forward [8]. The optical cryptosystem based on optical interference principle and spiralzone plate phase encoding was proposed toattain precisealignment[9].Thechaoticstructuredphasemask(CSPM)wasproposedin gyratortransformdomaintosolveaxisalignment[10,11]. Inthischapter,opticalcryptosystemsbasedonstructuredphasemaskshavebeen reported.Thischapterstartswithabriefintroductiontostructuredphasemasks.The opticaltechniquesforimage/datasecuritysystemsbasedonstructuredphasemasks, algorithms, and optical implementations have been discussed. Finally, numerical simulationresultshavebeenmadetotestthesecurity,validity,andefficiencyofthe opticaltechniques. The rest of the paper is organized as follows. In Sect. 1, the structured phase maskanditstypesaredescribed.InSect.2,opticalgyratortransformispresented. InSect.3,theopticalinformationcryptosystemsbasedonstructuredphasemasks arediscussed.Thechapterendswithconcludingremarks. 2 StructuredPhaseMask Thestructuredphasemask(SPM)isanalternativetotherandomphasemask(RPM). TheSPMmainlyincludesaradialHilbertphasemask(RHPM),Fresnelzoneplate phasemask(FZPM),spiralzoneplatephasemask(SZPM),andchaoticspiralphase mask(CSPM).TheSPMisdefinedbyashapegivenbyaspecificconfiguration.It offersremarkableadvantages.First,itisverydifficulttoreplicateasitisadiffractive optical element. Second, it is easier to position during the decoding process as it providesitsowncenteringmark(on-axisfocalringwhenilluminatedbyaparallel beam).Third,itsdiffractionefficiencycanbemanipulateddependingontherequire- mentsoftheopticalsystem.Finally,itisitselfamultiple-keydeviceasitcontains multiplekeysinasingle-phasemask.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.