Figure - available from: Optical and Quantum Electronics
This content is subject to copyright. Terms and conditions apply.
a CHP Margin (shaded pixels from 1 to 5) with respect to LSB and MSB, b Sample of one bit CHP watermarking process

a CHP Margin (shaded pixels from 1 to 5) with respect to LSB and MSB, b Sample of one bit CHP watermarking process

Source publication
Article
Full-text available
In modern civilization information, security is a crucial problem. Image encryption and watermarking can effectively protect information from unauthorized access. This paper introduces a new vigorous symmetric optical image encryption and watermarking technique. This technique depends on a novel dynamic delay chaotic hopping pattern (DDCHP) combine...

Similar publications

Article
Full-text available
Motivated by the endurance of special attack on asymmetric cryptosystems by modified equal modulus decomposition, a new watermarking scheme for grayscale images in fractional Hartley domain is proposed in this paper. The input grayscale images, bonded with random phase mask, are transformed according to fractional Hartley transform, followed by equ...
Article
Full-text available
Robust reversible watermarking in an encrypted domain is a technique that preserves privacy and protects copyright for multimedia transmission in the cloud. In general, most models of buildings and medical organs are constructed by three-dimensional (3D) models. A 3D model shared through the internet can be easily modified by an unauthorized user,...

Citations

... Encrypting the image safeguards it from attacks and provides security to an image (dai Liu et al. 2018). Combining watermark and encryption to an image serves authentication and image security (Attaullah et al. 2020;Bhnassy et al. 2019;Xiao et al. 2015;Lawnik 2018;Lakshmi et al. 2018;Arumugham et al. 2018;Vidhya et al. 2020). ...
Article
Full-text available
To safeguard the content from malicious devices and users and to provide authentication and security to the transmitted content, it becomes mandatory to devise a combined watermarking and encryption algorithm. This paper addresses this concern by developing an algorithm to authenticate and encrypt the image before transmitting it safely. The algorithm was established using a watermarking technique. The watermarking was done by transforming the image into coefficients and embedding it in high-frequency components. The watermarked image was encrypted using a key generated using a combined logistical tent map and converted to DNA sequences. The sequences are stored and transmitted as such. At the receiver end, the image was recovered and de-watermarked. The label used for the watermark was compared with the obtained watermark at the receiver end. The proposed algorithm conforms to the required CIA triad (confidentiality, integrity, availability). The algorithm was tested for images in the Standard Test images database. On average, for an encrypted image, the peak signal to noise ratio (PSNR) was 9.1934 dB and had an entropy of 7.999 bits. The correlation coefficient of 0.0001, 0.0019, and 0.0003 for horizontal, vertical and diagonal directions was obtained. The watermark could be satisfactorily recovered from the cover, even with the addition of noise. The extracted watermark had a PSNR above 30 dB, with normalized cross-correlation (NCC) above 0.9, bit error rate (BER) below 0.1 and structural similarity index metric (SSIM) above 0.9. These results make the proposed algorithm suitable for authentication and encryption.
... Table 1 below. We compare our results obtained by our hybrid successive encryption then watermarking algorithm with those of the works of A. Khalfallah et al. [34], W. Puech et al. [35] and Mohamed et al. [36]. The results obtained are presented in Table 2 below: ...
... Bhnassy, Mohamed A., et al. have proposed a novel robust optical image encryption and watermarking technique. This symmetric cryptosystem has depended on a novel dynamic delay chaotic hopping pattern (DDCHP) combined with a double random phase encoding (DRPE) [17]. In 2020, In March 2020, M. I. Fath Allah, and M. M. Eid have introduced a novel technique for optical encryption depending on the proposed confusion and diffusion processes, the chaotic keys could efficiently encrypt the color images. ...
Article
Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.
... Pattern recognition systems use different mathematical models and algorithms in recognizing patterns in data sets. Several researchers have developed different pattern recognition systems that have been applied in recognizing patterns in different data sets [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Motivated by the abovementioned works, this present work has proposed a pattern recognition system. ...
... At the add port ( E add ) of the pattern recognition, the input light multiplex with the time function is multiplexed by the space-time function signal, which is employed to form the spin projection given by Eq. (2). ...
... where in Eq. (2), the e ±i t is the control time and ± signs indicate full-time slot axis. The pattern recognition system generates fringe patterns by means of interference of the input light as described by Eq. (4) [23], and the fringe contrast (V(ΔI)) is given in Eq. (4). ...
Article
Full-text available
3D interference fringe pattern recognition using a plasmonic sensing circuit is proposed. The plasmonic sensing in the form of a panda ring comprises an embedded gold grating at the microring center. WGM (whispering gallery mode) is observed at the microring center with suitable parameters. The dark soliton of 1.50 µm wavelength excites the gold grating which leads to electron cloud oscillation and forms the electron densities where the trapped electrons inside the silicon microring are transported via wireless connection using WGM and cable connection. The spin down \(\left| \downarrow \right\rangle\left( {\left| 1 \right\rangle } \right)\) and spin up \(\left| \uparrow \right\rangle\left( {\left| 0 \right\rangle } \right)\) result from the electron cloud oscillation. By using the changes in gold lengths, the excited electron pattern recognition can be manipulated, where the values “0” and “1” are useful for pattern recognition. The fringe patterns of the plasmonic interferometric sensor are recorded, which means that the novel 3D pattern recognition can be possibly implemented and used in many applications. Therefore, the plasmonic sensing circuit can be used to form the quantum code, quantum encryption, quantum sensor, and pattern recognition.
... After calculating the correlation coefficients, the correlation coefficients of the original image in horizontal, vertical, and diagonal directions are 0.924, 0.963, and 0.922, respectively, while the correlation coefficients of the encrypted image in the horizontal, vertical, and diagonal directions are 0.009, 0.008, and 0.005, respectively. After encryption, there is basically no correlation between adjacent pixels in the image, and statistical features in the encrypted image have been randomly diffused [18], indicating that the algorithm constructed in this study has a good encryption effect. ...
Article
To explore the application of improved variational iterative method in solving fractional differential equations and the effect of DNA coding algorithm based on logistic chaos mapping in image encryption, combining Chebyshev polynomial with variational iterative method, a new algorithm for solving fractional differential equations is proposed. In order to solve the initial value problem, the simulation software is used to compare the approximate solution after the change of values of [Formula: see text] and [Formula: see text] in the solution process to investigate the influence of different parameters on the accuracy of fractional order system. Subsequently, the logistic chaos sequence is used to generate discrete binary sequences, and an image encryption algorithm based on DNA coding is proposed. In order to verify the encryption performance of the proposed algorithm, Matlab simulation software is used to simulate and verify the image encryption processing. The results show that when [Formula: see text] approaches 1, the solution is closer to the exact solution than that when [Formula: see text] approaches 0.5, 0.7, and 0.9; compared with 1, 3, 5, and 7, the constructed algorithm has the highest accuracy when [Formula: see text] value is 9. The simulation results of the fuzzy partial fractional order system show that the chaotic sequence is sensitive to the initial value, and the logistic mapping sequence is suitable for the information encryption of the secure communication system. The simulation results of the image encryption algorithm based on DNA coding show that the algorithm can effectively encrypt the image, and the image histogram after encryption is approximately a horizontal line; slight changes in the initial value will affect the decryption effect of the image; the correlation analysis results show that there is no correlation between adjacent pixels in the image after encryption, which indicates that combining Chebyshev polynomials with variational iteration method can reduce the computational burden and improve the computational accuracy, and the image encryption algorithm proposed in this study can improve the reliability and security of image encryption.
... Pattern recognition systems use different mathematical models and algorithms in recognizing patterns in data sets. Several researchers have developed different pattern recognition systems that have been applied in recognizing patterns in different data sets (Soliman et al. 2018;Si and Yan 2015;Zhaohui and Xiaodong 2013;Hong et al. 2019;Kumar 2016;Bakhtiar and Hosseinzadeh 2016;Salehi and Dehyadegari 2016;Kumar et al. 2019;Farrokhi et al. 2015;Kotb and Guo 2019;Morsy and Alsayyari 2019;Maity et al. 2016;Metya and Janyani 2015;Jordovic-Pavlovic et al. 2020;Liu et al. 2016;Imtiaz et al. 2020;Mu et al. 2019;Bhnassy et al. 2019). Motivated by the above-mentioned works, this present work has proposed a pattern recognition system. ...
Preprint
Full-text available
3D interference fringe pattern recognition using a plasmonic sensing circuit is proposed. The plasmonic sensing in the form of a panda ring comprises of an embedded gold grating at the microring center. WGM (whispering gallery mode) is observed at the microring center with suitable parameters. The dark soliton of 1.50µm wavelength excites the gold grating which leads to electron cloud oscillation and forms the electron densities where the trapped electrons inside the silicon microring are transported via wireless connection using WGM and cable connection. The spin-down |↓〉(|1〉) and spin-up |↑〉(|0〉) result from the electron cloud oscillation. By using the changes in gold lengths, the excited electron pattern recognition can be manipulated, where the values "0 and "1"' are useful for pattern recognition. The fringe patterns of the plasmonic interferometric sensor are recorded, which means that the novel 3D pattern recognition can be possibly implemented and used in many applications. Therefore, the plasmonic sensing circuit can be used to form the quantum code, quantum encryption, quantum sensor, and pattern recognition.
Chapter
Research in image processing of digital color photography is in full expansion, especially on CFA (color filter array) images. These raw CFA images are very important for image analysis because they have not undergone any processing (interpolation, demosaicking, etc.) that would alter their reliability. The chapter presents three robust hybrid algorithms combining chaotic encryption and blind watermarking techniques of CFA images based on the quaternionic wavelet transform (QWT) to propose solutions related to the problems of confidentiality, security, authenticity of these images transmitted over digital networks, the size of some CFA images, and the large amount of data to be transferred in a non-secure environment where resources in terms of throughput and bandwidth are quite limited. The three hybrid algorithms were implemented simultaneously and successively.
Article
Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.
Article
In order to improve the performance of the Meixner moments, we suggest in this article a new set of Fractional Discrete Meixner Polynomials (FrDMPs), a sort of a generalization of the traditional whole order. Firstly, we introduce the necessary algebraic derivatives of FrDMPs using the spectral decomposition of Discrete Meixner Polynomials (DMPs) for any order without numerical fluctuation and always preserving the property of orthogonality thanks to the algorithm of the Gram-Schmidt process. Then, we determine the eigenvalues and the corresponding multiplicity of the Meixner transform matrix. An image encryption and decryption method was proposed based on jigsaw transform and generation of Fractional Discrete Meixner Moments (FrDMMs), in which the image is broken up into bit planes. Each bit plane undergoes a jigsaw transform is divided into blocks and encrypted. The transformed bit planes are combined together and then encrypted using random phase masks and fractional discrete Meixner moments. In addition, we introduce a new encryption and decryption scheme based on the proposed FrDMMs. This scheme has a good encryption effect because the fractional parameters used as key to the encrypted data. Experimental results show that the encryption scheme is sensitive to keys, it is resist a variety of attacks, and decrypted images are almost non-distored, which indicate excellent encryption effect, sufficient security and robustness of the method.