IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM

Size: px
Start display at page:

Download "IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM"

Transcription

1 Journal of ELECTRICAL ENGINEERING, VOL. 65, NO., 014, IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Xiaopeng Wei Bin Wang Qiang Zang Cao Ce In recent years, tere as been growing interesting in image encryption based on caotic maps and wavelet transform. In tis paper, a novel sceme for image encryption based on caotic maps and reversible integer wavelet transform is proposed. Firstly, te ciper key wic is related to plain-image is used to generate different parameters and initial values of caotic maps. Ten te plain-image is permuted by te order from caotic maps, and processed by integer wavelet transform. A part of transform coefficient is diffused by te orbits of caotic maps. Finally, te ciper image is obtained by inverse integer wavelet transform based on te diffused coefficient. Numerical experimental results and comparing wit previous works sow tat te proposed sceme possesses iger security tan previous works, wic is suitable for protecting te image information. Keywords: integer wavelet transform; image encryption; caotic map; caos 1 INTRODUCTION Along wit significant improvements in computer and internet tecnology, it as created an environment in wic it is very easy to disclose important information by illegal users, suc as personal image. For tis reason, te study of image encryption as become an important aspect of protecting security of image information. Since digital image possesses some inerent features suc as bulk data capacity and ig correlation among adjacent pixels, te algoritms of image encryption are different from te traditional text cryptograpic metod. At te same time, due to teir features of ergodicity, sensitivity to initial conditions and control parameters, etc, caotic maps ave good potential for information encryption, especially image encryption. Inspired by te subtle similarity between caotic map and cryptograpy, a large number of caos-based image encryption algoritms ad been proposed [1 8]. In [1], te autors generalized two-dimensional caotic cat map to 3D for designing a real-time secure symmetric encryption sceme, used 3D cat map to permute te position of image pixels in te permutation stage and employed logistic caotic system to diffuse te permuted image in te diffusion stage. In [], te autors firstly analyzed te parameter sensitivity of standard map, and compared te secret key space of standard map wit tat of cat map and baker map. Ten an improved standard map was used to realize position permutation, wile te diffusion function consisted of logistic map tat was used to realize te diffusion of image. In [3], te autors introduced a certain diffusion effect in te permutation stage by simple sequential add-and-sift operations. Altoug tat led to a longer processing time in a single round, te overall encryption time was reduced as fewer rounds were required. In[4], te autors proposed a caos-based image encryption algoritm wit variable control parameters. Te control parameters used in te permutation stage and te keystream employed in te diffusion stage were generated from two caotic maps related to te plainimage. A fast image encryption algoritm combined wit permutation and diffusion was proposed in [5], te image was partitioned into blocks of pixels. Ten, spatiotemporal caos was employed to suffle te blocks, and at te same time, to cange te pixel values. Meanwile, an efficient metod for generating pseudorandom numbers from spatiotemporal caos was suggested, wic furter increases te encryption speed. A novel image encryption algoritm based on a tree dimensional (3D) caotic map tat could defeat te aforementioned attack among oter existing attacks was proposed in [6]. Te design of te proposed algoritm was simple and efficient, and based on tree pases wic provided te necessary properties for a secure image encryption algoritm including te confusion and diffusion properties. In [7], tis paper proposed a novel caos-based image encryption algoritm to encrypt color images by using a Coupled Two-dimensional Piecewise Nonlinear Caotic Map, called CTPNCM, and a masking process. Distinct caracteristics of te algoritm were ig security, ig sensitivity, and ig speed tat could be applied in encryption of color images. In [9], te autors designed a new suffling scemes tat could efficiently destroy redundancy in te visual data ensuring its secured transmission and distribution over public networks. In [10], te issues pertaining wit efficient, fast, cost effective and secured image transmission were addressed in totality. Te proposed model employs Compressed Hybrid Cryptosystem constituted compression, encryption and secured session key excange along wit te transmission of image. In te proposed work, te algoritm ad been designed to generate diffusion template using 3D Standard map. Key Laboratory of Advanced Design and Intelligent Computing (Dalian University), Ministry of Education, Dalian, 1166, Cina, zangq@dlu.edu.cn DOI: /jee , Print ISSN , On-line ISSN X, c 014 FEI STU

2 Journal of ELECTRICAL ENGINEERING 65, NO., Fig. 1. Flowcart of permutation-diffusion type of caos-based image cryptosystems As an important metod, wavelet transforms are widely used in image processing, suc as image compression and image watermarking. A number of works on image compression and image watermarking are based on reversible integer wavelet transform [11 14]. In [11], te autors presented te factors affecting te compression performance of reversible integer-to-integer wavelet transforms, and supported by bot experimental data and teoretical arguments. In [1], te autor used te reversible integer wavelet transform to implement te tecnique of difference expansion, wic was widely employed in image watermarking. Te Ref. [13] proposed a ig capacity reversible image watermarking sceme based on integer-to-integer wavelet transforms. It divided an input image into non-overlapping blocks and embedded a watermark into te ig-frequency wavelet coefficients of eac block. An intelligent reversible watermarking approac GA-RevWM for medical images was proposed in [14]. GA-RevWM was based on te concept of blockbased embedding using genetic algoritm (GA) and integer wavelet transform (IWT). However, in recent years, many proposed caotic cryptosystems are broken by some kinds of cryptanalysis [1, 15 17]. Te main broken reasons can be briefly stated as follows: (1) in te different rounds, te same control parameters for permutation are used; () te key stream obtained from te caotic map only depends on te key, namely te parameters or initial value of caotic map. Using te first loopole, te attacker can easily divide te permutation-diffusion process into two unrelated stages by coosing te plain-image wit identical pixels [4]. Due to te second loopole, te attacker can obtain te key stream, wic is extracted from te caotic map in te diffusion, by te cryptoanalytic solution, suc as knownplaintext and cosen-plaintext attacks [18 0]. In tis paper, a novel sceme for image encryption based on caotic map and reversible integer wavelet transform is proposed. Te initial key is randomly generated, and relates to plain-image to generate ciper key, wic is used as te different parameters and initial values of caotic maps. It can overcome te flaws above. Te plainimage is firstly permuted by te order from caotic maps. Ten te permuted image is processed by integer wavelet transform. In order to diffuse te image, a part of coefficient is diffused by te obits of caotic maps. Finally, te inverse integer wavelet transform is used to obtain te ciper image based on te diffused coefficient. Numerical experimental results and comparing wit previous works sow tat te proposed sceme possesses iger security tan previous works, wic is suitable for protecting te image information. Te paper is organized as follows. In te next section, te related works are described in detail. In Section 3, te process of encryption and decryption is described in detail. Performance analyses and simulation results are reported in Section 4. Finally, conclusions are drawn in Section 5. RELATED WORKS In [1], te autors proposed a general cryptograpic caos-based arcitecture for image encryption, namely permutation-diffusion arcitecture, wic s sown as Fig. 1. Tis arcitecture includes two iterative stages, namely permutation stage and diffusion stage. Te former permutes te plain-image but not cange te value of pixel. Te latter canges te value of pixel but not cange te position of pixel. In order to improve encryption effect of algoritms, te wole permutation-diffusion round will be repeated R times..1 Caotic maps used in image encryption Tere are tree types of two-dimensional caotic maps wic are widely used in te permutation stage, namely Standard caotic map, Cat caotic map and generalized Baker caotic map [1,, 10]. Altoug tese tree caotic maps can effectively confuse te position of image pixel in te permutation stage, some parameters used in te in te permutation stage may cause a secure loopole [4,19,0]. Tere are many works on tese caotic maps, suc as parameter space, key space, and iteration time. More details of tis step can be obtained from [,1 3]. In te diffusion stage, logistic map and tent map are frequently employed to generate te key stream or subkey for te stream ciper or block cipers, respectively, and cange te value of pixels wic ave been permuted [,3,17]. It can be denoted as follows x i+1 = µx i (1 x i ). (1)

3 9 Bin Wang Xiaopeng Wie Qiang Zang Cao Ce: IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND... Te reversible integer transforms set up a one-to-one correspondence between (x, y) and (l, ) [1]. For example, we ave a pair pixels x = 156,y = 141. Ten, by (), l = = 148, = = 15. Recover- = = 156, ing te original pixels x = l + y = l = = 141 by (3)..3 Preventing te overflow and underflow problems For te grayimage, to preventte overflowand underflowproblems,itmustrestrict x,y interangeof [0.55]. From (3), it is equivalent to ave 0 l , and 0 l 55.Ten, +1 l 55 +1, and l 55+. For te different values of, tere is l 55 l 55+, 0,, < 0. (4) Fig.. Te flowcart of encryption Here, µ is control parameter for caotic map, x i and x i+1 are te it and te (i+1)t state of caotic map, respectively. Some oter caotic map can be employed in te diffusion stage, suc as Cen s caotic system, Lorentz caotic system and so on [16, 3, 4]. However, tese caotic systems are more complex te logistic map and tent map, wic makes te rise of runtime of caosbased image encryption. Designing fast image encryption arcitecture, te complex caotic map is not advised to use. A number of works related on te logistic map and tent map ave been publised, including parameter sensitivity, initial value sensitivity, statistical properties and degradation penomenon [5,6]. So we use two logistic maps wit different parameters and initial value to implement te permutation-diffusion arcitecture in tis paper.. Reversible integer wavelet transform Recently, reversible integer wavelet transforms are widely used in image compression and image watermarking. A reversible integer wavelet transform is used in tis paper. It can be denoted as follows Inverse transform of () is x+y l =, = x y. () +1 x = l+, y = l (3) Te reversible integer transforms () and (3) are also called integer Haar wavelet transform, or te S transform. One can derive tat te above inequalities are equivalent to: 0 l 55 0 l , 0, 3 THE PROCESS OF ENCRYPTION AND DECRYPTION 3.1 Encryption algoritm, < 0. (5) According to te caracteristic of logistic map, logistic map is cosen as te caotic map in te proposed arcitecture. Te different parameters and initial values for Eq (1) are denoted as µ 1, µ, x 1 (0) and x (0), respectively, were µ 1,µ [3.9,4] and x 1 (0),x (0) (0,1). Ikey is denoted as te initial key. Te detailed of encryption is described as follows: Step 1. Randomly generating te initial key and obtaining ciper key by relating to te plain-image; Step. Evenly dividing ciper key into four parts as te parameters and initial values of logistic maps, iterating logistic maps for Q times to get rid of te transient effect, were Q = 100; Step 3. Sorting te caotic orbit obtained from previous step from small to large, and permuting te plainimage by tis order only once Mim(i) = permute ( P(i),Order(i) ), i = 1,,...M N ; (6) Step 4. Processing te permuted image by integer wavelet transform, namely by (), and obtaining te transform coefficient l, ;

4 Journal of ELECTRICAL ENGINEERING 65, NO., Fig. 3. (a) Plain-image of Lena, (b) Encrypted image by key , (c) Encrypted image by key , (d) Difference image Step 5. Obtaining new coefficient l based on (7); l = l, 0, l = l+, < 0; (7) Step 3. Obtaining Orbit(i) and Order(i); Step 4. Implementing integer wavelet transform and obtaining te coefficient Cl, ; Step 5. Recovering te l(i) by (10) l(i) = Cl(i) Orbit(i), i = 1,,...,M N/; (10) Step 6. Diffusing te coefficient l once by te logistic caotic orbits Cl(i) = l (i) Orbit(i), i = 1,,...,M N/; (8) Step 7. Recovering image by inverse integer wavelet transform wit te diffused coefficient l, and obtaining te ciper-image; Step 8. Output te ciper-image. Were P(i) is te original image pixel value, Mim(i) is te pixel value permuted by te order, Order(i) is te ordered position of P(i), Orbit(i) are te logistic caotic orbit from step, and Cl(i) is te diffused coefficient l. M and N are te widt and eigt of te plain-image. denotes te xor operator. Note tat implementing te Step 5 is convenient to deal wit te overflow and underflow problems wile calculating (8). If Cl(i) out off te constraintfrom (5), Cl(i) is processed by ( mod Cl(i),55 ( mod Cl(i), ), 0, ), < 0. (9) And te sceme saves te location of i for decrypting te ciper image in one piece. Te detailed of encryption is illustrated in Fig.. 3. Decryption algoritm Te decryption process is similar to tat of encryption procedure in te reversed order. It can be briefly stated as follows Step 1. Iterating te logistic maps for Q times to get rid of te transient effect; Step. Concurrently generating te caotic orbits and order as encryption process; Step 6. Implementing inverse wavelet transform by te coefficient l and, and obtaining te Mim(i); Step 7. Recovering te P(i) by (11) P ( Order(i) ) = Mim(i), i = 1,,...,M N ; (11) Step 8. Outputting te plain-image. 4 PERFORMANCE ANALYSES AND SIMULATION 4.1 Te space of key In a good image cryptosystem, te space of key sould be enoug large to make brute-force attack infeasible. In tis proposed arcitecture, te Ikey consists of 16 elements, namely Ikey = {x i }, i = 1,,...,16, x i [0,55]. So te key space of te proposed arcitecture is equal to , wic is sufficiently large to meet te need for practical application. 4. Key sensitivity In tis part, te key sensitivity will be performed as follows: Step 1. Calculate te Imkey of te standard test image Lena; Step. Encrypt te test image by Ikey ; Step 3. Sligtly cange te generated Ikey , and encrypt te same plain-image; Step 4. Compare te ciper-image wic is encrypted by different key. Te results are: te image encrypted by te key as 99.59% of different from te image encrypted by te key in terms of

5 94 Bin Wang Xiaopeng Wie Qiang Zang Cao Ce: IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND... Fig. 4. (a) plain-image of Lena, (b) istogram of te plain-image, (c) ciper-image, (d) istogram of te ciper-image Fig. 5. (a) te correlation of vertical adjacent two pixels for original image, (b) te correlation of vertical adjacent two pixels for ciper-image pixel values, altoug tere is only one bit difference in te two keys. Figure 3 sows te test result. Moreover, wen a key is used to encrypt an image wile anoter trivially canged key is used to decrypt te cipered image, te decryption also completely fails. 4.3 Statistical analysis As Sannon said: It is possible to solve many kinds of cipers by statistical analysis [7]. Terefore, e suggested two metods of diffusion and confusion sould be used in any cryptosystems. In tis proposed arcitecture, te standard Lena test image of size is selected to test te property of resisting statistical analysis. Te istograms of encrypted image are sown in Fig. 4. From te figure, one can see tat te istogram of te cipered image is fairly uniform and is significantly differentfromtatofteoriginalimage.totesttecorrelation between two vertically adjacent pixels, two orizontally adjacent pixels, and two diagonally adjacent pixels, respectively, in a cipered image, te following procedure is carried out. First, randomly select 1000 pairs of two adjacent pixels from an image. Ten, calculate te correlation coefficient of eac pair by using te following two

6 Journal of ELECTRICAL ENGINEERING 65, NO., formulas [1] Table 1. Comparing results NPCR UACI Proposed sceme 99.59% 8.1% Wang s work 44.7% % Gupta s work 99.6% 17.30% cov(x,y) = E {( x E(x) )( y E(y) )}, (1) R xy = cov(x, y) D(x) D(y) (13) Were x and y are grey-scale values of two adjacent pixels in te image. In numerical computation, te following discrete formulas are employed E(x) = 1 N D(x) = 1 N cov(x,y) = 1 N N x i, (14) i=1 N ( xi E(x) ), (15) i=1 N {( xi E(x) )( y i E(y) )}. (16) i=1 Figure 5 sows te correlation distribution of two vertically adjacent pixels in te plain-image and tat in te ciper-image: te correlation coefficients are and , respectively, wic are far apart. 4.4 Differential attack To test te property of resisting differential attack of te proposed arcitecture, two common quantitative criteria are employed: number of pixels cange rate (NPCR) and unified average canging intensity (UACI). Te NPCR and UACI are defined as follows [10,8] i,j NPCR = D(i,j) 100%, (17) UACI = 1 [ W H i,j W H C 1 ( i,j) C (i,j) ] % (18) were C 1 and C are te two ciper-image wose corresponding Ikeys ave only difference, te grey-scale values of te pixels at poison (I,j) of C 1 and C are denoted as C 1 (i,j) and C (i,j), respectively; W and H are te widt and eigt of te ciper-image; D(i, j) is determined by C 1 (i,j) and C (i,j), namely, if C 1 (i,j) = C (i,j) ten D(i,j) = 0 oterwise, D(i,j) = 1. In te Table 1, we compare our results of NPCR wit te Wang [5] and Gupta [10] works. Te wole permutation-diffusion round is repeated only once. Our results are te average of ten trials. Comparing wit previous works, it suggests tat our sceme as iger security. 4.5 Resistance to known-plaintext and cosenplaintext attacks In te proposed sceme, tis sceme uses different parameters and values of caotic maps wic are used in te permutation and diffusion stage to overcome te first flow. At te same time, it makes te ciper key related to te permuted image to overcome te second flow. So te different control conditions, key streams and non-identical ciper-images will be generated by distinct plain-images. Te attacker cannot obtain useful information by encrypting some special images since te resultant information is only related to tose cosen-images. Terefore, te proposed algoritm can well resist te knownplaintext and te cosen-plaintext attacks. 5 CONCLUSIONS A novel sceme for image encryption based on caotic maps and reversible integer wavelet transform as been proposed in tis paper. Te different parameters and initial values of caotic maps are obtained by ciper key wic is related to te plain-image. Ten te order is from caotic maps tat are used to permute plain-image. Subsequently, te permuted image is processed by integer wavelet transform. Te coefficient is diffused by te orbits of caotic maps. Finally, te ciper image is obtained by inverse integer wavelet transform based on te diffused coefficient. Numerical experimental results and comparing wit previous works sow tat te proposed sceme possesses iger security tan previous works, wic is suitable for protecting te image information. Acknowledgment We would like to tank te anonymous reviewers for elpful comments. Tis work is supported by te National Hig Tecnology Researc and Development Program ( 863 Program) of Cina (No. 009AA01Z416) te National Natural Science Foundation of Cina( , ), Program for Cangjiang Scolars and Innovative Researc Team in University(IRT1109), te Program for Liaoning Innovative Researc Team in University(LT011018), te Program for Liaoning Excellent Talents in University (LR01003), te Program for Liaoning Science and Tecnology Researc in University (LS010179) and te open fund of Key Laboratory of Advanced Design and Intelligent Computing (Dalian University), Ministry of Education, Dalian University (ADIC01001).

7 96 Bin Wang Xiaopeng Wie Qiang Zang Cao Ce: IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND... References [1] CHEN, G. MAO, Y. CHUI, C. K.: A Symmetric Image Encryption Sceme based on 3D Caotic Cat Maps, Caos, Solitons & Fractals 1 (004), [] LIAN, S. SUN, J. WANG, Z.: A Block Ciper based on a Suitable Use of te Caotic Standard Map, Caos, Solitons & Fractals 6 (005), [3] WONG, K. W. KWOK, B. S. H. LAW, W. S.: A Fast Image Encryption Sceme based on Caotic Standard Map, Pysics Letters A 37 (008), [4] WANG, Y. WONG, K. W. LIAO, X. XIANG, T. CHEN, G. A Caos-Based Image Encryption Algoritm wit Variable Control Parameters: Caos, Solitons & Fractals 41 (009), [5] WANG, Y. WONG, K. W. LIAO, X. CHEN, G.: A New Caos-Based Fast Image Encryption Algoritm, Applied Soft Computing 11 (011), [6] KANSO, A. GHEBLEH, M.: A Novel Image Encryption Algoritm based on a 3D Caotic Map, Communications in Nonlinear Science and Numerical Simulation 17 (01), [7] SEYEDZADEH, S. M. MIRZAKUCHAKI, S.: Signal Processing 9 (01), [8] TANEJA, N. RAMAN, B. GUPTA, I.: Selective Image Encryption in Fractional Wavelet Domain, AEU-International Journal of Electronics and Communications (010). [9] GUPTA, R. AGGARWAL, A. PAL, S. K.: Design and Analysis of New Suffle Encryption Scemes for Multimedia, Defence Science Journal 6 (01), [10] GUPTA, K. SILAKARI, S.: Novel Approac for Fast Compressed Hybrid Color Image Cryptosystem, Advances in Engineering Software 49 (01), 9-4. [11] ADAMS, M. D. KOSSENTNI, F.: Reversible Integer-to-Integer Wavelet Transforms for Image Compression: Performance Evaluation and Analysis, Image Processing, IEEE Transactions on 9 (000), [1] TIAN, J.: Reversible Data Embedding using a Difference Expansion, Circuits and Systems for Video Tecnology, IEEE Transactions on 13 (003), [13] LEE, S. YOO, C. D. KALKER, T.: Reversible Image Watermarking based on Integer-to-Integer Wavelet Transform, Information Forensics and Security, IEEE Transactions on (007), [14] ARSALAN, M. MALIK, S. A. KHAN, A.: Intelligent Reversible Watermarking in Integer Wavelet Domain for Medical Images, Journal of Systems and Software 85 (01), [15] GUAN, Z. H. HUANG, F. GUAN, W.: Caos-Based Image Encryption Algoritm, Pysics Letters A 346 (005), [16] GAO, T. CHEN, Z.: A New Image Encryption Algoritm based on Hyper-Caos, Pysics Letters A 37 (008), [17] YE, G.: Image Scrambling Encryption Algoritm of Pixel Bit based on Caos Map, Pattern Recognition Letters 31 (010), [18] GE, X. LIU, F. L. LU, B. WANG, W.: Cryptanalysis of a Spatiotemporal Caotic Image/Video Cryptosystem and its Improved Version, Pysics Letters A 375 (011), [19] HERMASSI, H. RHOUMA, R. BELGHITH, S.: Security Analysis of Image Cryptosystems only or Partially based on a Caotic Permutation, Journal of Systems and Software 85 (01), [0] ZHAO, L. ADHIKARI, A. XIAO, D. SAKURAI, K.: On te Security Analysis of an Image Scrambling Encryption of Pixel Bit and its Improved Sceme based on Self-Correlation Encryption, Communications in Nonlinear Science and Numerical Simulation 17 (01), [1] LIAN, S. SUN, J. WANG, Z.: Security Analysis of a Caos-Based Image Encryption Algoritm, Pysica A: Statistical Mecanics and its Applications 351 (005), [] ALVAREZ, G. LI, S. Some Basic Cryptograpic Requirements for Caos-Based Cryptosystems: International Journal of Bifurcation and Caos in Applied Sciences and Engineering 16 (006), 19. [3] XIAO, D. LIAO, X. WEI, P.: Analysis and Improvement of a Caos-Based Image Encryption Algoritm, Caos, Solitons & Fractals 40 (009), [4] GAO, T. CHEN, Z.: Image Encryption based on a New Total Suffling Algoritm, Caos, Solitons & Fractals 38 (008), [5] LI, S. LI, Q. LI, W. MOU, X. CAI, Y.: Statistical Properties of Digital Piecewise Linear Caotic Maps and teir Roles in Cryptograpy and Pseudo-Random Coding, Cryptograpy and Coding (001), [6] LI, S. CHEN, G. MOU, X.: On te Dynamical Degradation of Digital Piecewise Linear Caotic Maps, International JournAL of Bifurcation and Caos in Applied Sciences and Engineering 15 (005), [7] SHANNON, C. E.: Communication Teory of Secrecy Systems, MD Computing 15 (1998), [8] KWOK, H. TANG, W. K. S.: A Fast Image Encryption System based on Caotic Maps wit Finite Precision Representation, Caos, Solitons & Fractals 3 (007), Received 4 January 013 Xiaopeng Wei is a professor at Dalian University of Tecnology and Dalian University, Dalian, Cina. His researc areas include computer animation, intelligent CAD. So far, e as (co-) autored about 160 papers publised. Bin Wang is a doctoral student of Scool of Mecanical and Engineering at Dalian University of Tecnology Dalian, Cina. His researc areas include DNA Computing, DNA Sequence designing, DNA Cryptograpy and Biological Network. So far, e as (co-) autored about 16 papers publised. Qiang Zang is a professor at Dalian University, Dalian, Cina. His researc interests are computer animation, intelligent computing. Now e as served as editorial boards of seven international journals and as edited special issues in journals suc as Neurocomputing and International Journal of Computer Applications in Tecnology. Cao Ce is a lectuer at Dalian University, Dalian, Cina. He as received is PD degree in 010 from Dalian University of Tecnology.

ARTICLE IN PRESS. Optik xxx (2015) xxx xxx. Contents lists available at ScienceDirect. Optik. jo ur nal homepage:

ARTICLE IN PRESS. Optik xxx (2015) xxx xxx. Contents lists available at ScienceDirect. Optik. jo ur nal homepage: Optik xxx (2015) xxx xxx Contents lists available at ScienceDirect Optik jo ur nal homepage: www.elsevier.de/ijleo 1 2 Evaluating the permutation and diffusion operations used in image encryption based

More information

A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM

A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM International Journal of Pure and Applied Mathematics Volume 80 No. 4 2012, 609-616 ISSN: 1311-8080 (printed version) url: http://www.ijpam.eu PA ijpam.eu A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED

More information

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6) International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic

More information

COLOR IMAGE ENCRYPTION BASED ON LOGISTIC MAPPING AND DOUBLE RANDOM PHASE ENCODING

COLOR IMAGE ENCRYPTION BASED ON LOGISTIC MAPPING AND DOUBLE RANDOM PHASE ENCODING Page 1 of 15 COLOR IMAGE ENCRYPTION BASED ON LOGISTIC MAPPING AND DOUBLE RANDOM PHASE ENCODING HUIQING HUANG 1,2, SHOUZHI YANG 1, Abstract. In this paper, we propose a novel method to encrypt a color image

More information

An improved image encryption algorithm based on chaotic maps

An improved image encryption algorithm based on chaotic maps Vol 17 No 11, November 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(11)/4027-06 Chinese Physics B and IOP Publishing Ltd An improved image encryption algorithm based on chaotic maps Xu Shu-Jiang( ) a),

More information

Image Encryption Algorithm Based on. Logistic Map and Pixel Mapping Table. Hazem Al-Najjar Asem Al-Najjar

Image Encryption Algorithm Based on. Logistic Map and Pixel Mapping Table. Hazem Al-Najjar Asem Al-Najjar Encryption Algorithm Based on Logistic Map and Pixel Mapping Table Hazem Al-Najjar Asem Al-Najjar Encryption Algorithm Based on Logistic Map and Pixel Mapping Table Hazem Mohammad Al-Najjar Technical College

More information

Spatial image encryption algorithm based on chaotic map and pixel frequency

Spatial image encryption algorithm based on chaotic map and pixel frequency . Supplementary File. SCIENCE CHINA Information Sciences Spatial image encryption algorithm based on chaotic map and pixel frequency Guodong YE 1,2* & Xiaoling HUANG 1 1 Faculty of Mathematics and Computer

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

A new image encryption algorithm based on hyper-chaos

A new image encryption algorithm based on hyper-chaos Physics Letters A 372 (2008) 394 400 www.elsevier.com/locate/pla A new image encryption algorithm based on hyper-chaos Tiegang Gao a,, Zengqiang Chen b a College of Software, Nankai University, Tianjin

More information

An image encryption based on DNA coding and 2DLogistic chaotic map

An image encryption based on DNA coding and 2DLogistic chaotic map An encryption based on DNA coding and 2DLogistic chaotic map FAYZA ELAMRAWY, MAHA SHARKAS, ABDEL MONEM NASSER Arab Academy for Science & Technology Abu Kir, Alexandria EGYPT engfayzaelamrawy@gmail.com,

More information

An Image Encryption Algorithm based on 3D Lorenz map

An Image Encryption Algorithm based on 3D Lorenz map ISSN No. 0976-5697 Volume 4, No. 2, Jan-Feb 2013 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info An Encryption Algorithm based on 3D Lorenz

More information

arxiv: v3 [cs.cr] 21 Sep 2016

arxiv: v3 [cs.cr] 21 Sep 2016 Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Chengqing Li,a,b, Kwok-Tung Lo b a College of Information Engineering, Xiangtan University, Xiangtan

More information

A novel chaos-based image encryption scheme

A novel chaos-based image encryption scheme Annals of the University of Craiova, Mathematics and Computer Science Series Volume 41(1), 2014, Pages 47 58 ISSN: 1223-6934 A novel chaos-based image encryption scheme Ana Cristina Dăscălescu, Radu Boriga,

More information

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption I.J. Image, Graphics and Signal Processing, 24,, 5-6 Published Online October 24 in MECS (http://www.mecs-press.org/) DOI:.585/ijigsp.24..7 A Chaos-based Pseudorandom Permutation and Bilateral Diffusion

More information

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Implementation of Gray Image Encryption using Multi- Level of Permutation and Substitution

Implementation of Gray Image Encryption using Multi- Level of Permutation and Substitution Implementation of Gray Image Encryption using Multi- Level of Permutation and Substitution Dina Riadh Alshibani Assistant Lecturer Computer Science Department University of Al Mustansiriyah / Iraq - Baghdad

More information

Colour image encryption based on logistic mapping and double random-phase encoding

Colour image encryption based on logistic mapping and double random-phase encoding IET Image Processing Research Article Colour image encryption based on logistic mapping and double random-phase encoding Huiqing Huang 1, Shouzhi Yang 1 1 Department of Mathematics, Shantou University,

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

ABSTRACT. Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly Department of Computer Science, Mustansiriyah University, Baghdad, Iraq

ABSTRACT. Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly Department of Computer Science, Mustansiriyah University, Baghdad, Iraq 2017 IJSRSET Volume 3 Issue 5 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic

More information

Some Handwritten Signature Parameters in Biometric Recognition Process

Some Handwritten Signature Parameters in Biometric Recognition Process Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

A New Chaos Based Image Encryption and Decryption Using a Hash Function

A New Chaos Based Image Encryption and Decryption Using a Hash Function A New Chaos Based Image Encryption and Decryption Using a Hash Function Payal Verma 1, Prabhakar Sharma 2 1Research scholar Department of Computer Science and Engineering Raipur Institute of Technology,

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Cryptanalysis of LOKI. Lars Ramkilde Knudsen. Aarhus Universitet Datalogisk Afdeling. Ny Munkegade. DK-8000 Aarhus C. Abstract

Cryptanalysis of LOKI. Lars Ramkilde Knudsen. Aarhus Universitet Datalogisk Afdeling. Ny Munkegade. DK-8000 Aarhus C. Abstract 1 Cryptanalysis of LOKI Lars Ramkilde Knudsen Aarus Universitet Datalogisk Afdeling Ny Munkegade DK-8000 Aarus C. Abstract In [BPS90] Brown, Pieprzyk and Seberry proposed a new encryption primitive, wic

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

A Chaotic Block Cipher for Real-Time Multimedia

A Chaotic Block Cipher for Real-Time Multimedia Journal of Computer Science 8 (6): 994-1000, 2012 ISSN 1549-3636 2012 Science Publications A Chaotic Block Cipher for Real-Time Multimedia Radha, N. and M. Venkatesulu Department of Computer Applications,

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Differential cryptanalysis of image cipher using block-based scrambling and image filtering Feng Yu, Xinhui Gong, Hanpeng Li, Xiaohong Zhao, Shihong Wang School of Sciences, Beijing University of Posts

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance

More information

Chaotic Image Encryption via Convex Sinusoidal Map

Chaotic Image Encryption via Convex Sinusoidal Map Chaotic Image Encryption via Convex Sinusoidal Map F. ABU-AMARA *, I. ABDEL-QADER Department of Computer Engineering Al-Hussein Bin Talal University P.O.Box:, Ma an Jordan fadiabuamara@ahu.edu.jo Department

More information

A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map

A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map Computer and Information Science; Vol. 7, No. 4; 214 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education A Novel Encryption Scheme for Digital Image - Based on One Dimensional

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

A New Image Cryptosystem Based on Chaotic Map and Continued Fractions

A New Image Cryptosystem Based on Chaotic Map and Continued Fractions A New Image Cryptosystem Based on Chaotic Map and Continued Fractions Atef Masmoudi, Mohamed Selim Bouhlel, William Puech To cite this version: Atef Masmoudi, Mohamed Selim Bouhlel, William Puech. A New

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis

A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis Soosaimicheal Aruljothi (Corresponding author) Research Scholar, Department of Computer Applications, Kalasalingam University,

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,

More information

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in September 2008. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

SUPER OBLIQUE INCIDENCE INTERFEROMETER USING SWS PRISM

SUPER OBLIQUE INCIDENCE INTERFEROMETER USING SWS PRISM SUPER OBLIQUE INCIDENCE INTERFEROMETER USING SWS PRISM Yukitosi OTANI 1,2), Yasuiro MIZUTANI 2), Noriiro UMEDA 2) 1) Optical Sciences Center, University of Arizona, Arizona 85721 2) Dept, of Mec. Sys.

More information

Implementation of Integral based Digital Curvature Estimators in DGtal

Implementation of Integral based Digital Curvature Estimators in DGtal Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

With the rapid development of digital technologies and

With the rapid development of digital technologies and ALMADAR JOURNAL FOR COMMUNICATIONS, INFORMATION TECHNOLOGY, AND APPLICATIONS 1 An Encryption Algorithm Based on Maps and Discrete Linear Chirp Transform Osama A S Alkishriwo 1 arxiv:187.2647v1 [eess.iv]

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

The (, D) and (, N) problems in double-step digraphs with unilateral distance

The (, D) and (, N) problems in double-step digraphs with unilateral distance Electronic Journal of Grap Teory and Applications () (), Te (, D) and (, N) problems in double-step digraps wit unilateral distance C Dalfó, MA Fiol Departament de Matemàtica Aplicada IV Universitat Politècnica

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application

Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application Moussa Farajallah Rawan Qumsieh Samer Isayed College of Information Technology and Computer Engineering Palestine Polytechnic University

More information

Traffic Sign Classification Using Ring Partitioned Method

Traffic Sign Classification Using Ring Partitioned Method Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Image Registration via Particle Movement

Image Registration via Particle Movement Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Asymmetric Image Encryption Approach with Plaintext-Related Diffusion

Asymmetric Image Encryption Approach with Plaintext-Related Diffusion RADIOENGINEERING, VOL. 27, NO. 1, APRIL 218 281 Asymmetric Image Encryption Approach with Plaintext-Related Diffusion Jakub ORAVEC, Jan TURAN, Lubos OVSENIK, Tomas IVANIGA, David SOLUS, Michal MARTON Dept.

More information

Research Article Chaotic Image Encryption Design Using Tompkins-Paige Algorithm

Research Article Chaotic Image Encryption Design Using Tompkins-Paige Algorithm Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 762652, 22 pages doi:10.1155/2009/762652 Research Article Chaotic Image Encryption Design Using Tompkins-Paige

More information

HOUGH TRANSFORM GENERATED STRONG IMAGE HASHING SCHEME FOR COPY DETECTION

HOUGH TRANSFORM GENERATED STRONG IMAGE HASHING SCHEME FOR COPY DETECTION How to cite tis article: Srivastava, M. Siddiqui, J., & Ali, M. A. (218). Houg transform generated strong image asing sceme for copy detection. Journal of Information and Communication Tecnology, 17(4),

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP 16t European Signal Processing Conference (EUSIPCO 008), Lausanne, Switzerland, August 5-9, 008, copyrigt by EURASIP ADAPTIVE WINDOW FOR LOCAL POLYNOMIAL REGRESSION FROM NOISY NONUNIFORM SAMPLES A. Sreenivasa

More information

DraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment*

DraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment* DraXRouter: Global Routing in X-Arcitecture wit Dynamic Resource Assignment* Zen Cao 1, Tong Jing 1, Yu Hu 2, Yiyu Si 2, Xianlong Hong 1, Xiaodong Hu 3, Guiying Yan 3 1 Computer Science & Tecnology Department

More information

Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process

Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process Seetaiah Kilaru, Yojana Kanukuntla, Asma Firdouse, Mohammad Bushra & Sindhu chava

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image

A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image Journal of Computer Science 5 (5): 355-362, 2009 ISSN 1549-3636 2009 Science Publications A Practical Approac of Selecting te Edge Detector Parameters to Acieve a Good Edge Map of te Gray Image 1 Akram

More information

A NEW BLOCK CIPHER ALGORITHM FOR IMAGE ENCRYPTION BASED ON CHAOTIC SYSTEM AND S-BOX

A NEW BLOCK CIPHER ALGORITHM FOR IMAGE ENCRYPTION BASED ON CHAOTIC SYSTEM AND S-BOX International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 13, December 2018, pp.318 327, Article ID: IJCIET_09_13_032 Available online at http://www.ia aeme.com/ijciet/issues.asp?jtype=ijciet&vtype=

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER

SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER Belazi Akram, Benrhouma Oussama, Hermassi Houcemeddine and Belghith Safya SysComLab, Ecole Nationale d Ingénieurs de Tunis (ENIT), Tunis, Tunisia belazi.akram@gmail.com

More information

Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared with Another Algorithm

Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared with Another Algorithm 20 The International Arab Journal of Information Technology Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared with Another Algorithm Osama Abu Zaid 1,

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Economic design of x control charts considering process shift distributions

Economic design of x control charts considering process shift distributions J Ind Eng Int (2014) 10:163 171 DOI 10.1007/s40092-014-0086-2 ORIGINAL RESEARCH Economic design of x control carts considering process sift distributions Vijayababu Vommi Rukmini V. Kasarapu Received:

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

A symmetric image encryption scheme based on 3D chaotic cat maps

A symmetric image encryption scheme based on 3D chaotic cat maps Chaos, Solitons and Fractals 21 (2004) 749 761 www.elsevier.com/locate/chaos A symmetric image encryption scheme based on 3D chaotic cat maps Guanrong Chen a, *, Yaobin Mao b, Charles K. Chui c,d a Department

More information