Skip Content
You are currently on the new version of our website. Access the old version .

108 Results Found

  • Article
  • Open Access
13 Citations
3,640 Views
14 Pages

Recognition of Dorsal Hand Vein Based Bit Planes and Block Mutual Information

  • Yiding Wang,
  • Heng Cao,
  • Xiaochen Jiang and
  • Yuanyan Tang

28 August 2019

The dorsal hand vein images captured by cross-device may have great differences in brightness, displacement, rotation angle and size. These deviations must influence greatly the results of dorsal hand vein recognition. To solve these problems, the me...

  • Article
  • Open Access
9 Citations
3,236 Views
18 Pages

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing

  • Maham Nasir,
  • Waqas Jadoon,
  • Iftikhar Ahmed Khan,
  • Nosheen Gul,
  • Sajid Shah,
  • Mohammed ELAffendi and
  • Ammar Muthanna

12 September 2022

Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open environments such as the cloud and internet. Integrity and undetectability of steganographic images are amongst the main concerns in any RDH scheme. As steg...

  • Article
  • Open Access
5 Citations
1,939 Views
17 Pages

15 July 2023

Using the local correlation of carrier images to embed secret data in MSBs is a popular scheme for reversible data hiding in encrypted images (RDHEI). However, most existing methods based on this scheme face challenges in achieving complete compressi...

  • Article
  • Open Access
43 Citations
4,117 Views
20 Pages

26 January 2022

In response to the problems of high complexity and the large amount of operations of existing color image encryption algorithms, a low-complexity, low-operation color image encryption algorithm based on a combination of bit-plane and chaotic systems...

  • Article
  • Open Access
1,960 Views
19 Pages

Fuzzy Bit-Plane-Dependence Region Competition

  • Siukai Choy,
  • Tszching Ng,
  • Carisa Yu and
  • Benson Lam

26 September 2021

This paper presents a novel variational model based on fuzzy region competition and statistical image variation modeling for image segmentation. In the energy functional of the proposed model, each region is characterized by the pixel-level color fea...

  • Article
  • Open Access
19 Citations
4,074 Views
15 Pages

27 April 2020

The establishment of automatic diagnostic systems able to detect and classify skin lesions at the initial stage are getting really relevant and effective in providing support for medical personnel during clinical assessment. Image segmentation has a...

  • Article
  • Open Access
2 Citations
1,312 Views
25 Pages

This study presents a novel encryption method for RGB (Red–Green–Blue) color images that combines scrambling techniques with the logistic map equation. In this method, image scrambling serves as a reversible transformation, rendering the...

  • Article
  • Open Access
2 Citations
2,102 Views
25 Pages

27 November 2023

Over the past few years, a considerable number of researchers have shown great interest in reversible data hiding for encrypted images (RDHEI). One popular category among various RDHEI methods is the reserving room before encryption (RRBE) approach,...

  • Article
  • Open Access
5 Citations
4,261 Views
28 Pages

19 January 2025

Edge detection methods are significant in medical imaging-assisted diagnosis. However, existing methods based on grayscale gradient computation still need to be optimized in practicality, especially in terms of actual visual quality and sensitivity t...

  • Article
  • Open Access
4 Citations
2,646 Views
22 Pages

A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding

  • V. M. Manikandan,
  • Kandala Sree Rama Murthy,
  • Bhavana Siddineni,
  • Nancy Victor,
  • Praveen Kumar Reddy Maddikunta and
  • Saqib Hakak

28 September 2022

Reversible data hiding (RDH) is a recently emerged research domain in the field of information security domain with broad applications in medical images and meta-data handling in the cloud. The amount of data required to handle the healthcare sector...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,622 Views
17 Pages

21 April 2021

Median filtering is being used extensively for image enhancement and anti-forensics. It is also being used to disguise the traces of image processing operations such as JPEG compression and image resampling when utilized in image de-noising and smoot...

  • Article
  • Open Access
26 Citations
2,709 Views
13 Pages

22 April 2021

This paper analyzes the security of image encryption systems based on bit plane extraction and multi chaos. It includes a bit-level permutation for high, 4-bit planes and bit-wise XOR diffusion, and finds that the key streams in the permutation and d...

  • Article
  • Open Access
2 Citations
2,777 Views
15 Pages

A 14-Bit Hybrid Analog-to-Digital Converter for Infrared Focal Plane Array Digital Readout Integrated Circuit

  • Douming Hu,
  • Libin Yao,
  • Nan Chen,
  • Jiqing Zhang,
  • Shengyou Zhong,
  • Wenbiao Mao,
  • Fang Zhu and
  • Juan Zhang

5 June 2024

This paper presents a 14-bit hybrid column-parallel compact analog-to-digital converter (ADC) for the application of digital infrared focal plane arrays (IRFPAs) with compromised power and speed performance. The proposed hybrid ADC works in two phase...

  • Article
  • Open Access
8 Citations
2,364 Views
19 Pages

31 May 2023

In this paper, we propose a reversible data hiding scheme in an encrypted image based on bit-plane redundancy of prediction error. The scheme greatly improves the embedding capacity while maintaining lossless image recovery and error-free secret data...

  • Concept Paper
  • Open Access
6 Citations
7,765 Views
10 Pages

4 April 2014

Wheeler’s observer-participancy and the related it from bit credo refer to quantum non-locality and contextuality. The mystery of these concepts slightly starts unveiling if one encodes the (in)compatibilities between qubit observables in the relevan...

  • Article
  • Open Access
7 Citations
2,467 Views
14 Pages

In this paper, we propose a novel reversible data hiding in encrypted images (RDH-EI) method that achieves the highest hiding capacity in the RDH-EI research field and full flexibility in the processing order without restrictions. In the previous wor...

  • Article
  • Open Access
1 Citations
1,237 Views
16 Pages

3 January 2025

The data acquisition rate of electromagnetic spectrum sensors is exceedingly high. However, the throughput of current high-speed spaceborne solid-state recorders (S-SSR) remains relatively low, making it difficult for the data to be fully stored. To...

  • Article
  • Open Access
1,066 Views
19 Pages

Weighted Color Image Encryption Algorithm Based on RNA Extended Dynamic Coding and Quantum Chaotic System

  • Xiangyu Zhang,
  • Heping Wen,
  • Wei Feng,
  • Shenghao Kang,
  • Zhiyu Xie,
  • Xuexi Zhang and
  • Yiting Lin

11 August 2025

The rapid development of Internet technology, while providing convenient services for users, has also aroused deep concern among the public about the issue of privacy leakage during image data transmission. To address this situation, this article pro...

  • Article
  • Open Access
5 Citations
2,062 Views
33 Pages

A DNA Encoding Image Encryption Algorithm Based on Chaos

  • Li Huang,
  • Cong Ding,
  • Zhenjie Bao,
  • Haitao Chen and
  • Changsheng Wan

18 April 2025

With the development of society and the Internet, images have become an important medium for information exchange. To improve the security of image encryption and transmission, a new image encryption algorithm based on bit-plane decomposition, DNA en...

  • Article
  • Open Access
43 Citations
4,099 Views
23 Pages

A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography

  • Haotian Liang,
  • Guidong Zhang,
  • Wenjin Hou,
  • Pinyi Huang,
  • Bo Liu and
  • Shouliang Li

19 June 2021

Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic cu...

  • Article
  • Open Access
48 Citations
9,425 Views
19 Pages

A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

  • Chong Fu,
  • Jun-Bin Huang,
  • Ning-Ning Wang,
  • Qi-Bin Hou and
  • Wei-Min Lei

10 February 2014

Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is red...

  • Article
  • Open Access
14 Citations
3,826 Views
20 Pages

A Nonlinearly Modulated Logistic Map with Delay for Image Encryption

  • Shouliang Li,
  • Benshun Yin,
  • Weikang Ding,
  • Tongfeng Zhang and
  • Yide Ma

15 November 2018

Considering that a majority of the traditional one-dimensional discrete chaotic maps have disadvantages including a relatively narrow chaotic range, smaller Lyapunov exponents, and excessive periodic windows, a new nonlinearly modulated Logistic map...

  • Review
  • Open Access
105 Citations
27,246 Views
25 Pages

The Quanta Image Sensor: Every Photon Counts

  • Eric R. Fossum,
  • Jiaju Ma,
  • Saleh Masoodian,
  • Leo Anzagira and
  • Rachel Zizza

10 August 2016

The Quanta Image Sensor (QIS) was conceived when contemplating shrinking pixel sizes and storage capacities, and the steady increase in digital processing power. In the single-bit QIS, the output of each field is a binary bit plane, where each bit re...

  • Article
  • Open Access
15 Citations
5,977 Views
28 Pages

Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD

  • Khushbu Khalid Butt,
  • Guohui Li,
  • Sajid Khan and
  • Sohaib Manzoor

16 January 2020

Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of...

  • Article
  • Open Access
59 Citations
3,792 Views
23 Pages

Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective

  • Hemalatha Mahalingam,
  • Thanikaiselvan Veeramalai,
  • Anirudh Rajiv Menon,
  • Subashanthini S. and
  • Rengarajan Amirtharajan

15 January 2023

With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them so that su...

  • Article
  • Open Access
12 Citations
2,412 Views
20 Pages

Reversible Data Hiding in Encrypted Images Based on Hybrid Prediction and Huffman Coding

  • Liansheng Sui,
  • Han Li,
  • Jie Liu,
  • Zhaolin Xiao and
  • Ailing Tian

8 June 2023

As an interesting technique that allows data extraction and image recovery without any loss, reversible data hiding in encrypted images is an area of great concern in the field of information security. In this paper, a new reversible data hiding meth...

  • Article
  • Open Access
7 Citations
2,464 Views
26 Pages

15 February 2023

As the rapid development of third-party storage and homomorphic encryption have profoundly stimulated the desire for secure communication, reversible data hiding in encrypted images has received widespread attention, since it allows lossless data con...

  • Article
  • Open Access
7 Citations
2,264 Views
15 Pages

Enhanced CPU Design for SDN Controller

  • Hiba S. Bazzi,
  • Ramzi A. Jaber,
  • Ahmad M. El-Hajj,
  • Fathelalem A. Hija and
  • Ali M. Haidar

31 July 2024

Software-Defined Networking (SDN) revolutionizes network management by decoupling control plane functionality from data plane devices, enabling the centralized control and programmability of network behavior. This paper uses the ternary system to imp...

  • Article
  • Open Access
25 Citations
2,981 Views
23 Pages

23 August 2022

A quantum color image encryption algorithm based on geometric transformation and intensity channel diffusion was designed. Firstly, a plaintext image was transformed into a quantum state form using the quantum image representation based on HSI color...

  • Article
  • Open Access
35 Citations
1,942 Views
19 Pages

Social Image Security with Encryption and Watermarking in Hybrid Domains

  • Conghuan Ye,
  • Shenglong Tan,
  • Jun Wang,
  • Li Shi,
  • Qiankun Zuo and
  • Wei Feng

6 March 2025

In this digital era, social images are the most vital information carrier on multimedia social platforms. More and more users are interested in sharing social images with mobile terminals on multimedia social platforms. Social image sharing also face...

  • Article
  • Open Access
2 Citations
2,087 Views
22 Pages

Low Computational Coding-Efficient Distributed Video Coding: Adding a Decision Mode to Limit Channel Coding Load

  • Shahzad Khursheed,
  • Nasreen Badruddin,
  • Varun Jeoti,
  • Dejan Vukobratovic and
  • Manzoor Ahmed Hashmani

28 January 2023

Distributed video coding (DVC) is based on distributed source coding (DSC) concepts in which video statistics are used partially or completely at the decoder rather than the encoder. The rate-distortion (RD) performance of distributed video codecs su...

  • Article
  • Open Access
13 Citations
3,221 Views
28 Pages

22 July 2023

Due to their rich information, color images are frequently utilized in many different industries, but the network’s security in handling their delivery of images must be taken into account. To improve the security and efficiency of color images...

  • Article
  • Open Access
24 Citations
5,908 Views
18 Pages

An Image Encryption Algorithm Based on Random Hamiltonian Path

  • Wei Zhang,
  • Shuwen Wang,
  • Weijie Han,
  • Hai Yu and
  • Zhiliang Zhu

6 January 2020

In graph theory, Hamiltonian path refers to the path that visits each vertex exactly once. In this paper, we designed a method to generate random Hamiltonian path within digital images, which is equivalent to permutation in image encryption. By these...

  • Article
  • Open Access
2 Citations
1,724 Views
21 Pages

23 February 2024

Omnidirectional images have gained significant popularity and drawn great attention nowadays, which poses challenges to omnidirectional image processing in solving the bottleneck of storage and transmission. Projecting onto a two-dimensional image pl...

  • Article
  • Open Access
37 Citations
6,335 Views
20 Pages

Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains

  • Nayeem Hasan,
  • Md Saiful Islam,
  • Wenyu Chen,
  • Muhammad Ashad Kabir and
  • Saad Al-Ahmadi

17 August 2021

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analy...

  • Article
  • Open Access
2 Citations
2,802 Views
25 Pages

Numerical Investigation of the Nonlinear Drill String Dynamics Under Stick–Slip Vibration

  • Mohammad Javad Moharrami,
  • Hodjat Shiri and
  • Clóvis de Arruda Martins

15 November 2024

This paper presents a comprehensive analysis of the influence of rotary table velocity, weight-on-bit, and viscous damping on the drill string stick–slip vibration. The analysis allows for studying the qualitative and quantitative variation of...

  • Article
  • Open Access
37 Citations
3,113 Views
18 Pages

Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key

  • Heping Wen,
  • Zhen Liu,
  • Haowen Lai,
  • Chongfu Zhang,
  • Linhao Liu,
  • Jieyi Yang,
  • Yiting Lin,
  • Yunqi Li,
  • Yunlong Liao and
  • Rui Li
  • + 2 authors

3 September 2022

With the aim of tackling insufficient security in the chaotic encryption algorithm for digital images in the Optical Access Network, a color image encryption scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA)...

  • Article
  • Open Access
1 Citations
1,426 Views
11 Pages

Low-Cost Phased Array with Enhanced Gain at the Largest Deflection Angle

  • Haotian Wen,
  • Hansheng Su,
  • Yan Wen,
  • Xin Ma and
  • Deshuang Zhao

This paper presents a low-cost 1-bit phased array operating at 17 GHz (Ku band) with an enhanced scanning gain at the largest deflection angle to extend the beam coverage for ground target detection. The phased array is designed using 16 (2 × 8...

  • Article
  • Open Access
8 Citations
2,119 Views
21 Pages

21 March 2024

To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which...

  • Article
  • Open Access
5 Citations
2,101 Views
24 Pages

Optical Color Image Encryption Algorithm Based on Two-Dimensional Quantum Walking

  • Guohao Cui,
  • Xiaoyi Zhou,
  • Hao Wang,
  • Wentao Hao,
  • Anshun Zhou and
  • Jianqiang Ma

The double random phase encoding (DRPE) image encryption method has garnered significant attention in color image processing and optical encryption thanks to its R, G, and B parallel encryption. However, DRPE-based color image encryption faces two ch...

  • Article
  • Open Access
2 Citations
5,524 Views
17 Pages

Design of a High-Frame-Rate and Large-Grayscale Simulation Projection System Based on Digital Micromirror Devices

  • Lingxuan Meng,
  • Yongqiang Yang,
  • Hongyu Li,
  • Yanfu Tang,
  • Zhongming Li,
  • Ying Qu,
  • Min Zhao and
  • Junlin Li

26 August 2024

With the increasing acquisition speed of image sensors, it has become necessary to provide image sources with higher frame rates and grayscale in order to meet testing requirements. In the field of semi-physical simulation projection, digital micromi...

  • Feature Paper
  • Article
  • Open Access
4 Citations
4,642 Views
12 Pages

Low-Cost Portable Reader for Frequency Domain Chipless Tags: Architecture and Experimental Results on Depolarizing Tags

  • Luca Boggioni,
  • Lorenzo Monti,
  • Sergio Terranova,
  • Filippo Costa,
  • Simone Genovesi and
  • Giuliano Manara

In this paper, a low-cost chipless reader for detecting depolarizing tags is described. The reader operates in the frequency band (2–2.5) GHz, and it is compact and integrated in a single board. The reader architecture and its transmitting and...

  • Article
  • Open Access
4 Citations
2,337 Views
29 Pages

Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management

  • David Mata-Mendoza,
  • Diana Nuñez-Ramirez,
  • Manuel Cedillo-Hernandez,
  • Mariko Nakano-Miyatake and
  • Hector Perez-Meana

16 February 2023

A reversible data hiding in the encrypted domain (RDH-ED) aims to hide data within encrypted images, protecting its content, while allowing additional information to be distributed. This paper presents a complete separable RDH-ED scheme, whose main c...

  • Article
  • Open Access
2 Citations
2,511 Views
25 Pages

SACT: A New Model of Covert Communication Based on SDN

  • Leyi Shi,
  • Yuxiao Song,
  • Zhiyu Xue,
  • Yihao Liu and
  • Honglong Chen

19 December 2020

Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability. Software Defined Network (SDN) boasts more freedom thanks to its s...

  • Article
  • Open Access
7 Citations
4,205 Views
12 Pages

Structure Refinement and Thermal Stability Studies of the Uranyl Carbonate Mineral Andersonite, Na2Ca[(UO2)(CO3)3]·(5+x)H2O

  • Vladislav V. Gurzhiy,
  • Maria G. Krzhizhanovskaya,
  • Alina R. Izatulina,
  • Ginger E. Sigmon,
  • Sergey V. Krivovichev and
  • Peter C. Burns

11 December 2018

A sample of uranyl carbonate mineral andersonite, Na2Ca[(UO2)(CO3)3]·5−6H2O, originating from the Cane Springs Canyon, San Juan Co., UT, USA was studied using single-crystal and powder X-ray diffraction at various temperatures. Andersoni...

  • Article
  • Open Access
9 Citations
9,654 Views
21 Pages

Optimal and Robust Design Method for Two-Chip Out-of-Plane Microaccelerometers

  • Sangmin Lee,
  • Hyoungho Ko,
  • Byoungdoo Choi and
  • Dong-il Dan Cho

24 November 2010

In this paper, an optimal and robust design method to implement a two-chip out-of-plane microaccelerometer system is presented. The two-chip microsystem consists of a MEMS chip for sensing the external acceleration and a CMOS chip for signal processi...

  • Article
  • Open Access
8 Citations
14,091 Views
20 Pages

Optical Flow in a Smart Sensor Based on Hybrid Analog-Digital Architecture

  • Pablo Guzmán,
  • Javier Díaz,
  • Rodrigo Agís and
  • Eduardo Ros

30 March 2010

The purpose of this study is to develop a motion sensor (delivering optical flow estimations) using a platform that includes the sensor itself, focal plane processing resources, and co-processing resources on a general purpose embedded processor. All...

  • Article
  • Open Access
37 Citations
8,378 Views
14 Pages

Single-Photon Tracking for High-Speed Vision

  • Istvan Gyongy,
  • Neale A.W. Dutton and
  • Robert K. Henderson

23 January 2018

Quanta Imager Sensors provide photon detections at high frame rates, with negligible read-out noise, making them ideal for high-speed optical tracking. At the basic level of bit-planes or binary maps of photon detections, objects may present limited...

  • Article
  • Open Access
41 Citations
4,414 Views
20 Pages

Quad Element MIMO Antenna for C, X, Ku, and Ka-Band Applications

  • Raj Kumar Mistri,
  • Santosh Kumar Mahto,
  • Ajit Kumar Singh,
  • Rashmi Sinha,
  • Ahmed Jamal Abdullah Al-Gburi,
  • Thamer A. H. Alghamdi and
  • Moath Alathbah

18 October 2023

This article presents a quad-element MIMO antenna designed for multiband operation. The prototype of the design is fabricated and utilizes a vector network analyzer (VNA-AV3672D) to measure the S-parameters. The proposed antenna is capable of operati...

  • Article
  • Open Access
3,455 Views
10 Pages

Highly Integrated Resonant Tunneling Diode with Rectangular Waveguide Output for W-Band Communication System

  • Caixia Wang,
  • Yuan Yao,
  • Hang Jiang,
  • Tao Xiu,
  • Mohsin A. Shah Syedd,
  • Junsheng Yu and
  • Xiaodong Chen

A packaged resonant tunneling diode (RTD) with rectangular waveguide output for highly integrated wireless communication is proposed. The output signal of the RTD chip is radiated to the rectangular waveguide through an E plane probe transformer. Nex...

of 3