期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map
1
作者 Sultan Almakdi Mohammed SAlshehri +3 位作者 Yousef Asiri Mimonah Al Qathrady Anas Ibrar Jawad Ahmad 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3017-3036,共20页
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare appl... Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare applications.In this study,a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things(IoMT)and cloud storage.A disorganized three-dimensional map is the foundation of the proposed cipher.The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process.The suggested cryptosystem enhances the security of the delivered medical images by performing many operations.To validate the efficiency of the recommended cryptosystem,various medical image kinds are used,each with its unique characteristics.Several measures are used to evaluate the proposed cryptosystem,which all support its robust security.The simulation results confirm the supplied cryptosystem’s secrecy.Furthermore,it provides strong robustness and suggested protection standards for cloud service applications,healthcare,and IoMT.It is seen that the proposed 3D chaotic cryptosystem obtains an average entropy of 7.9998,which is near its most excellent value of 8,and a typical NPCR value of 99.62%,which is also near its extreme value of 99.60%.Moreover,the recommended cryptosystem outperforms conventional security systems across the test assessment criteria. 展开更多
关键词 jigsaw transformation CRYPTOSYSTEM image encryption medical images Ikeda map chaotic system
下载PDF
Optical Ciphering Scheme for Cancellable Speaker Identification System
2
作者 Walid El-Shafai Marwa A.Elsayed +5 位作者 Mohsen A.Rashwan Moawad I.Dessouky Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi EAbd El-Samie 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期563-578,共16页
Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.... Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.Then biometrics will forever be lost if these databases are attacked.Protecting privacy is the most important goal of cancelable biometrics.In order to protect privacy,therefore,cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases.One methodology to achieve non-invertibility is the employment of non-invertible transforms.This work suggests an encryption process for cancellable speaker identification using a hybrid encryption system.This system includes the 3D Jigsaw transforms and Fractional Fourier Transform(FrFT).The proposed scheme is compared with the optical Double Random Phase Encoding(DRPE)encryption process.The evaluation of simulation results of cancellable biometrics shows that the algorithm proposed is secure,authoritative,and feasible.The encryption and cancelability effects are good and reveal good performance.Also,it introduces recommended security and robustness levels for its utilization for achieving efficient cancellable biometrics systems. 展开更多
关键词 Cancellable biometrics jigsaw transform FrFT DRPE speaker identification
下载PDF
基于图像置乱技术融合FRFT的光学图像加密 被引量:4
3
作者 赵丽 齐兴斌 +1 位作者 李雪梅 田涛 《激光杂志》 CAS CSCD 北大核心 2014年第11期11-15,共5页
针对二维图像加密系统的安全性问题,本文提出一种融合分数傅里叶变换和图像置换技术的光学图像加密方案。首先,使用jigsaw变换算法将原始图像分解成若干子图,并随机平移子图;然后,利用Arnold变换对图像像素进行置乱;最后,采用分数傅里... 针对二维图像加密系统的安全性问题,本文提出一种融合分数傅里叶变换和图像置换技术的光学图像加密方案。首先,使用jigsaw变换算法将原始图像分解成若干子图,并随机平移子图;然后,利用Arnold变换对图像像素进行置乱;最后,采用分数傅里叶变换加密置乱图像,并迭代重复这些过程。将jigsaw排列指标、Arnold频率和分数傅里叶阶等参数组成一个密钥空间,通过仿真实验在光学实现方面评估算法性能。实验结果表明,本文提出的方案具有很好的灵活性和鲁棒性。 展开更多
关键词 光学图像加密 分数傅里叶变换 图像置乱 jigsaw变换 ARNOLD变换
下载PDF
一种智力玩具的研究
4
作者 甘健知 甘澄宇 《陕西科技大学学报(自然科学版)》 1994年第1期101-113,共13页
本文总结了作者对智力玩具多年研究的成果,对它的基本知识、图形表达、拼(?)规律、“式”与“解”的举例、操作要求、有关制造的问题、以及对未来的展望,均作了扼要的阐述。可以看出:这种智力玩具变化万千,兴味无穷,制作简易,成本低廉,... 本文总结了作者对智力玩具多年研究的成果,对它的基本知识、图形表达、拼(?)规律、“式”与“解”的举例、操作要求、有关制造的问题、以及对未来的展望,均作了扼要的阐述。可以看出:这种智力玩具变化万千,兴味无穷,制作简易,成本低廉,体积轻小,携带方便,一定可以成为人们长期爱不释手的玩具,有很大的开发价值。 展开更多
关键词 智力玩具 拼嵌 拓扑变换 对称 等价 互换
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部