Skip to main content

Showing 1–8 of 8 results for author: Sadra, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:1704.08822  [pdf

    cs.CV cs.MM

    A new image compression by gradient Haar wavelet

    Authors: Yaser Sadra

    Abstract: With the development of human communications the usage of Visual Communications has also increased. The advancement of image compression methods is one of the main reasons for the enhancement. This paper first presents main modes of image compression methods such as JPEG and JPEG2000 without mathematical details. Also, the paper describes gradient Haar wavelet transforms in order to construct a pr… ▽ More

    Submitted 1 September, 2017; v1 submitted 28 April, 2017; originally announced April 2017.

    Comments: 9 pages, 4 figures, 10 tables

  2. arXiv:1604.02235  [pdf

    cs.CR cs.MM

    Image Encryption Based On Gradient Haar Wavelet and Rational Order Chaotic Maps

    Authors: Sodeif Ahadpour, Yaser Sadra, Meisam Sadeghi

    Abstract: Haar wavelet is one of the best mathematical tools in image cryptography and analysis. Because of the specific structure, this wavelet has the ability which is combined with other mathematical tools such as chaotic maps. The rational order chaotic maps are one of clusters of chaotic maps which their deterministic behaviors have high sensitivity. In this paper, we propose a novel method of gradient… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 8 pages, 6 figures, and 3 tables

    Journal ref: Annals. Computer Science Series. 14(1): 59- 66, 2016

  3. arXiv:1501.00166  [pdf

    cs.CR nlin.CD

    Chaotic trigonometric Haar wavelet with focus on image encryption

    Authors: Sodeif Ahadpour, Yaser Sadra

    Abstract: In this paper, after reviewing the main points of Haar wavelet transform and chaotic trigonometric maps, we introduce a new perspective of Haar wavelet transform. The essential idea of the paper is given linearity properties of the scaling function of the Haar wavelet. With regard to applications of Haar wavelet transform in image processing, we introduce chaotic trigonometric Haar wavelet transfo… ▽ More

    Submitted 8 April, 2016; v1 submitted 31 December, 2014; originally announced January 2015.

    Comments: Accepted in Journal of Discrete Mathematical Sciences and Cryptography, 10pages, 9 figures,2 table

  4. A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices

    Authors: Sodeif Ahadpour, Yaser Sadra

    Abstract: In recent years, information security essential in various arenas like internet communication, multimedia systems, medical imaging, tele-medicine and military communication. However, most of them faced with some problems such as the lack of robustness and security. In this letter, after reviewing the main points of the chaotic trigonometric maps and the coupled map lattices, we introduce the schem… ▽ More

    Submitted 1 November, 2012; originally announced November 2012.

    Comments: 4 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1201.1449, arXiv:1112.3791

    Journal ref: International Journal of Computer Applications 49(2):15-18, July 2012. Published by Foundation of Computer Science, New York, USA

  5. arXiv:1211.0086  [pdf

    cs.CR cs.MM nlin.CD

    Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    Authors: Sodeif Ahadpour, Mahdiyeh Majidpour, Yaser Sadra

    Abstract: By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and dec… ▽ More

    Submitted 1 November, 2012; originally announced November 2012.

    Comments: 6 pages, 5 figures

  6. arXiv:1201.1449  [pdf

    cs.CR

    A Novel Chaotic Encryption Scheme based on Pseudorandom Bit Padding

    Authors: Sodeif Ahadpour, Yaser Sadra, Zahra ArastehFard

    Abstract: Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be use… ▽ More

    Submitted 7 February, 2012; v1 submitted 6 January, 2012; originally announced January 2012.

    Comments: 8 pages, 5 figures, Published in IJCSI International Journal of Computer Science Issues (January 2012)

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, (2012) 449-456

  7. arXiv:1112.3791  [pdf

    cs.CR physics.data-an

    A Novel Chaotic Image Encryption using Generalized Threshold Function

    Authors: Sodeif Ahadpour, Yaser Sadra, Zahra ArastehFard

    Abstract: In this paper, after reviewing the main points of image encryption and threshold function, we introduce the methods of chaotic image encryption based on pseudorandom bit padding that the bits be generated by the novel generalized threshold function (segmentation and self-similarity) methods. These methods decrease periodic effect of the ergodic dynamical systems in randomness of the chaotic image… ▽ More

    Submitted 31 March, 2012; v1 submitted 16 December, 2011; originally announced December 2011.

    Comments: 7 pages, 5 figures, Published in international Journal of Computer Applications (March 2012)

    Journal ref: International Journal of Computer Applications 42(18):25-31, March 2012

  8. arXiv:1004.2189  [pdf, ps, other

    nlin.CD cs.DS physics.data-an

    Randomness criteria in binary visibility graph perspective

    Authors: S. Ahadpour, Y. Sadra

    Abstract: By means of a binary visibility graph, we present a novel method to study random binary sequences. The behavior of the some topological properties of the binary visibility graph, such as the degree distribution, the clustering coefficient, and the mean path length have been investigated. Several examples are then provided to show that the numerical simulations confirm the accuracy of the theorems… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

    Comments: 13 pages