-
A new image compression by gradient Haar wavelet
Authors:
Yaser Sadra
Abstract:
With the development of human communications the usage of Visual Communications has also increased. The advancement of image compression methods is one of the main reasons for the enhancement. This paper first presents main modes of image compression methods such as JPEG and JPEG2000 without mathematical details. Also, the paper describes gradient Haar wavelet transforms in order to construct a pr…
▽ More
With the development of human communications the usage of Visual Communications has also increased. The advancement of image compression methods is one of the main reasons for the enhancement. This paper first presents main modes of image compression methods such as JPEG and JPEG2000 without mathematical details. Also, the paper describes gradient Haar wavelet transforms in order to construct a preliminary image compression algorithm. Then, a new image compression method is proposed based on the preliminary image compression algorithm that can improve standards of image compression. The new method is compared with original modes of JPEG and JPEG2000 (based on Haar wavelet) by image quality measures such as MAE, PSNAR, and SSIM. The image quality and statistical results confirm that can boost image compression standards. It is suggested that the new method is used in a part or all of an image compression standard.
△ Less
Submitted 1 September, 2017; v1 submitted 28 April, 2017;
originally announced April 2017.
-
Image Encryption Based On Gradient Haar Wavelet and Rational Order Chaotic Maps
Authors:
Sodeif Ahadpour,
Yaser Sadra,
Meisam Sadeghi
Abstract:
Haar wavelet is one of the best mathematical tools in image cryptography and analysis. Because of the specific structure, this wavelet has the ability which is combined with other mathematical tools such as chaotic maps. The rational order chaotic maps are one of clusters of chaotic maps which their deterministic behaviors have high sensitivity. In this paper, we propose a novel method of gradient…
▽ More
Haar wavelet is one of the best mathematical tools in image cryptography and analysis. Because of the specific structure, this wavelet has the ability which is combined with other mathematical tools such as chaotic maps. The rational order chaotic maps are one of clusters of chaotic maps which their deterministic behaviors have high sensitivity. In this paper, we propose a novel method of gradient Haar wavelet transform for image encryption. This method use linearity properties of the scaling function of the gradient Haar wavelet and deterministic behaviors of rational order chaotic maps in order to generate encrypted images with high security factor. The security of the encrypted images is evaluated by the key space analysis, the correlation coefficient analysis, and differential attack. The method could be used in other fields such as image and signal processing.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
Chaotic trigonometric Haar wavelet with focus on image encryption
Authors:
Sodeif Ahadpour,
Yaser Sadra
Abstract:
In this paper, after reviewing the main points of Haar wavelet transform and chaotic trigonometric maps, we introduce a new perspective of Haar wavelet transform. The essential idea of the paper is given linearity properties of the scaling function of the Haar wavelet. With regard to applications of Haar wavelet transform in image processing, we introduce chaotic trigonometric Haar wavelet transfo…
▽ More
In this paper, after reviewing the main points of Haar wavelet transform and chaotic trigonometric maps, we introduce a new perspective of Haar wavelet transform. The essential idea of the paper is given linearity properties of the scaling function of the Haar wavelet. With regard to applications of Haar wavelet transform in image processing, we introduce chaotic trigonometric Haar wavelet transform to encrypt the plain images. In addition, the encrypted images based on a proposed algorithm were made. To evaluate the security of the encrypted images, the key space analysis, the correlation coefficient analysis and differential attack were performed. Here, the chaotic trigonometric Haar wavelet transform tries to improve the problem of failure of encryption such as small key space and level of security.
△ Less
Submitted 8 April, 2016; v1 submitted 31 December, 2014;
originally announced January 2015.
-
A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices
Authors:
Sodeif Ahadpour,
Yaser Sadra
Abstract:
In recent years, information security essential in various arenas like internet communication, multimedia systems, medical imaging, tele-medicine and military communication. However, most of them faced with some problems such as the lack of robustness and security. In this letter, after reviewing the main points of the chaotic trigonometric maps and the coupled map lattices, we introduce the schem…
▽ More
In recent years, information security essential in various arenas like internet communication, multimedia systems, medical imaging, tele-medicine and military communication. However, most of them faced with some problems such as the lack of robustness and security. In this letter, after reviewing the main points of the chaotic trigonometric maps and the coupled map lattices, we introduce the scheme of chaos-based image encryption based on coupled map lat tices. The scheme decreases periodic effect of the ergodic dynamical systems in the chaos-based image encryption. To evaluate the security of the encrypted image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.
△ Less
Submitted 1 November, 2012;
originally announced November 2012.
-
Public key Steganography Using Discrete Cross-Coupled Chaotic Maps
Authors:
Sodeif Ahadpour,
Mahdiyeh Majidpour,
Yaser Sadra
Abstract:
By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and dec…
▽ More
By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.
△ Less
Submitted 1 November, 2012;
originally announced November 2012.
-
A Novel Chaotic Encryption Scheme based on Pseudorandom Bit Padding
Authors:
Sodeif Ahadpour,
Yaser Sadra,
Zahra ArastehFard
Abstract:
Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be use…
▽ More
Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be used in the diffusion functions of the image encryption for diffused pixels of plain image. In this paper, we propose a chaotic encryption scheme based on pseudorandom bit padding that the bits be generated by a novel logistic pseudorandom image algorithm. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.
△ Less
Submitted 7 February, 2012; v1 submitted 6 January, 2012;
originally announced January 2012.
-
A Novel Chaotic Image Encryption using Generalized Threshold Function
Authors:
Sodeif Ahadpour,
Yaser Sadra,
Zahra ArastehFard
Abstract:
In this paper, after reviewing the main points of image encryption and threshold function, we introduce the methods of chaotic image encryption based on pseudorandom bit padding that the bits be generated by the novel generalized threshold function (segmentation and self-similarity) methods. These methods decrease periodic effect of the ergodic dynamical systems in randomness of the chaotic image…
▽ More
In this paper, after reviewing the main points of image encryption and threshold function, we introduce the methods of chaotic image encryption based on pseudorandom bit padding that the bits be generated by the novel generalized threshold function (segmentation and self-similarity) methods. These methods decrease periodic effect of the ergodic dynamical systems in randomness of the chaotic image encryption. The essential idea of this paper is that given threshold functions of the ergodic dynamical systems. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.
△ Less
Submitted 31 March, 2012; v1 submitted 16 December, 2011;
originally announced December 2011.
-
Randomness criteria in binary visibility graph perspective
Authors:
S. Ahadpour,
Y. Sadra
Abstract:
By means of a binary visibility graph, we present a novel method to study random binary sequences. The behavior of the some topological properties of the binary visibility graph, such as the degree distribution, the clustering coefficient, and the mean path length have been investigated. Several examples are then provided to show that the numerical simulations confirm the accuracy of the theorems…
▽ More
By means of a binary visibility graph, we present a novel method to study random binary sequences. The behavior of the some topological properties of the binary visibility graph, such as the degree distribution, the clustering coefficient, and the mean path length have been investigated. Several examples are then provided to show that the numerical simulations confirm the accuracy of the theorems for finite random binary sequences. Finally, in this paper we propose, for the first time, three topological properties of the binary visibility graph as a randomness criteria.
△ Less
Submitted 9 April, 2010;
originally announced April 2010.