Current Issue : April - June Volume : 2020 Issue Number : 2 Articles : 5 Articles
This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid\n(DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). The initial values of the\nTD-ERCS system are generated from a userâ??s password, and the TD-ERCS system is used to scramble the pixel locations of the R,\nG, and B matrices of the original image. Next, three DNA-sequence matrices are generated by encoding the permuted color image\nsuch that it can be transformed into three matrices. Then, the TD-ERCS system is employed to generate three chaotic sequences\nbefore encoding the DNA into the three matrices. Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA\nsequences of the permuted image and the DNA sequences generated by the TD-ERCS system to produce three encrypted\nscrambled matrices. Finally, the matrices of the DNA sequences are decoded, and the R, G, and B channels are recombined to form\nan encrypted color image. The results of simulation and security tests reveal that the proposed algorithm offers robust encryption\nand demonstrates the ability to resist exhaustive, statistical, and differential attacks....
Omnidirectional, or 360Degree, cameras are able to capture the surrounding space, thus providing\nan immersive experience when the acquired data is viewed using head mounted displays.\nSuch an immersive experience inherently generates an illusion of being in a virtual environment.\nThe popularity of 360Degree media has been growing in recent years. However, due to the large amount\nof data, processing and transmission pose several challenges. To this aim, efforts are being devoted\nto the identification of regions that can be used for compressing 360Degree images while guaranteeing\nthe immersive feeling. In this contribution, we present a saliency estimation model that considers\nthe spherical properties of the images. The proposed approach first divides the 360Degree image into multiple\npatches that replicate the positions (viewports) looked at by a subject while viewing a 360Degree image\nusing a head mounted display. Next, a set of low-level features able to depict various properties of\nan image scene is extracted from each patch. The extracted features are combined to estimate the 360Degree\nsaliency map. Finally, bias induced during image exploration and illumination variation is fine-tuned\nfor estimating the final saliency map. The proposed method is evaluated using a benchmark 360Degree image\ndataset and is compared with two baselines and eight state-of-the-art approaches for saliency estimation.\nThe obtained results show that the proposed model outperforms existing saliency estimation models....
Substitution box (S-box) is a vital nonlinear component for the security of cryptographic schemes. In this paper, a new technique\nwhich involves coset diagrams for the action of a quotient of the modular group on the projective line over the finite field is\nproposed for construction of an S-box. It is constructed by selecting vertices of the coset diagram in a special manner. A useful\ntransformation involving Fibonacci sequence is also used in selecting the vertices of the coset diagram. Finally, all the analyses to\nexamine the security strength are performed. The outcomes of the analyses are encouraging and show that the generated S-box is\nhighly secure....
This paper proposes a new image compression-encryption algorithm based on a meaningful image encryption framework. In\nblock compressed sensing, the plain image is divided into blocks, and subsequently, each block is rendered sparse. The zigzag\nscrambling method is used to scramble pixel positions in all the blocks, and subsequently, dimension reduction is undertaken via\ncompressive sensing. To ensure the robustness and security of our algorithm and the convenience of subsequent embedding\noperations, each block is merged, quantized, and disturbed again to obtain the secret image. In particular, landscape paintings\nhave a characteristic hazy beauty, and secret images can be camouflaged in them to some extent. For this reason, in this paper, a\nlandscape painting is selected as the carrier image. After a 2-level discrete wavelet transform (DWT) of the carrier image, the lowfrequency\nand high-frequency coefficients obtained are further subjected to a discrete cosine transform (DCT). The DCT is\nsimultaneously applied to the secret image as well to split it. Next, it is embedded into the DCTcoefficients of the low-frequency\nand high-frequency components, respectively. Finally, the encrypted image is obtained. The experimental results show that, under\nthe same compression ratio, the proposed image compression-encryption algorithm has better reconstruction effect, stronger\nsecurity and imperceptibility, lower computational complexity, shorter time consumption, and lesser storage space requirements\nthan the existing ones....
The utilization of Multimedia Instruction (MI) in teaching and learning is\ngrowing rapidly. The combination of various media assists educational\nreform, and is important to the improvement of education outputs. The MI\nuse has been a challenge to educators especially in Jordan. This study aimed\nto re-calculate the reliability and validity of online individualized MI instrument\nin a new Online Individualized Multimedia Instruction (OIMI) framework\nfor engineering communication skills. In this study, this model designates\nthe multimedia instruction as one of the latent variables, to be measured\nby six observed variables, which are modality, contiguity, personalization,\ncoherence, redundancy, and signaling. Data collected and tested from\n166 engineering learners. Confirmatory factor analysis using AMOS was\nconducted to obtain three best-fit measurement models. The results showed\nevidence of a five-dimension measurement model for MI except for coherence.\nThis result enlightens the model, which includes explanations of Mayerâ??s\nCognitive Theory of MI and multimedia instructional in Practice....
Loading....