A Study on Parameters of Image Encryption Based on Moire Pattern

被引:0
|
作者
Weng, Zhe-Ming [1 ]
Wang, Dao-Shun [1 ]
Li, Shun-Dong [2 ]
Luo, Xiang-Yang [3 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Shanxi Normal Univ, Sch Comp Sci, Linfen, Shanxi, Peoples R China
[3] Informat Sci & Technol Inst, Zhengzhou, Peoples R China
关键词
image hiding; moire pattern; reconstruction quality; VISUAL CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In image encryption based on moire pattern, a secret image is hidden to an encrypted image by a reference fringe pattern. When the reference fringe pattern and the encrypted image are superimposed or by simple computation, the secret can be reconstructed. Generating reference fringe pattern and encrypted image depends on selection of different parameters. Although some experimental results demonstrate validness of their algorithms based on moire pattern, related parameters are not given. In this paper, we first discuss two superimposition models for grey-scale image and analyze reconstructed images with different parameters, and then obtain relationship among reconstruction quality and parameters of generating equations. Experimental results show the validness of the obtained relationship among reconstruction quality and different parameters.
引用
收藏
页码:914 / 917
页数:4
相关论文
共 50 条
  • [41] An Image Encryption Algorithm Based on Chaos
    Jin, Yong-Xian
    Guan, Yi-Sheng
    Zheng, Lin
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 3, 2011, 106 : 493 - 497
  • [42] Generative Network Based Image Encryption
    Sharma, Vivank
    Shukla, Mansi
    Srivastava, Shobhit
    Mandal, Ritika
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 1 - 5
  • [43] Image encryption based on chaotic maps
    Fridrich, J
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 1105 - 1110
  • [44] Chaos Based Image Encryption Scheme
    Shyamala, P.
    CONTROL, COMPUTATION AND INFORMATION SYSTEMS, 2011, 140 : 312 - 317
  • [45] Region Based Selective Image Encryption
    Ravishankar, K. C.
    Venkateshmurthy, M. G.
    2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 476 - +
  • [46] Wavelet Based Partial Image Encryption
    Flayh, Nahla A.
    Parveen, Rafat
    Ahson, Syed I.
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 32 - +
  • [47] Image Encryption Based on Pixel Decomposition
    Xu, Chunming
    Zhang, Yong
    International Journal of Network Security, 2024, 26 (04) : 686 - 694
  • [48] Optimizing chaos based image encryption
    Noshadian, Saeed
    Ebrahimzade, Ata
    Kazemitabar, Seyed Javad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25569 - 25590
  • [49] Optimizing chaos based image encryption
    Saeed Noshadian
    Ata Ebrahimzade
    Seyed Javad Kazemitabar
    Multimedia Tools and Applications, 2018, 77 : 25569 - 25590
  • [50] Image encryption based on Jacobi function
    Rodriguez-Sahagun, M. T.
    Mercado-Sanchez, J. B.
    Lopez-Mancilla, D.
    Jaimes-Reategui, R.
    Garcia-Lopez, J. H.
    2013 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONICS AND AUTOMOTIVE ENGINEERING (ICMEAE 2013), 2013, : 109 - 114