Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 문영식 | - |
dc.date.accessioned | 2023-08-21T06:38:29Z | - |
dc.date.available | 2023-08-21T06:38:29Z | - |
dc.date.issued | 2020-07 | - |
dc.identifier.citation | Multimedia Tools and Applications, v. 79, NO. 25-26, Page. 17669-17705 | - |
dc.identifier.issn | 1380-7501;1573-7721 | - |
dc.identifier.uri | https://link.springer.com/article/10.1007/s11042-020-08645-8 | en_US |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/185524 | - |
dc.description.abstract | Most image encryption algorithms encrypt the whole image, but only part of the data is important in the image. In this paper, we propose a multidimensional chaotic image encryption algorithm based on the region of interest (ROI). The histogram of oriented gradients (HOG) feature extraction and support vector machine (SVM) are used to separate the region of interest from the whole image. Then, the region of interest pixels is messed up by using the improved Henon sequence, Joseph sequence and the region of interest pixels are diffused by using the unified chaotic sequence to hide the sensitive information in the image, so as to achieve the purpose of private protection. Furthermore, the improved logistic sequence is used to hide the edge information of the target image to achieve the tradeoff between the secrecy of information and the complexity of encryption. A series of analyses are carried out including key space analysis, key sensitivity analysis, statistical analysis, information entropy analysis, analysis of the fixed-point obscuration analysis, quality analysis and image decryption for our encryption algorithm. Through experiments and comparisons, the proposed algorithm has good performance in encrypting image and coping with various invasions. The image encryption algorithm based on ROI has a good performance of security, moreover through the main encryption of ROI can effectively shorten the encryption time, so as to achieve the compromise of security and computational complexity. | - |
dc.description.sponsorship | This work is supported in part by the National Key Research and Development Program of China (2017YFB0102500), Natural Science Foundation of Jilin province (20170101133JC), the Korea Foundation for Advanced Studies' International Scholar Exchange Fellowship for the academic year of 2017-2018, the Fundamental Research Funds for the Central Universities, and Jilin University (5157050847, 2017XYB252, 2017A53216). | - |
dc.language | en | - |
dc.publisher | Springer Nature | - |
dc.subject | Chaos | - |
dc.subject | Histogram of oriented gradients | - |
dc.subject | Region of interest | - |
dc.subject | Support vector machine | - |
dc.subject | Henon sequence | - |
dc.subject | Unified chaotic sequence | - |
dc.title | A multidimensional chaotic image encryption algorithm based on the region of interest | - |
dc.type | Article | - |
dc.relation.no | 25-26 | - |
dc.relation.volume | 79 | - |
dc.identifier.doi | 10.1007/s11042-020-08645-8 | - |
dc.relation.page | 17669-17705 | - |
dc.relation.journal | Multimedia Tools and Applications | - |
dc.contributor.googleauthor | Liu, Yang | - |
dc.contributor.googleauthor | Zhang, Jindong | - |
dc.contributor.googleauthor | Han, Dongqi | - |
dc.contributor.googleauthor | Wu, Peibin | - |
dc.contributor.googleauthor | Sun, Yiding | - |
dc.contributor.googleauthor | Moon, Young Shik | - |
dc.sector.campus | E | - |
dc.sector.daehak | 소프트웨어융합대학 | - |
dc.sector.department | 소프트웨어학부 | - |
dc.identifier.pid | ysmoon | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.