修车大队一品楼qm论坛51一品茶楼论坛,栖凤楼品茶全国楼凤app软件 ,栖凤阁全国论坛入口,广州百花丛bhc论坛杭州百花坊妃子阁

oe1(光电查) - 科学论文

14 条数据
?? 中文(中国)
  • Graphene-Based Steganographicly Aptasensing System for Information Computing, Encryption and Hiding, Fluorescent Sensing and In Vivo Imaging of Fish Pathogens

    摘要: Inspired by information processing and communication of life based on complex molecular interactions, some artificial (bio)chemical systems have been developed for applications in molecular information processing or chemo/biosensing and imaging. However, little attention has been paid to simultaneously and comprehensively utilize the information computing, encoding and molecular recognition capabilities of molecular-level systems (such as DNA-based systems) for multifunctional applications. Herein, a graphene-based steganographicly aptasensing system was constructed for multifunctional application, which relies on specific molecular recognition and information encoding abilities of DNA aptamers (Aeromonas hydrophila and Edwardsiella tarda-binding aptamers as models) and the selective adsorption and fluorescence quenching capacities of graphene oxide (GO). Although graphene-DNA systems have been widely used in biosensors and diagnostics, our proposed graphene-based aptasensing system can not only be utilized for fluorescent sensing and in vivo imaging of fish pathogens (Aeromonas hydrophila and Edwardsiella tarda), but can also function as a molecular-level logic computing system where the combination of matters (specific molecules or materials) as inputs produces the resulting product (matter level) or fluorescence (energy level) changes as two outputs. More importantly and interestingly, our graphene-based steganographicly aptasensing system can also be served as a generally doubly cryptographic and steganographic system for sending different secret messages by using pathogen-binding DNA aptamers as information carriers, GO as a cover, a pair of keys: target pathogen as a public key, the encryption key used to encode or decode a message in DNA as a private key. Our study not only provides a novel nano-biosensing assay for rapid and effective sensing and in vivo imaging fish pathogens, but also demonstrates a prototype of (bio)molecular steganography as an important and interesting extension direction of molecular information technology, which is helpful in probably promoting the development of multifunctional molecular-level devices or machines.

    关键词: aptasensing,steganography,graphene oxide,DNA aptamer,encryption,fish pathogens,in vivo imaging,information hiding

    更新于2025-11-21 11:24:58

  • Lossless Information Hiding in Images || Lossless Information Hiding in JPEG- and JPEG2000-Compressed Images

    摘要: This chapter focuses on the lossless information hiding in JPEG and JPEG2000 images. For JPEG images, seven typical methods including two schemes from the authors were introduced. For the first five schemes, we introduced the basic ideas, whereas for the schemes from the authors, we provided a detailed introduced detail with experimental results. In the first method of ours, our high-capacity reversible JPEG-to-JPEG data hiding scheme is introduced. Through lowering certain quantization table entries and lifting corresponding quantized DCT coefficients, space is made for embedding data. Using the proposed embedding strategy, our scheme can achieve high embedding capacity and keep the distortion introduced by embedding very low; meanwhile the original cover JPEG image can be restored after the secret data are extracted. Experiments results demonstrate that the proposed scheme maintains the image quality of a stego JPEG image when the embedding capacity is high. Besides, the file size after embedding with not too huge data is acceptable. Compared with Chang et al.’s method and Xuan et al.’s method, the proposed method is superior in terms of the image quality, hiding capacity, and file size. Our scheme is very practical for image files stored and transmitted in the JPEG format. In the second method of ours, a lossless data hiding scheme with file size preservation is proposed. Through analyzing the code space and the statistics of both used and unused VLCs, we find there is still potential free space in the JPEG bitstream that can be explored to hide data. The best of unused VLCs are made and mapped to the used VLCs in specific mapping manners. The proposed scheme embeds data into the VLC codes and whatever mapped VLCs are present are not changed, therefore the image content after data hiding is exactly the same as the original one. Experimental results demonstrate that the proposed scheme can reach better performance irrespective of whether file size preservation is required or not. For JPEG2000 images, we first introduced two schemes from the literature, and then introduce our scheme. In our scheme, high-frequency subbands of the cover image are divided into blocks. In each block, a new histogram shifting method is applied to the histogram of the block for embedding data. Every coefficient that is associated with the peak point embeds 2 bits of data. In addition, we shift the histogram to the left or right adaptively according to a direction sign. Experimental results show that the proposed scheme has high embedding capacity and good invisibility of hidden data.

    关键词: steganography,histogram shifting,data hiding,quantization table,reversible watermarking,JPEG2000,Lossless information hiding,JPEG,VLC mapping,DCT coefficients

    更新于2025-09-23 15:23:52

  • Fractional-Order Spatial Steganography and Blind Steganalysis for Printed Matter: Anti-Counterfeiting for Product External Packing in Internet-of-Things

    摘要: This paper advocates a novel conceptual formulation of the fractional-order spatial steganography and blind steganalysis for printed matter, which can be efficiently employed in the anti-counterfeiting for product external packing in Internet-of-Things (IoT). Traditional digital steganography is not printable. Within the limits of our knowledge, until now, there are not a well-established steganography and a corresponding steganalysis for printed matter in IoT, which should receive desired attention. Fractional calculus has potentially received prominence in applications in the domain of image processing mainly because of its strengths like long-term memory, nonlocality, and weak singularity. Therefore, in an attempt to overcome the aforementioned technical limitation of traditional digital steganography, this work has studied here, as an interesting theoretical problem, would it be possible to apply the capability of preserving the edges and textural details of fractional calculus to the achievement of the steganography and steganalysis for printed matter in IoT. Motivated by this inspiration, in this paper, this work introduces a novel conceptual formulation of a Fractional-order Spatial Steganography (FSS) and a Fractional-order Blind Steganalysis (FBS) for printed matter. At first, according to the opponent process theory of colour vision, to better achieve the imperceptibility of the hidden secret information, this work uses both the self-similar complex textures in a neighborhood and the opponent channel of blue versus yellow to implement FSS for printed matter. Secondly, without requiring a priori knowledge regarding the characteristics of the original carrier image, hidden secret image, and steganography, a FBS, a fractional-order multimodal function optimization algorithm, is proposed. Finally, the efficient capability of hiding secret information of FSS and that of detecting secret information of FBS are analyzed in detail experimentally, respectively. These two important advantages lead to the superiority of the proposed approach for defending against statistics attack, rotation and distortion attack, cropping attack, scaling attack, noise attack, and colour copy attack. The main contribution of this paper is the first preliminary attempt of a feasible achievement of a spatial steganography and a blind steganalysis for printed matter.

    关键词: Printed Matter,Anti-counterfeiting,Fractional-order spatial steganography,Fractional calculus,Fractional-order blind steganalysis

    更新于2025-09-23 15:22:29

  • A new diffusion and substitution based cryptosystem for securing medical image applications

    摘要: Due to the rising privilege for tele-health facilities have sophisticated responsiveness in the usage of medicinal image safeguard proficiency. It mainly compact with patient records that are secretive and must only available to legal person. So the medical image safety becomes a very significant problem, when patient evidence is conveyed through the public network. In this paper, a secret key of 128-bits size is generated by an image histogram. Initially, the photo sensitive feature of digital imaging and communications in medicine image is decomposed by the mixing process. The resulting image is distributed in key reliant blocks and further, these blocks are passed through key reliant diffusion and substitution processes. A total of five rounds are used in the encryption method. Finally the generated secret key is embedded within the encrypted image in the process of steganography. This also enhances the security of proposed cipher. At the receiver side the secret key was recovered from the embedded image and decryption operation was performed in inverse format. Performance analysis designates that the proposed cipher is more secure.

    关键词: substitution,steganography,encryption,diffusion,histogram

    更新于2025-09-23 15:21:21

  • [IEEE 2019 18th International Conference on Optical Communications and Networks (ICOCN) - Huangshan, China (2019.8.5-2019.8.8)] 2019 18th International Conference on Optical Communications and Networks (ICOCN) - WDM Optical Steganography Based on Super-Continuum Light Source

    摘要: In this paper, a 10 Gb/s stealth channel based on super-continuum light source in 120km SSMF transmission system is experimented, which can be hidden under the public WDM channel in both time and frequency domain.

    关键词: optical steganography,super-continuum light source,WDM channel,optical stealth

    更新于2025-09-23 15:21:01

  • [ACM Press the 2nd International Conference - Las Vegas, NV, USA (2018.08.27-2018.08.29)] Proceedings of the 2nd International Conference on Vision, Image and Signal Processing - ICVISP 2018 - Hiding MP3 in Colour Image using Whale Optimization

    摘要: Information is the key in today’s world and secure transmission is a must. The cryptography is about making cipher and keys management. They assume cipher can be detected and must be strong enough to decipher, but what if the cipher/information is not visible? The cipher would not be detected. The steganography makes this enable. This paper discusses how to hide an MP3 file in a digital image such that it becomes difficult to conclude about the existence of the hidden audio data. Here we utilize the k-LSB of pixels in an image to embed audio data bits into a selected pixel. The pixels are so chosen that the distortion in the image would be minimized due to embedding. This requires comparing all the possible permutations of pixel values, which may lead to exponential time complexity. For faster computation Whale optimization algorithm was used to find the most optimal solution.

    关键词: MP3,Information Hiding,Nature-inspired algorithms,PSNR,Steganography,Whale Optimization

    更新于2025-09-23 15:21:01

  • Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique

    摘要: In today’s world, transmission of information over the channel is not secure for example patient records and other sensitive information. In order to protect this sensitive information, it is coded within the image, audio or text files which is decodable only with the help of a particular key. To enable security to the covert communication and safeguarding the information for securing medical data to avoid medical related cybercrimes, we have proposed a method for medical image steganography using Elephant Herding-Monarch Butterfly (EH-MB) Optimization algorithm for effective selection of pixels for embedding the secret message (i.e. image/text medical report data) in the cover image. Initially, the cover is converted to frequency domain using multilevel DWT, where, the pixel selection is done optimally in the high frequency components using EH-MB algorithm. EH-MB based pixel selection procedure uses a fitness function that depends on the cost function, which calculates the edge, entropy, and intensity of the pixel for evaluating fitness. Simulation was done in the working platform of MATLAB and comparison of the proposed steganography approach was done with the other existing methods in terms of Peak-Signal-to Noise-Ratio and Mean Square Error to prove the effectiveness of the proposed approach.

    关键词: Intensity,Elephant herding,Steganography,Object,MSE,PSNR,Entropy,Covert,Segmentation,Edge,Monarch butterfly

    更新于2025-09-19 17:15:36

  • Infrared steganography with individual screening shapes applied to postage stamps with security features

    摘要: Designing a postage stamp requires positioning of graphic security elements in a limited small format, so the design is made for two states: for the visible spectrum and the infrared spectrum. Individual screening elements are introduced as security elements in the steganography of invisible pictures in the 700 to 1000 nm spectrum. The CMYKIR theory of hiding the infrared message in the picture is extended by mixing process inks with the control of spot twins of the same colour tone in the X0 and X40 states. Two pictures are integrated in the security print; a multicolour picture visible to the naked eye, and another hidden picture visible when illuminated with an IR detecting instrument. The CMYKIR method is joined with the new element’s algorithm used for dispersing of the hidden picture’s ("Z picture’s") fringes. This kind of steganography is applied in the design of postage stamps and it is a new way of securing them.

    关键词: infrared design,CMYKIR separation,individual screen element,postage stamps with security features,steganography

    更新于2025-09-19 17:13:59

  • System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos

    摘要: Safeguarding the identity of people in photographs or videos published through social networks or television is of great importance to those who do not wish to be recognized. In this paper, a face detecting and coding system is designed with the goal of solving this problem. Mathematical models to generate chaotic orbits are deployed. One of them applies the diffusion technique to scramble the pixels of each face while another implements the confusion technique to alter the relation between plain text and ciphered text. Afterward, another two orbits are utilized for the steganography technique to modify the least significant bit (LSB) to conceal data that would allow authorized users to decipher the faces. To verify the robustness of the proposed encryption algorithm, different tests are performed with the Lena standard image, such as correlation diagrams, histograms, and entropy. In addition, occlusion, noise, and plain image attacks are performed. The results are compared with those of other works, and the proposed system provided high sensitivity at secret key and a large space for the encryption keys, good speed for ciphering, disorder in the cryptogram, security, data integrity, and robustness against different attacks.

    关键词: face detection,steganography,chaos,encryption,cryptography

    更新于2025-09-11 14:15:04

  • An Adaptive Triangular Partition Algorithm for Digital Images

    摘要: The partition method is essential to image processing and applications, such as data encryption, image denoising, and three-dimensional reconstruction. In order to obtain the partition by considering the characteristics of the gray distribution in the image, a novel approach named image adaptive triangular partition (IATP) is proposed in this paper. This method considers the pixel gray distribution, which can eliminate the common edges among the adjacent triangles and can availably reduce the distortion phenomenon. The gray values and positions of the pixels are regarded as the fitting data and then fitted using the least squares method. If the calculated error is bigger than the preselected precision control value, the current region will be split into four separated triangular sub-domains using the self-similar partition method. Otherwise, the terminal operation is reached. The whole image triangular mesh is obtained by using the recursion approach, and the necessary mesh information is recorded in quaternary representation as the result. The experimental results demonstrate that the performance of the IATP method proposed in this paper is better than the existing state-of-the-art nonuniform partitions, and it solves the redundant coding problem and reduces the image quality loss. Moreover, two applications of image steganography and information encryption verify the feasibility and robustness of the new algorithm.

    关键词: image adaptive triangular partition (IATP),Image processing,information encryption,least squares method,image steganography

    更新于2025-09-10 09:29:36