In the digital age, network transmission of batch images is increasingly frequent. To prevent the information leak of image content and improve the security of encryption during the network transmission, we design an improved chaotic system, establish a dice-rotation model, and propose a multiple-image encryption algorithm. First, k plain images are combined into an image cube; second, the image cube is divided into dice blocks (i.e., small image cube); third, the dice blocks are rotated and scrambled according to the designed rules, which are controlled by chaotic sequences; finally, the forward addition and modular operations in the row and column directions are performed by the improved chaos. Experimental results and algorithm analyses indicate that the proposed algorithm can encrypt multiple interactive images at once with desirable encryption effect and have strong security.
To study the image matching algorithm, algorithm four elements are described, i.e., similarity measurement, feature space, search space and search strategy. Four common indexes for evaluating the image matching algorithm are described, i.e., matching accuracy, matching efficiency, robustness and universality. Meanwhile, this paper describes the principle of image matching algorithm based on the gray value, image matching algorithm based on the feature, image matching algorithm based on the frequency domain analysis, image matching algorithm based on the neural network and image matching algorithm based on the semantic recognition, and analyzes their characteristics and latest research achievements. Finally, the development trend of image matching algorithm is discussed. This study is significant for the algorithm improvement, new algorithm design and algorithm selection in practice.
By defining block image element, mixed image element
(MIE), and composite image element (CIE), we propose a MIE encryption
algorithm based on an elliptic curve cryptosystem (ECC),
which extends the single image encryption algorithm to a multiple
images encryption algorithm. The recipient’s (Bob’s) and the sender’s
(Alice’s) detailed encryption and decryption steps and the core
technology on the network platform are discussed. The correctness
of this algorithm is verified. Experimental results and theoretical
analysis show that the algorithm possesses large enough key space
and can accomplish a high level of security concerning information
interaction on the network platform. It can be particularly applicable
to the highly confidential fields of information interaction. Finally,
some problems in algorithm implementation are analyzed, and the
prospects concerning the anomalous image element, rotary image
element, and CIE encryption algorithms based on ECC are briefly
described.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.