AU2019100608A4 - Fast Supervised Discrete Hashing Algorithm Over Distributed Network - Google Patents
Fast Supervised Discrete Hashing Algorithm Over Distributed Network Download PDFInfo
- Publication number
- AU2019100608A4 AU2019100608A4 AU2019100608A AU2019100608A AU2019100608A4 AU 2019100608 A4 AU2019100608 A4 AU 2019100608A4 AU 2019100608 A AU2019100608 A AU 2019100608A AU 2019100608 A AU2019100608 A AU 2019100608A AU 2019100608 A4 AU2019100608 A4 AU 2019100608A4
- Authority
- AU
- Australia
- Prior art keywords
- image
- matrix
- color image
- compressed
- distributed network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/46—Colour picture communication systems
- H04N1/64—Systems for the transmission or the storage of the colour picture signal; Details therefor, e.g. coding or decoding means therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Abstract: In the background of big data, it is of great significance to protect image data's confidentiality. In this patent, a compression-diffusion-permutation strategy for securing big image data is proposed. Firstly, an image is compressed by use of compressive sensing technique, in which the Hadamard matrix used as the measurement matrix is constructed through iterating two-dimensional Sine Logistic modulation map instead of using the entire Gaussian matrix as a key. Thus, only the utilization of a few keys in the 2D chaotic map avoids the transmission of the Gaussian matrix. Secondly, XOR is used to further diffuse the compressed image to enhance the security. Finally, an index sequence produced by 2D chaotic map with initial values is utilized to rearrange the positions of the diffused image. (a) (b) (c) Fig. 1. (a) Original color image; (b) Encrypted color image; (c) Decrypted color image. A visual example of illustrating the encryption and decryption results.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2019100608A AU2019100608A4 (en) | 2019-06-05 | 2019-06-05 | Fast Supervised Discrete Hashing Algorithm Over Distributed Network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2019100608A AU2019100608A4 (en) | 2019-06-05 | 2019-06-05 | Fast Supervised Discrete Hashing Algorithm Over Distributed Network |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2019100608A4 true AU2019100608A4 (en) | 2019-07-11 |
Family
ID=67148284
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2019100608A Ceased AU2019100608A4 (en) | 2019-06-05 | 2019-06-05 | Fast Supervised Discrete Hashing Algorithm Over Distributed Network |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2019100608A4 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111800251A (en) * | 2020-05-21 | 2020-10-20 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
CN115913552A (en) * | 2023-01-06 | 2023-04-04 | 山东卓朗检测股份有限公司 | Information safety test data processing method of industrial robot control system |
-
2019
- 2019-06-05 AU AU2019100608A patent/AU2019100608A4/en not_active Ceased
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111800251A (en) * | 2020-05-21 | 2020-10-20 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
CN111800251B (en) * | 2020-05-21 | 2021-11-12 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
CN115913552A (en) * | 2023-01-06 | 2023-04-04 | 山东卓朗检测股份有限公司 | Information safety test data processing method of industrial robot control system |
CN115913552B (en) * | 2023-01-06 | 2023-05-16 | 山东卓朗检测股份有限公司 | Information security test data processing method of industrial robot control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Talhaoui et al. | A new fractional one dimensional chaotic map and its application in high-speed image encryption | |
CN104486315B (en) | A kind of revocable key outsourcing decryption method based on contents attribute | |
Wu et al. | Image encryption using the two-dimensional logistic chaotic map | |
CN102546181B (en) | Cloud storage encrypting and deciphering method based on secret key pool | |
Zhang et al. | Entropy‐Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems | |
CN103795533A (en) | Id-based encryption and decryption method, and apparatus for executing same | |
CN102185694A (en) | Electronic file encrypting method and system based on fingerprint information | |
Wang et al. | A new chaotic image encryption scheme based on dynamic L-shaped scrambling and combined map diffusion | |
CN109688143A (en) | A kind of cluster data mining method towards secret protection in cloud environment | |
AU2019100608A4 (en) | Fast Supervised Discrete Hashing Algorithm Over Distributed Network | |
CN105099653A (en) | Distributed data processing method, device and system | |
US20190130125A1 (en) | Searchable encryption processing system | |
Liu et al. | Chaos-based color pathological image encryption scheme using one-time keys | |
Zhao et al. | Image encryption algorithm based on a new chaotic system with Rubik's cube transform and Brownian motion model | |
Wang et al. | A novel image encryption algorithm based on chaotic system and improved Gravity Model | |
Xu et al. | Applications of cryptography in database: a review | |
CN103607273A (en) | Data file encryption and decryption method based on time limit control | |
CN109586895A (en) | A kind of new color image encrypting method | |
Pujari et al. | Data security using cryptography and steganography | |
Mendua | A new approach of colour image encryption based on Henon like chaotic map | |
AU2019101343A4 (en) | A computer system implemented method for generating a symmetric encryption key for encrypting and decrypting secure data | |
Deepa et al. | Security using colors and Armstrong numbers | |
Barukab et al. | Secure communication using symmetric and asymmetric cryptographic techniques | |
CN105187456A (en) | Cloud-drive file data safety protection method | |
CN115712919A (en) | Regional medical data encryption and application method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |