Image cryptosystems based on blind source separation

被引:0
作者
Lin, QH [1 ]
Yin, FL [1 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116023, Peoples R China
来源
PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2 | 2003年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One major difference between the image data and the text data is that the image data permit small distortion owing to the characteristics of human perception, but the text data rarely do. This paper applies blind source separation (BSS) to forming a new efficient cryptosystem for images. The confidential images to be transmitted are covered with the mask images by specifically mixing them. This process is called the "mixed masking" encryption based on BSS. On the receiving side, the original images are well recovered through "BSS" controlled by the separation-keys, which is called the "BSS" decryption. The proposed method has high security performance and flexible feature. The results of experiments illustrate the validity of the proposed method.
引用
收藏
页码:1366 / 1369
页数:4
相关论文
共 10 条
  • [1] [Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
  • [2] Blind signal separation: Statistical principles
    Cardoso, JF
    [J]. PROCEEDINGS OF THE IEEE, 1998, 86 (10) : 2009 - 2025
  • [3] Chan RH, 2001, NUMER LINEAR ALGEBR, V8, P83, DOI 10.1002/1099-1506(200103)8:2<83::AID-NLA231>3.0.CO
  • [4] 2-X
  • [5] Neural networks for blind separation with unknown number of sources
    Cichocki, A
    Karhunen, J
    Kasprzak, W
    Vigário, R
    [J]. NEUROCOMPUTING, 1999, 24 (1-3) : 55 - 93
  • [6] INDEPENDENT COMPONENT ANALYSIS, A NEW CONCEPT
    COMON, P
    [J]. SIGNAL PROCESSING, 1994, 36 (03) : 287 - 314
  • [7] Fast and robust fixed-point algorithms for independent component analysis
    Hyvärinen, A
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 1999, 10 (03): : 626 - 634
  • [8] Blind source separation applied to image cryptosystems with dual encryption
    Lin, QH
    Yin, FL
    [J]. ELECTRONICS LETTERS, 2002, 38 (19) : 1092 - 1094
  • [9] PECORA LM, 1990, PHYS REV LETT, V64, P8
  • [10] Optical encryption based on iterative fractional Fourier transform
    Zhang, Y
    Zheng, CH
    Tanno, N
    [J]. OPTICS COMMUNICATIONS, 2002, 202 (4-6) : 277 - 285