Contents & References of Simultaneous optimization of the resistance and transparency of image encryption based on psycho-visual techniques
List:
Abstract 1
Chapter One: Research overview. 3
1-1- Introduction. 3
1-1-1- General framework of encryption systems. 5
1-1-2- types of encryption. 5
1-1-3- Attack on cryptography 7
1-1-4- Applications of digital cryptography. 8
1-2- statement of the problem. 9
1-3- Necessity and importance of research. 10
1-4- research objectives. 12
1-5- Research questions. 12
1-6- research hypotheses. 12
1-7- Research innovation. 13
1-8- Key words and terms. 13
1-9- Thesis structure. 15
The second chapter. 17
A review of research literature. 17
Chapter two: Review of research literature. 18
2-1- Part I- The generalities of cryptography. 18
2-1-1- Introduction. 19
2-1-2- The concept, types and applications of encryption. 20
2-1-2-1- The basis of cryptography. 20
2-1-2-1-1 encoder 21
2-1-2-1-2- decoder 21
2-1-2-2- types of digital encryption. 22
2-1-2-2-1- Time domain encryption versus frequency domain encryption. 22
2-1-2-2-2- host multimedia signal type. 22
2-1-2-2-3- Algorithms based on human perception. 23
2-1-2-2-4- Cryptography from the point of view of application. 23
2-1-2-2-5- types of cryptography based on the embedding method of cryptography 24
2-1-2-2-6- reversibility and irreversibility of cryptography. 24
2-1-2-2-7- hardware-based encryption systems 24
2-1-2-2-8- desirable characteristics of hardware encryption systems. 24
2-1-3- Attacks on cryptography and cryptography systems and their evaluation 25
2-1-3-1- Attacks. 25
2-1-3-1-1- elimination and interference attacks. 26
2-1-3-1-2- geometric attacks. 26
2-1-3-1-3- Security attacks (encryption) 27
2-1-3-1-4- Protocol attacks. 27
2-1-3-1-5- physical attacks. 27
2-1-3-2- Test systems. 27
2-1-3-2-1- Stirmark. 28
2-1-3-2-2- Unsigned. 28
2-1-3-2-3- Checkmark. 28
2-1-3-2-4- Certimark. 29
2-1-4- Problems and limitations in cryptographic ideas. 29
2-1-4-1- Characteristics of visual signals. 29
2-1-4-1-1- non-stationary (non-stationary) 30
2-1-4-1-2- periodic. 30
2-1-4-1-3- power spectrum density. 30
2-1-4-1-4- characteristics of color signals. 30
2-1-4-2- Characteristics of human vision system (HVS) 30
2-1-4-2-1- brightness sensitivity. 31
2-1-4-2-2- frequency sensitivity. 31
2-1-4-2-3- sensitivity of the pattern (texture of the image) 31
2-1-4-2-4- high distortions (JND) and small distortions (MND) 32
2-1-4-3- how much and in what place can the hidden image be inserted? 32
2-1-4-4- Broad Spectrum Communications 32
2-1-4-5- Design Problems of Hardware-Based Ideas 33
2-1-4-6- Limitations of Hijacking 34
2-2- Second Part- Hijacking. 35
2-2-1- The classic model of cryptography. 35
2-2-1-1- The issue of prisoners 36
2-2-1-2- Definitions. 38
2-2-1-3- types of guards. 39
2-2-1-4- Kerkaf principle in cryptography. 40
2-2-1-5- The three main network security standards (CIA) 40
2-2-2- The difference between encryption and encryption. 41
2-2-3- Limitations of encryption. 42
2-2-4- Uses of cryptography. 43
2-2-5- The weakness of cryptography. 43
2-2-6- Secrecy and security. 44
2-2-7- The security of encryption systems. 45
2-2-8- Classification of cryptography methods in terms of resistance. 46
2-2-9- An overview of cryptography. 47
2-2-10- Types of encryption methods in terms of secret information exchanged between sender and receiver 49
2-2-10-1- Pure encryption. 50
2-2-10-2- Encryption with secret key. 52
2-2-10-3- Encryption with public key. 53
2-2-11- Evaluation of covert recording methods. 56
2-2-12- Hiding information in noisy data. 56
2-2-13- Common criteria for evaluating the effectiveness of covert recording methods. 57
2-2-13-1- Encryption security. 57
2-2-13-2- Information security in terms of information theory. 58
2-2-13-3- Capacity. 59
2-2-13-4- Inconspicuousness. 59
2-2-12- Nahan Kavi.60
2-2-12-1- Types of hidden mining 61
2-2-12-2- Hidden mining based on supervised learning. 62
2-2-12-3- Latent mining based on blind detection 63
2-2-12-4- Latent parametric statistical mining. 65
2-2-12-5- Combined hidden mining methods. 66
2-2-12-6- types of hidden mining attacks. 66
2-2-12-7- Criteria for evaluating the efficiency of hidden mining methods. 67
2-2-12-8- Evaluation of the hidden cave based on the defined criteria based on the disturbance matrix. 68
2-2-12-9- Latent Kav evaluation based on ROC curve. 68
2-3- The third part- Categorizing the methods of hidden photography in the image. 69
2-3-1- Hijacking in the image. 69
2-3-1-1- Image definition. 69
2-3-1-2- image compression. 70
2-3-1-3- marking. 72
2-3-1-4- Differences between encryption and marking. 72
2-3-1-5-types of marking systems. 73
2-3-1-6- General classification of encryption methods. 74
2-3-2- Categorization of image encryption methods according to domain 76
2-3-2-1- Location domain. 77
2-3-2-2-LSB. 77
2-3-2-3- LSB and images with color box. 79
2-3-2-4- conversion field. 80
2-3-2-5- JPEG compression. 80
2-3-2-6- JPEG encryption. 82
2-3-2-7- LSB method in 24-bit color images. 85
2-3-2-8- LSB replacement method. 85
2-3-2-9- LSB matching method. 86
2-3-2-10- Wavelet transform. 87
2-4- Part IV- Background of the research. 87
2-4-1- Introduction. 87
2-4-2- Introduction of effective methods of hiding images. 88
2-4-2-1- An overview of the required calculations 88
2-4-2-1-1- Principles of the residual number system (RNS) 88
2-4-2-1-2- An introduction to Singular Value Decomposition (SVD) 89
2-4-2-2- Encrypting SVD1. 90
2-4-2-3 – SVD2 encryption. 91
2-4-2-4-CRT-based encryption. 91
2-4-2-5- DCT-CRT-based encryption. 93
2-4-2-6- FQFT (Fast Quaternion Fourier Transform) based cryptography 97
2-5- Summarizing the studies done 99
Chapter three. 101
Materials and methods 101
Chapter three - Materials and methods 102
3-1- Advance income. 102
3-2- Works related to cryptography resistant to geometric attacks. 103
3-3- Quadruple Fourier transform. 105
3-3-1- Quaternion display of color images. 105
3-3-2- Fast Fourier transform on color images. 106
3-4- Least squares support vector machine. 107
3-4-1- History of support vector machine. 107
3-4-2- Applications of SVM. 108
3-4-3-The main idea of ??SVM. 109
3-4-4- Linear discrimination problem. 110
3-4-4-1- Familiarity with basic concepts. 110
3-4-4-2- linear support vector machine. 111
3-4-4-3- support vector machine for integral input vectors. 112
3-4-4-4- non-linear support vector machine. 113
3-4-4-5- Least squares support vector machine. 113
3-5-Arnold transformation. 114
3-6- Proposed encryption system. 115
3-6-1- Inserting a hidden image 115
3-6-2- LS-SVM training. 119
3-6-3- Latent image extraction 119
Figure 3-4 block diagram of the latent image extraction procedure in the proposed algorithm 3-7- System evaluation. 120
3-7-1- Implementation of the algorithm. 122
3-7-2- Database used 122
3-7-3- Computational complexity. 125
3-7-4- The quality of the encoded signal (transparency of the encoded image) 127
3-7-4-1- Investigating the quality of the encoded signal from the perspective of the properties of the human visual system. 127
3-7-4-2- Examining the quality of the encoded signal from the perspective of mathematical relationships. 128
3-7-5- extracting the hidden image without attacking. 130
3-7-6- resistance to attacks. 130
3-7-6-1- Examining resistance against common attacks. 131
3-7-6-2- Examining resistance against geometric attacks. 132
Chapter IV. 136
Conclusion and suggestions 136
Chapter 4 - Conclusion and suggestions 137
List of references. 139
Source:
AbulKayum, H., Moniruzzaman, M. and F