The recovery scheme of computer-generated holography encryption–hiding images based on deep learning
In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–a...
Ausführliche Beschreibung
Autor*in: |
Hu, Tao [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2023transfer abstract |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis - Niu, Zhenzhen ELSEVIER, 2020, Amsterdam |
---|---|
Übergeordnetes Werk: |
volume:529 ; year:2023 ; day:15 ; month:02 ; pages:0 |
Links: |
---|
DOI / URN: |
10.1016/j.optcom.2022.129100 |
---|
Katalog-ID: |
ELV059744898 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV059744898 | ||
003 | DE-627 | ||
005 | 20230626053832.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221219s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.optcom.2022.129100 |2 doi | |
028 | 5 | 2 | |a /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica |
035 | |a (DE-627)ELV059744898 | ||
035 | |a (ELSEVIER)S0030-4018(22)00747-7 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 580 |q VZ |
084 | |a AFRIKA |q DE-30 |2 fid | ||
084 | |a BIODIV |q DE-30 |2 fid | ||
084 | |a 42.38 |2 bkl | ||
100 | 1 | |a Hu, Tao |e verfasserin |4 aut | |
245 | 1 | 4 | |a The recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
264 | 1 | |c 2023transfer abstract | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. | ||
520 | |a In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. | ||
650 | 7 | |a Deep learning |2 Elsevier | |
650 | 7 | |a Image hiding |2 Elsevier | |
650 | 7 | |a Optical encryption |2 Elsevier | |
650 | 7 | |a Computer-generated holography |2 Elsevier | |
700 | 1 | |a Ying, Yuchen |4 oth | |
700 | 1 | |a Sun, Xueru |4 oth | |
700 | 1 | |a Jin, Weimin |4 oth | |
773 | 0 | 8 | |i Enthalten in |a Niu, Zhenzhen ELSEVIER |t Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis |d 2020 |g Amsterdam |w (DE-627)ELV004103645 |
773 | 1 | 8 | |g volume:529 |g year:2023 |g day:15 |g month:02 |g pages:0 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.optcom.2022.129100 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a FID-AFRIKA | ||
912 | |a FID-BIODIV | ||
936 | b | k | |a 42.38 |j Botanik: Allgemeines |q VZ |
951 | |a AR | ||
952 | |d 529 |j 2023 |b 15 |c 0215 |h 0 |
author_variant |
t h th |
---|---|
matchkey_str |
hutaoyingyuchensunxuerujinweimin:2023----:hrcvrshmocmuegnrtdoorpynrpiniig |
hierarchy_sort_str |
2023transfer abstract |
bklnumber |
42.38 |
publishDate |
2023 |
allfields |
10.1016/j.optcom.2022.129100 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica (DE-627)ELV059744898 (ELSEVIER)S0030-4018(22)00747-7 DE-627 ger DE-627 rakwb eng 580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl Hu, Tao verfasserin aut The recovery scheme of computer-generated holography encryption–hiding images based on deep learning 2023transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography Elsevier Ying, Yuchen oth Sun, Xueru oth Jin, Weimin oth Enthalten in Niu, Zhenzhen ELSEVIER Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis 2020 Amsterdam (DE-627)ELV004103645 volume:529 year:2023 day:15 month:02 pages:0 https://doi.org/10.1016/j.optcom.2022.129100 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-AFRIKA FID-BIODIV 42.38 Botanik: Allgemeines VZ AR 529 2023 15 0215 0 |
spelling |
10.1016/j.optcom.2022.129100 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica (DE-627)ELV059744898 (ELSEVIER)S0030-4018(22)00747-7 DE-627 ger DE-627 rakwb eng 580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl Hu, Tao verfasserin aut The recovery scheme of computer-generated holography encryption–hiding images based on deep learning 2023transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography Elsevier Ying, Yuchen oth Sun, Xueru oth Jin, Weimin oth Enthalten in Niu, Zhenzhen ELSEVIER Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis 2020 Amsterdam (DE-627)ELV004103645 volume:529 year:2023 day:15 month:02 pages:0 https://doi.org/10.1016/j.optcom.2022.129100 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-AFRIKA FID-BIODIV 42.38 Botanik: Allgemeines VZ AR 529 2023 15 0215 0 |
allfields_unstemmed |
10.1016/j.optcom.2022.129100 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica (DE-627)ELV059744898 (ELSEVIER)S0030-4018(22)00747-7 DE-627 ger DE-627 rakwb eng 580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl Hu, Tao verfasserin aut The recovery scheme of computer-generated holography encryption–hiding images based on deep learning 2023transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography Elsevier Ying, Yuchen oth Sun, Xueru oth Jin, Weimin oth Enthalten in Niu, Zhenzhen ELSEVIER Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis 2020 Amsterdam (DE-627)ELV004103645 volume:529 year:2023 day:15 month:02 pages:0 https://doi.org/10.1016/j.optcom.2022.129100 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-AFRIKA FID-BIODIV 42.38 Botanik: Allgemeines VZ AR 529 2023 15 0215 0 |
allfieldsGer |
10.1016/j.optcom.2022.129100 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica (DE-627)ELV059744898 (ELSEVIER)S0030-4018(22)00747-7 DE-627 ger DE-627 rakwb eng 580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl Hu, Tao verfasserin aut The recovery scheme of computer-generated holography encryption–hiding images based on deep learning 2023transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography Elsevier Ying, Yuchen oth Sun, Xueru oth Jin, Weimin oth Enthalten in Niu, Zhenzhen ELSEVIER Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis 2020 Amsterdam (DE-627)ELV004103645 volume:529 year:2023 day:15 month:02 pages:0 https://doi.org/10.1016/j.optcom.2022.129100 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-AFRIKA FID-BIODIV 42.38 Botanik: Allgemeines VZ AR 529 2023 15 0215 0 |
allfieldsSound |
10.1016/j.optcom.2022.129100 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica (DE-627)ELV059744898 (ELSEVIER)S0030-4018(22)00747-7 DE-627 ger DE-627 rakwb eng 580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl Hu, Tao verfasserin aut The recovery scheme of computer-generated holography encryption–hiding images based on deep learning 2023transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography Elsevier Ying, Yuchen oth Sun, Xueru oth Jin, Weimin oth Enthalten in Niu, Zhenzhen ELSEVIER Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis 2020 Amsterdam (DE-627)ELV004103645 volume:529 year:2023 day:15 month:02 pages:0 https://doi.org/10.1016/j.optcom.2022.129100 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-AFRIKA FID-BIODIV 42.38 Botanik: Allgemeines VZ AR 529 2023 15 0215 0 |
language |
English |
source |
Enthalten in Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis Amsterdam volume:529 year:2023 day:15 month:02 pages:0 |
sourceStr |
Enthalten in Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis Amsterdam volume:529 year:2023 day:15 month:02 pages:0 |
format_phy_str_mv |
Article |
bklname |
Botanik: Allgemeines |
institution |
findex.gbv.de |
topic_facet |
Deep learning Image hiding Optical encryption Computer-generated holography |
dewey-raw |
580 |
isfreeaccess_bool |
false |
container_title |
Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis |
authorswithroles_txt_mv |
Hu, Tao @@aut@@ Ying, Yuchen @@oth@@ Sun, Xueru @@oth@@ Jin, Weimin @@oth@@ |
publishDateDaySort_date |
2023-01-15T00:00:00Z |
hierarchy_top_id |
ELV004103645 |
dewey-sort |
3580 |
id |
ELV059744898 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV059744898</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626053832.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221219s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.optcom.2022.129100</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV059744898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0030-4018(22)00747-7</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AFRIKA</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hu, Tao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The recovery scheme of computer-generated holography encryption–hiding images based on deep learning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Deep learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Image hiding</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Optical encryption</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer-generated holography</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ying, Yuchen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Xueru</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Weimin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="a">Niu, Zhenzhen ELSEVIER</subfield><subfield code="t">Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis</subfield><subfield code="d">2020</subfield><subfield code="g">Amsterdam</subfield><subfield code="w">(DE-627)ELV004103645</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:529</subfield><subfield code="g">year:2023</subfield><subfield code="g">day:15</subfield><subfield code="g">month:02</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.optcom.2022.129100</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-AFRIKA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.38</subfield><subfield code="j">Botanik: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">529</subfield><subfield code="j">2023</subfield><subfield code="b">15</subfield><subfield code="c">0215</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
author |
Hu, Tao |
spellingShingle |
Hu, Tao ddc 580 fid AFRIKA fid BIODIV bkl 42.38 Elsevier Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography The recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
authorStr |
Hu, Tao |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV004103645 |
format |
electronic Article |
dewey-ones |
580 - Plants (Botany) |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl The recovery scheme of computer-generated holography encryption–hiding images based on deep learning Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography Elsevier |
topic |
ddc 580 fid AFRIKA fid BIODIV bkl 42.38 Elsevier Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography |
topic_unstemmed |
ddc 580 fid AFRIKA fid BIODIV bkl 42.38 Elsevier Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography |
topic_browse |
ddc 580 fid AFRIKA fid BIODIV bkl 42.38 Elsevier Deep learning Elsevier Image hiding Elsevier Optical encryption Elsevier Computer-generated holography |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
y y yy x s xs w j wj |
hierarchy_parent_title |
Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis |
hierarchy_parent_id |
ELV004103645 |
dewey-tens |
580 - Plants (Botany) |
hierarchy_top_title |
Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV004103645 |
title |
The recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
ctrlnum |
(DE-627)ELV059744898 (ELSEVIER)S0030-4018(22)00747-7 |
title_full |
The recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
author_sort |
Hu, Tao |
journal |
Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis |
journalStr |
Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
500 - Science |
recordtype |
marc |
publishDateSort |
2023 |
contenttype_str_mv |
zzz |
container_start_page |
0 |
author_browse |
Hu, Tao |
container_volume |
529 |
class |
580 VZ AFRIKA DE-30 fid BIODIV DE-30 fid 42.38 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Hu, Tao |
doi_str_mv |
10.1016/j.optcom.2022.129100 |
dewey-full |
580 |
title_sort |
recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
title_auth |
The recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
abstract |
In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. |
abstractGer |
In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. |
abstract_unstemmed |
In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-AFRIKA FID-BIODIV |
title_short |
The recovery scheme of computer-generated holography encryption–hiding images based on deep learning |
url |
https://doi.org/10.1016/j.optcom.2022.129100 |
remote_bool |
true |
author2 |
Ying, Yuchen Sun, Xueru Jin, Weimin |
author2Str |
Ying, Yuchen Sun, Xueru Jin, Weimin |
ppnlink |
ELV004103645 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1016/j.optcom.2022.129100 |
up_date |
2024-07-06T22:55:46.849Z |
_version_ |
1803872157669785600 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV059744898</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626053832.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221219s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.optcom.2022.129100</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001982.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV059744898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0030-4018(22)00747-7</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AFRIKA</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hu, Tao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The recovery scheme of computer-generated holography encryption–hiding images based on deep learning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to improve the security of ciphertext images in transmission, a scheme of using neural network is proposed to restore the encryption–hiding images based on chaotic iris phase mask and computer-generated holography (CGH), which solve the great difficulty of illegal attacks in the symmetric–asymmetric hybrid encryption system. Firstly, the ciphertext image based on CGH and chaotic iris phase mask is generated, and the ciphertext image is hidden into a carrier image. A large number of hidden image and plaintext image pairs are produced as a dataset. Next, the neural network is built by continuous training and testing. Finally, the established neural network can fit the mapping relationship between the hidden image and the plaintext image. It is not necessary to extract the ciphertext image from the hidden image before decrypting. We compare the image recovered by the neural network with the plaintext image. The experimental results show that the average cross-correlation coefficient (CC) is 0.994, the average peak signal-to-noise ratio (PSNR) is 70.2 dB, and the average structural similarity (SSIM) is 0.929. This scheme can directly realize the decryption of the hidden image. The scheme (encryption–decryption–hiding) are elaborated in detail. The simulation experiments show that the scheme is feasible and has good robustness.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Deep learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Image hiding</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Optical encryption</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer-generated holography</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ying, Yuchen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Xueru</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Weimin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="a">Niu, Zhenzhen ELSEVIER</subfield><subfield code="t">Effect of hawthorn seed extract on the gastrointestinal function of rats with diabetic gastroparesis</subfield><subfield code="d">2020</subfield><subfield code="g">Amsterdam</subfield><subfield code="w">(DE-627)ELV004103645</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:529</subfield><subfield code="g">year:2023</subfield><subfield code="g">day:15</subfield><subfield code="g">month:02</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.optcom.2022.129100</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-AFRIKA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.38</subfield><subfield code="j">Botanik: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">529</subfield><subfield code="j">2023</subfield><subfield code="b">15</subfield><subfield code="c">0215</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
score |
7.4018164 |