首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Gao  Hang  Gao  Tiegang 《Cluster computing》2022,25(1):707-725

To protect the security of data outsourced to the cloud, the tampers detection and recovery for outsourced image have aroused the concern of people. A secure tampering detection and lossless recovery for medical images (MI) using permutation ordered binary (POB) number system is proposed. In the proposed scheme, the region of interest (ROI) of MI is first extracted, and then, ROI is divided into some no-overlapping blocks, and image encoding is conducted on these blocks based on the better compression performance of JPEG-LS for medical image. After that, the generated compression data by all the blocks are divided into high 4-bit and low 4-bit planes, and shuffling and combination are used to generate two plane images. Owing to the substantial redundancies space in the compressed data, the data of each plane are spread to the size of the original image. Lastly, authentication data of two bits is obtained for every pixel and inserted into the pixel itself within the each plane, and the corresponding 10-bit data is transformed into the POB value of 8-bit. Furthermore, encryption is implemented on the above image to produce two shares which can be outsourced to the cloud server. The users can detect tampered part and recover original image when they down load the shares from the cloud. Extensive experiments on some ordinary medical image and COVID-19 image datasets show that the proposed approach can locate the tampered parts within the MI, and the original MI can be recovered without any loss even if one of the shares are totally destroyed, or two shares are tampered at the ration not more than 50%. Some comparisons and analysis are given to show the better performance of the scheme.

  相似文献   

2.
Digital images are now widely used in modern clinic diagnosis. The diagnostic images with confidential information related to patients’ privacy are stored and transmitted via public networks. Secured schemes to guarantee confidentiality of patients’ privacy are becoming more and more vital. This paper proposes an adaptive medical image encryption algorithm based on improved chaotic mapping in order to overcome the defects of the existing chaotic image encryption algorithm. First, the algorithm used Logistic-sine chaos mapping to scramble the plain image. Then, the scrambled image was divided into 2-by-2 sub blocks. By using the hyper-chaotic system, the sub blocks were adaptively encrypted until all the sub block encryption was completed. By analyzing the key space, the information entropy, the correlation coefficient and the plaintext sensitivity of the algorithm, experimental results show that the proposed algorithm overcomes the shortcoming of lack of diffusion in single direction encryption. It could effectively resist all kinds of attacks and has better security and robustness.  相似文献   

3.
《IRBM》2022,43(3):151-160
With an advancement in biomedical applications, many images are communicated over the public networks. Therefore, these medical images are prone to various security threats. Development of end to end secure communication protocol for these medical images is found to be a challenging task. Therefore, many researchers have proposed various image medica image encryption techniques to provide end to end security of medical images. However, the existing approaches of block-based recovery of the secret through progressive sharing paradigm have support for limited threshold value of the chosen blocks out of the total number of the blocks during the communication of the image. Most of the suggested scheme has fixed threshold value for the blocks during recovery of secret; works good for a limited threshold (k) value out of number of blocks (n) in which secret has been divided for security. A novel threshold based (any value of k and n) blockwide recovery of secret in progressive secret sharing has been introduced and analyzed for distributed environment. The proposed threshold block wise splitting using progressive visual secret sharing (T-BPVSS) achieves any general higher value of threshold for recovery of secret medical images. Proposed scheme is tested based on various parameters such as varying values of threshold for recovery of secret during enhanced security scenario, as well as changing dimensions of the images and introducing noise in the images. A detailed distributed computing recovery solution is also suggested for the original secret by using distribution technique of shares across the networks of computers. The scheme satisfies for perfect security condition in distributed environment using at least minimum decided threshold numbers of participants (k) before revealing any of the blocks of secret medical image.  相似文献   

4.
In this paper, a network of coupled chaotic maps for multi-scale image segmentation is proposed. Time evolutions of chaotic maps that correspond to a pixel cluster are synchronized with one another, while this synchronized evolution is desynchronized with respect to time evolution of chaotic maps corresponding to other pixel clusters in the same image. The number of pixel clusters is previously unknown and the adaptive pixel moving technique introduced in the model makes it robust enough to classify ambiguous pixels.  相似文献   

5.
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance.  相似文献   

6.
Eu2+‐doped Ba3Si6O12N2 phosphors were prepared successfully via a modified solid‐state diffusion method. The phosphors were characterized by X‐ray diffraction (XRD), scanning electron microscopy (SEM) and photoluminescence measurements. These phosphors were effectively excited at 355 nm and an intense emission peaking in the range 480 nm to 525 nm in the blue region was observed. The optimized dopant concentration was determined to be 1 mol% of Eu2+ ion. The colour coordinates for phosphor were found to be (0.196, 0.326) in the blue region. This phosphor may find application for near‐ultraviolet (NUV) excited lamp phosphors. The thermoluminescence study shows the complex glow curve. Trapping parameters (activation energy and frequency factor) were calculated for individual deconvoluted peaks by Chen's peak shape method, the initial rise method and the whole glow peak method. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

7.
What kind of strategies subjects follow in various behavioral circumstances has been a central issue in decision making. In particular, which behavioral strategy, maximizing or matching, is more fundamental to animal''s decision behavior has been a matter of debate. Here, we prove that any algorithm to achieve the stationary condition for maximizing the average reward should lead to matching when it ignores the dependence of the expected outcome on subject''s past choices. We may term this strategy of partial reward maximization “matching strategy”. Then, this strategy is applied to the case where the subject''s decision system updates the information for making a decision. Such information includes subject''s past actions or sensory stimuli, and the internal storage of this information is often called “state variables”. We demonstrate that the matching strategy provides an easy way to maximize reward when combined with the exploration of the state variables that correctly represent the crucial information for reward maximization. Our results reveal for the first time how a strategy to achieve matching behavior is beneficial to reward maximization, achieving a novel insight into the relationship between maximizing and matching.  相似文献   

8.
Among the variety of cardiac arrhythmias, ventricular fibrillation (VF) and ventricular tachycardia (VT) are life-threatening; thus, accurate classification of these arrhythmias is a crucial task for cardiologists. Nevertheless, VT and VF signals are very similar in the time domain and accurate distinguishing these signals with naked eyes in some cases is impossible. In this paper, a novel self-similarity image-based scheme is introduced to classify the underlying information of VT, VF and normal electrocardiogram (ECG) signals. In this study, VT, VF and normal ECG signals are selected from CCU of the Royal Infirmary of Edinburgh and MIT-BIH datasets. According to the time delay method, signal samples can be assigned to state variables and a trajectory can be achieved. To extract the proposed self-similarity feature, first, two different trajectories from each signal trial are drawn according to two different delay time values. The two-dimensional state space of each trial trajectory is considered as an image. Therefore, two trajectory images are produced for each signal. Number of visited pixels in the first image is determined and is subtracted from that of the second image as the self-similarity feature of that signal. Moreover, another scheme is proposed to have a better estimation of self-similarity in which the logical AND operator is applied to both images (matrices) of each ECG trial. The third proposed criterion is similar to box counting method by this difference that each pixel is assigned a weight according to the trajectory density at that point and finally visited weighted pixels are counted. To classify VF from VT and normal ECG, a threshold is determined through the cross validation phase under the Receiver Operating Characteristic (ROC) criterion. To assess the proposed methods, the mentioned signals are classified using the-state-of-art chaotic features such as correlation dimension, the largest Lyapunov exponent and Approximate Entropy (ApEn). Experimental results indicate superiority of the proposed method in classifying the VT, VF and normal ECG signals compared to present traditional schemes. In addition, computational complexity of the introduced methods is very low and can be implemented in real-time applications.  相似文献   

9.
The photoluminescence (PL) and thermoluminescence (TL) displayed by Dy‐activated strontium haloborate (Sr2B5O9Cl) were studied. A modified solid‐state reaction was employed for the preparation of the phosphor. Photoluminescence spectra showed blue (484 nm) and yellow (575 nm) emissions due to incorporation of Dy3+ into host matrix. The Dy‐doped (0.5 mol%) Sr2B5O9Cl was studied after exposure to γ‐irradiation and revealed a prominent glow curve at 261°C with a small hump around 143°C indicating that two types of traps were generated. The glow peak at the higher temperature side (261°C) was more stable than the lower temperature glow peak. The TL intensity was 1.17 times less than that of the standard CaSO4:Dy thermoluminescence dosimetry (TLD) phosphor, the phosphor showed a linear dose–response curve for different γ‐ray irradiation doses (0.002–1.25 Gy) and fading of 5–7% was observed for higher temperature peaks upon storage. Trapping parameters and their estimated error values have been calculated by Chen's peak shape method and by the initial rise method. Values of activation energies estimated by both these techniques were comparable. The slight difference in activation energy values calculated by Chen's peak shape method indicated the formation of two kinds of traps Furthermore, slight differences in frequency values are due to various escaping and retrapping probabilities. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

10.
Diffusion of a fluorescent protein within a cell has been measured using either fluctuation-based techniques (fluorescence correlation spectroscopy (FCS) or raster-scan image correlation spectroscopy) or particle tracking. However, none of these methods enables us to measure the diffusion of the fluorescent particle at each pixel of the image. Measurement using conventional single-point FCS at every individual pixel results in continuous long exposure of the cell to the laser and eventual bleaching of the sample. To overcome this limitation, we have developed what we believe to be a new method of scanning with simultaneous construction of a fluorescent image of the cell. In this believed new method of modified raster scanning, as it acquires the image, the laser scans each individual line multiple times before moving to the next line. This continues until the entire area is scanned. This is different from the original raster-scan image correlation spectroscopy approach, where data are acquired by scanning each frame once and then scanning the image multiple times. The total time of data acquisition needed for this method is much shorter than the time required for traditional FCS analysis at each pixel. However, at a single pixel, the acquired intensity time sequence is short; requiring nonconventional analysis of the correlation function to extract information about the diffusion. These correlation data have been analyzed using the phasor approach, a fit-free method that was originally developed for analysis of FLIM images. Analysis using this method results in an estimation of the average diffusion coefficient of the fluorescent species at each pixel of an image, and thus, a detailed diffusion map of the cell can be created.  相似文献   

11.
A new Na3Ca2(SO4)3F: Ce3+ phosphor synthesized by a solid state diffusion method is reported. The photoluminescence study showed a single high intensity emission peak at 307 nm wavelength when excited by UV light of wavelength 278 nm. An unresolved peak of comparatively less intensity was also observed at 357 nm along with the main peak. The characteristic emission of dopant Ce in Na3Ca2(SO4)3F phosphor clearly indicated that it resides in the host lattice in trivalent form. The emission peak can be attributed to 5d → 4f transition of rare earth Ce3+. The prepared sample is also characterized for its thermoluminescence properties. The TL glow curve of prepared sample showed a single broad peak at 147°C. The trapping parameters are also evaluated by Chen's method. The values of trap depth (E) and frequency factor (s) were found to be 0.64 ± 0.002 eV and 1.43 × 107 s–1 respectively. The study of PL and TL along with evaluation of trapping parameters has been undertaken and discussed for the first time. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

12.
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.  相似文献   

13.
This paper evaluates the degree of saliency of texts in natural scenes using visual saliency models. A large scale scene image database with pixel level ground truth is created for this purpose. Using this scene image database and five state-of-the-art models, visual saliency maps that represent the degree of saliency of the objects are calculated. The receiver operating characteristic curve is employed in order to evaluate the saliency of scene texts, which is calculated by visual saliency models. A visualization of the distribution of scene texts and non-texts in the space constructed by three kinds of saliency maps, which are calculated using Itti''s visual saliency model with intensity, color and orientation features, is given. This visualization of distribution indicates that text characters are more salient than their non-text neighbors, and can be captured from the background. Therefore, scene texts can be extracted from the scene images. With this in mind, a new visual saliency architecture, named hierarchical visual saliency model, is proposed. Hierarchical visual saliency model is based on Itti''s model and consists of two stages. In the first stage, Itti''s model is used to calculate the saliency map, and Otsu''s global thresholding algorithm is applied to extract the salient region that we are interested in. In the second stage, Itti''s model is applied to the salient region to calculate the final saliency map. An experimental evaluation demonstrates that the proposed model outperforms Itti''s model in terms of captured scene texts.  相似文献   

14.
Our ability to harness the advances in microelectronics over the past decade(s) for X-ray detection has resulted in significant improvements in the state of the art. Biology with X-ray free-electron lasers present daunting detector challenges: all of the photons arrive at the same time, and individual high peak power pulses must be read out shot-by-shot. Direct X-ray detection in silicon pixel detectors—monolithic or hybrid—are the standard for XFELs today. For structural biology, improvements are needed for today''s 10–100 Hz XFELs, and further improvements are required for tomorrow''s 10+ kHz XFELs. This article will discuss detector challenges, why they arise and ways to overcome them, along with the current state of the art.  相似文献   

15.
Algorithms using 4-pixel Feistel structure and chaotic systems have been shown to resolve security problems caused by large data capacity and high correlation among pixels for color image encryption. In this paper, a fast color image encryption algorithm based on the modified 4-pixel Feistel structure and multiple chaotic maps is proposed to improve the efficiency of this type of algorithm. Two methods are used. First, a simple round function based on a piecewise linear function and tent map are used to reduce computational cost during each iteration. Second, the 4-pixel Feistel structure reduces round number by changing twist direction securely to help the algorithm proceed efficiently. While a large number of simulation experiments prove its security performance, additional special analysis and a corresponding speed simulation show that these two methods increase the speed of the proposed algorithm (0.15s for a 256*256 color image) to twice that of an algorithm with a similar structure (0.37s for the same size image). Additionally, the method is also faster than other recently proposed algorithms.  相似文献   

16.
自然资源生态安全是国家安全的重要组成部分,自然资源生态安全区划对保障区域可持续发展提供了重要途径。基于自然资源数据、生态环境数据和相关区划资料,从生态敏感性与生态服务重要性角度构建了自然资源生态安全评价指标体系,进而揭示了中国自然资源生态安全的空间格局;通过建立区划的原则和指标,按照一级区主要反映自然资源空间分布格局,二级区主要揭示自然资源生态安全水平的差异,采用SOFM网络制订了中国自然资源生态安全区划方案。结果显示:(1)中国自然资源生态安全水平整体偏低,以中警与重警状态区域为主,安全和较安全状态的区域仅占24.22%,其中低安全等级区多分布于400mm等降水量线以西的干旱、半干旱区,高安全等级区则集中分布于水热资源与生物资源较为丰富的东南部地区;(2)中国自然资源生态安全区划方案包括8个一级区与27个二级区,总结归纳各大区自然资源的特征和威胁生态安全的问题,并针对二级区自然资源生态安全状况提出了对策建议。研究结果可为分区、分类推进全国自然资源可持续利用和国土空间优化提供理论支持与决策依据。  相似文献   

17.
Human pluripotent stem (hPS) cells are a potential source of cells for medical therapy and an ideal system to study fate decisions in early development. However, hPS cells cultured in vitro exhibit a high degree of heterogeneity, presenting an obstacle to clinical translation. hPS cells grow in spatially patterned colony structures, necessitating quantitative single-cell image analysis. We offer a tool for analyzing the spatial population context of hPS cells that integrates automated fluorescent microscopy with an analysis pipeline. It enables high-throughput detection of colonies at low resolution, with single-cellular and sub-cellular analysis at high resolutions, generating seamless in situ maps of single-cellular data organized by colony. We demonstrate the tool''s utility by analyzing inter- and intra-colony heterogeneity of hPS cell cycle regulation and pluripotency marker expression. We measured the heterogeneity within individual colonies by analyzing cell cycle as a function of distance. Cells loosely associated with the outside of the colony are more likely to be in G1, reflecting a less pluripotent state, while cells within the first pluripotent layer are more likely to be in G2, possibly reflecting a G2/M block. Our multi-scale analysis tool groups colony regions into density classes, and cells belonging to those classes have distinct distributions of pluripotency markers and respond differently to DNA damage induction. Lastly, we demonstrate that our pipeline can robustly handle high-content, high-resolution single molecular mRNA FISH data by using novel image processing techniques. Overall, the imaging informatics pipeline presented offers a novel approach to the analysis of hPS cells that includes not only single cell features but also colony wide, and more generally, multi-scale spatial configuration.  相似文献   

18.
The unihemispheric slow-wave sleep, the ability to sleep during swimming with one open eye and the absence of paradoxical sleep in its form observed in all terrestrial mammals are unique features of sleep in cetaceans. Visual observation supplement electrophysiological studies and allow obtaining novel data about sleep of cetaceans. In the present study we examined behavior of 3 adult Commerson's dolphins Cephalorhynchus commersonii kept in the oceanarium Sea World (San Diego, CA, USA). The behavior of the dolphins can be subdivided into 5 swimming types: (1) active swimming marked by variable and irregular trajectory of movement (for 3 dolphins, on average, 35.1 ± 2.7% of the 24-h period) was the active wakefulness; (2) circular swimming was divided into the slow and fast swimming and occupied, on average, 44.4 ± 3.8 and 9.7 ± 0.8% of the 24-h period, respectively; during the circular swimming, dolphins performed from 1 to 6 circular swimming during one respiration pause; (3) quiet chaotic swimming (3.9 ± 1.2%) that occurred at the bottom and was not accompanied by signs of activity; (4) hanging, and (5) slow swimming at the surface (4.1 ± 0.5 and 2.8 ± 0.4%) respectively; the latter two swimming types were accompanied by frequent respiration (hyperventilation). We suggest that the sleep state in Commerson's dolphins occurs predominantly during the circular and quiet swimming. From time to time the dolphins decreased the speed, up to complete stop. Such episodes appeared to be the deepest sleep episodes. In all dolphins, muscle jerks as well erection in male are observed. Most jerks and erections occurred during the circular and quiet chaotic swimming. Thus, Commerson's dolphins, like other studied small cetaceans, are swimming for 24 h per day and they sleep during the swimming. Some muscle jerks that were observed in the dolphins in this study might have been brief episodes of paradoxical sleep.  相似文献   

19.
Fibered confocal fluorescence in vivo imaging with a fiber optic bundle uses the same principle as fluorescent confocal microscopy. It can excite fluorescent in situ elements through the optical fibers, and then record some of the emitted photons, via the same optical fibers. The light source is a laser that sends the exciting light through an element within the fiber bundle and as it scans over the sample, recreates an image pixel by pixel. As this scan is very fast, by combining it with dedicated image processing software, images in real time with a frequency of 12 frames/sec can be obtained.We developed a technique to quantitatively characterize capillary morphology and function, using a confocal fluorescence videomicroscopy device. The first step in our experiment was to record 5 sec movies in the four quadrants of the tumor to visualize the capillary network. All movies were processed using software (ImageCell, Mauna Kea Technology, Paris France) that performs an automated segmentation of vessels around a chosen diameter (10 μm in our case). Thus, we could quantify the ''functional capillary density'', which is the ratio between the total vessel area and the total area of the image. This parameter was a surrogate marker for microvascular density, usually measured using pathology tools.The second step was to record movies of the tumor over 20 min to quantify leakage of the macromolecular contrast agent through the capillary wall into the interstitium. By measuring the ratio of signal intensity in the interstitium over that in the vessels, an ''index leakage'' was obtained, acting as a surrogate marker for capillary permeability.  相似文献   

20.
Nine states have legislated impaired physician programs administered by state medical boards (2), by independent agencies (4), or by medical societies through contracts with medical boards (3). All other state programs are administered by medical societies. California''s diversion program has been in effect for more than 10 years. It was the first program for alcohol- and drug-addicted physicians in the country administered by the state agency that also disciplines physicians. Of the physicians who enrolled in this program, 72% have completed it successfully. A total of 618 physicians have been accepted into the program since its inception, with 247 physicians currently participating.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号