With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access,more and more users store data in cloud server.However,how to quickly query the expecte...With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access,more and more users store data in cloud server.However,how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval.Towards this goal,this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing.Firstly,we extract local feature of images,and then cluster the features by K-means.Based on it,the visual word codebook is introduced to represent feature information of images,which hashes the codebook to the corresponding fingerprint.Finally,the image feature vector is generated by SimHash searchable encryption feature algorithm for similarity retrieval.Extensive experiments on two public datasets validate the effectiveness of our method.Besides,the proposed method outperforms one popular searchable encryption,and the results are competitive to the state-of-the-art.展开更多
Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on blo...Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on block classification and permutation is proposed.Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively.After block classification,content owner utilizes a specific encryption method,including stream cipher encryption and block permutation to protect image content securely.For the encrypted image,data hider embeds additional secret information in the most significant bits(MSB)of the encrypted pixels in smooth blocks and the final marked image can be obtained.At the receiver side,secret data will be extracted correctly with data-hiding key.When receiver only has encryption key,after stream cipher decryption,block scrambling decryption and MSB error prediction with threshold,decrypted image will be achieved.When data hiding key and encryption key are both obtained,receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly,hence,receiver can recover marked image losslessly.Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.展开更多
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding capacity.Therefore,this paper innovati...Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding capacity.Therefore,this paper innovatively proposes a high capacity RDH-EI scheme that combines adaptive most significant bit(MSB)prediction with secret sharing technology.Firstly,adaptive MSB prediction is performed on the original image and cryptographic feedback secret sharing strategy encrypts the spliced pixels to spare embedding space.In the data hiding phase,each encrypted image is sent to a data hider to embed the secret information independently.When r copies of the image carrying the secret text are collected,the original image can be recovered lossless and the secret information can be extracted.Performance evaluation shows that the proposed method in this paper has the diffusivity,reversibility,and separability.The last but the most important,it has higher embedding capacity.For 512×512 grayscale images,the average embedding rate reaches 4.7358 bits per pixel(bpp).Compared to the average embedding rate that can be achieved by the Wang et al.’s SIS-RDHEI scheme,the proposed scheme with(2,2),(2,3),(2,4),(3,4),and(3,5)-threshold can increase by 0.7358 bpp,2.0658 bpp,2.7358 bpp,0.7358 bpp,and 1.5358 bpp,respectively.展开更多
To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according t...To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according to the smoothness of the image,the image is partitioned into blocks based on adaptive quadtree partitioning,and then blocks of different sizes are encrypted and scrambled at the block level to resist the analysis of the encrypted images.In the data embedding stage,the adaptive MSB prediction method proposed by Wang and He(2022)is improved by taking the upper-left pixel in the block as the target pixel,to predict other pixels to free up more embedding space.To the best of our knowledge,quadtree partitioning is first applied to RDH-EI.Simulation results show that the proposed method is reversible and separable,and that its average embedding capacity is improved.For gray images with a size of 512×512,the average embedding capacity is increased by 25565 bits.For all smooth images with improved embedding capacity,the average embedding capacity is increased by about 35530 bits.展开更多
Reversible data hiding in encrypted images(RDHEI)is essential for safeguarding sensitive information within the encrypted domain.In this study,we propose an intelligent pixel predictor based on a residual group block ...Reversible data hiding in encrypted images(RDHEI)is essential for safeguarding sensitive information within the encrypted domain.In this study,we propose an intelligent pixel predictor based on a residual group block and a spatial attention module,showing superior pixel prediction performance compared to existing predictors.Additionally,we introduce an adaptive joint coding method that leverages bit-plane characteristics and intra-block pixel correlations to maximize embedding space,outperforming single coding approaches.The image owner employs the presented intelligent predictor to forecast the original image,followed by encryption through additive secret sharing before conveying the encrypted image to data hiders.Subsequently,data hiders encrypt secret data and embed them within the encrypted image before transmitting the image to the receiver.The receiver can extract secret data and recover the original image losslessly,with the processes of data extraction and image recovery being separable.Our innovative approach combines an intelligent predictor with additive secret sharing,achieving reversible data embedding and extraction while ensuring security and lossless recovery.Experimental results demonstrate that the predictor performs well and has a substantial embedding capacity.For the Lena image,the number of prediction errors within the range of[-5,5]is as high as 242500 and our predictor achieves an embedding capacity of 4.39 bpp.展开更多
In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for med...In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.展开更多
Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Tr...Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform(DWT)with the energy compaction of the Discrete Wavelet Transform(DCT).The multi-level Encryption-based Hybrid Fusion Technique(EbhFT)aims to achieve great advances in terms of imperceptibility and security of medical images.A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform.Afterwards,a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to encode the watermark.Lastly,a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT.Thus,the watermarked image is generated by enclosing both keys into DWT and DCT coefficients.The fusions ability of the proposed EbHFT technique makes the best use of the distinct privileges of using both DWT and DCT methods.In order to validate the proposed technique,a standard dataset of medical images is used.Simulation results show higher performance of the visual quality(i.e.,57.65)for the watermarked forms of all types of medical images.In addition,EbHFT robustness outperforms an existing scheme tested for the same dataset in terms of Normalized Correlation(NC).Finally,extra protection for digital images from against illegal replicating and unapproved tampering using the proposed technique.展开更多
To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification s...To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR(XOR),which improves the security of encrypted images.And then,a pixel-typemark generation method based on block-compression is designed to reduce the extra burden of key management and transfer.At last,an iterative recovery strategy is proposed to optimize the marked decrypted image,which allows the original image to be obtained only using the encryption key.The proposed reversible data hiding scheme in encrypted image is not vulnerable to the ciphertext-only attack due to the fact that the XOR-encrypted pixels are scrambled in the corresponding encrypted image.Experimental results demonstrate that the decrypted images obtained by the proposed method are the same as the original ones,and the maximum embedding rate of proposed method is higher than the previously reported reversible data hiding methods in encrypted image.展开更多
A privacy-preserving search model for JPEG images is proposed in paper,which uses the bag-of-encrypted-words based on QDCT(Quaternion Discrete Cosine Transform)encoding.The JPEG image is obtained by a series of steps ...A privacy-preserving search model for JPEG images is proposed in paper,which uses the bag-of-encrypted-words based on QDCT(Quaternion Discrete Cosine Transform)encoding.The JPEG image is obtained by a series of steps such as DCT(Discrete Cosine Transform)transformation,quantization,entropy coding,etc.In this paper,we firstly transform the images from spatial domain into quaternion domain.By analyzing the algebraic relationship between QDCT and DCT,a QDCT quantization table and QDTC coding for color images are proposed.Then the compressed image data is encrypted after the steps of block permutation,intra-block permutation,single table substitution and stream cipher.At last,the similarity between original image and query image can be measured by the Manhattan distance,which is calculated by two feature vectors with the model of bag-of-words on the cloud server side.The outcome shows good performance in security attack and retrieval accuracy.展开更多
In smart environments,more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus.The outsourcing of massive teaching data can reduce storage burden and c...In smart environments,more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus.The outsourcing of massive teaching data can reduce storage burden and computational cost,but causes some privacy concerns because those teaching data(especially personal image data)may contain personal private information.In this paper,a privacy-preserving image feature extraction algorithm is proposed by using mean value features.Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers.Cloud servers can directly extract image mean value features from encrypted images.Experiments show the effectiveness and security of our algorithm.It can achieve information search over the encrypted images on the smart campus.展开更多
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic...A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research.展开更多
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica...Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications.展开更多
Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blo...Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images.展开更多
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.展开更多
The large-scale acquisition and widespread application of remote sensing image data have led to increasingly severe challenges in information security and privacy protection during transmission and storage.Urban remot...The large-scale acquisition and widespread application of remote sensing image data have led to increasingly severe challenges in information security and privacy protection during transmission and storage.Urban remote sensing image,characterized by complex content and well-defined structures,are particularly vulnerable to malicious attacks and information leakage.To address this issue,the author proposes an encryption method based on the enhanced single-neuron dynamical system(ESNDS).ESNDS generates highquality pseudo-random sequences with complex dynamics and intense sensitivity to initial conditions,which drive a structure of multi-stage cipher comprising permutation,ring-wise diffusion,and mask perturbation.Using representative GF-2 Panchromatic and Multispectral Scanner(PMS)urban scenes,the author conducts systematic evaluations in terms of inter-pixel correlation,information entropy,histogram uniformity,and number of pixel change rate(NPCR)/unified average changing intensity(UACI).The results demonstrate that the proposed scheme effectively resists statistical analysis,differential attacks,and known-plaintext attacks while maintaining competitive computational efficiency for high-resolution urban image.In addition,the cipher is lightweight and hardware-friendly,integrates readily with on-board and ground processing,and thus offers tangible engineering utility for real-time,large-volume remote-sensing data protection.展开更多
Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spher...Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spherical attractor is proposed,which is constructed using spherical coordinates.Dynamical analyses reveal that the hyperchaotic map exhibits global hyperchaos and high complexity,making it capable of generating more complex chaotic sequences suitable for image encryption.A hybrid encryption scheme based on a hyperchaotic map is proposed for two-dimensional(2D)images,three-dimensional(3D)models,and 3D point clouds.Firstly,the pixels of 2D image and the coordinate data of 3D image are fused into a plaintext cube,which is combined with Hash-512 to obtain the initial value of the hyperchaotic map.Chaotic sequences are utilized for cube space internal confusion and dynamic cross-diffusion.The encrypted images demonstrate high information entropy,and the test results show that the encryption scheme effectively protects the images.The proposed hybrid image encryption scheme provides an efficient solution for securing various types of images.展开更多
In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,parti...In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,particularly when relying on chaotic sequences,which may exhibit vulnerabilities to brute-force and predictability-based attacks.To address the limitations,this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks(CNNs).Firstly,a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space,which can enhance the key space complexity and randomness,ensuring resistance against cryptanalysis.Secondly,an innovative CNN architecture is introduced for generating the key stream for the cryptographic system.CNN architecture exhibits excellent nonlinearity and can further optimize the key generation process.To rigorously evaluate the encryption performance,extensive simulation analyses were conducted,including visualization,statistical histogram,information entropy,correlation,differential attack,and resistance.The method has shown a high NPCR(Number of Pixel Change Rate)of 99.642%and a UACI(Unified Average Changing Intensity)value of 33.465%,exhibiting powerful resistance to differential attacks.A series of comprehensive experimental tests have illustrated that the proposed scheme exhibits superior distribution characteristics,which underscores the robustness and efficacy of the image encryption,and helps for communication security.展开更多
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural networks.As a type of neural network whose dynamic behavior can be explained,the coupling of resonant ...Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural networks.As a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the literature.Therefore,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the RTD-MCNN.Based on this model,a simple encryption scheme for the protection of digital images in police forensic applications is proposed.The results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting multistability.Furthermore,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear variations.Undoubtedly,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy protection.Encryption tests and security analyses validate the effectiveness of this scheme.展开更多
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third...Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality.展开更多
In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quan...In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario.展开更多
基金This work is supported by the National Natural Science Foundation of China(No.61772561)the Key Research&Development Plan of Hunan Province(No.2018NK2012)+2 种基金the Science Research Projects of Hunan Provincial Education Department(Nos.18A174,18C0262)the Science&Technology Innovation Platform and Talent Plan of Hunan Province(2017TP1022)this work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property,Universities of Hunan Province,Open project(No.20181901CRP04).
文摘With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access,more and more users store data in cloud server.However,how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval.Towards this goal,this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing.Firstly,we extract local feature of images,and then cluster the features by K-means.Based on it,the visual word codebook is introduced to represent feature information of images,which hashes the codebook to the corresponding fingerprint.Finally,the image feature vector is generated by SimHash searchable encryption feature algorithm for similarity retrieval.Extensive experiments on two public datasets validate the effectiveness of our method.Besides,the proposed method outperforms one popular searchable encryption,and the results are competitive to the state-of-the-art.
基金This work was supported by the National Natural Science Foundation of China(61672354,61702332).
文摘Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on block classification and permutation is proposed.Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively.After block classification,content owner utilizes a specific encryption method,including stream cipher encryption and block permutation to protect image content securely.For the encrypted image,data hider embeds additional secret information in the most significant bits(MSB)of the encrypted pixels in smooth blocks and the final marked image can be obtained.At the receiver side,secret data will be extracted correctly with data-hiding key.When receiver only has encryption key,after stream cipher decryption,block scrambling decryption and MSB error prediction with threshold,decrypted image will be achieved.When data hiding key and encryption key are both obtained,receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly,hence,receiver can recover marked image losslessly.Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.
基金supported by the National Natural Science Foundation of China(Nos.62272478 and 61872384)National Natural Science Foundation Youth Foundation Project(Nos.62102451 and 62102450)Basic Frontier Research Foundation Project of Armed Police Engineering University(Nos.WJY202012 and WJY202112).
文摘Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding capacity.Therefore,this paper innovatively proposes a high capacity RDH-EI scheme that combines adaptive most significant bit(MSB)prediction with secret sharing technology.Firstly,adaptive MSB prediction is performed on the original image and cryptographic feedback secret sharing strategy encrypts the spliced pixels to spare embedding space.In the data hiding phase,each encrypted image is sent to a data hider to embed the secret information independently.When r copies of the image carrying the secret text are collected,the original image can be recovered lossless and the secret information can be extracted.Performance evaluation shows that the proposed method in this paper has the diffusivity,reversibility,and separability.The last but the most important,it has higher embedding capacity.For 512×512 grayscale images,the average embedding rate reaches 4.7358 bits per pixel(bpp).Compared to the average embedding rate that can be achieved by the Wang et al.’s SIS-RDHEI scheme,the proposed scheme with(2,2),(2,3),(2,4),(3,4),and(3,5)-threshold can increase by 0.7358 bpp,2.0658 bpp,2.7358 bpp,0.7358 bpp,and 1.5358 bpp,respectively.
基金supported by the National Natural Science Foundation of China(Nos.62272478,61872384,and 62102451)the Basic Frontier Research Foundation of Engineering University of PAP,China(Nos.WJY202012 and WJY202112)。
文摘To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according to the smoothness of the image,the image is partitioned into blocks based on adaptive quadtree partitioning,and then blocks of different sizes are encrypted and scrambled at the block level to resist the analysis of the encrypted images.In the data embedding stage,the adaptive MSB prediction method proposed by Wang and He(2022)is improved by taking the upper-left pixel in the block as the target pixel,to predict other pixels to free up more embedding space.To the best of our knowledge,quadtree partitioning is first applied to RDH-EI.Simulation results show that the proposed method is reversible and separable,and that its average embedding capacity is improved.For gray images with a size of 512×512,the average embedding capacity is increased by 25565 bits.For all smooth images with improved embedding capacity,the average embedding capacity is increased by about 35530 bits.
基金Project supported by the Scientific Research Project of Liaoning Provincial Department of Education,China(No.JYTMS20231039)the Liaoning Provincial Educational Science Planning Project,China(No.JG22CB252)。
文摘Reversible data hiding in encrypted images(RDHEI)is essential for safeguarding sensitive information within the encrypted domain.In this study,we propose an intelligent pixel predictor based on a residual group block and a spatial attention module,showing superior pixel prediction performance compared to existing predictors.Additionally,we introduce an adaptive joint coding method that leverages bit-plane characteristics and intra-block pixel correlations to maximize embedding space,outperforming single coding approaches.The image owner employs the presented intelligent predictor to forecast the original image,followed by encryption through additive secret sharing before conveying the encrypted image to data hiders.Subsequently,data hiders encrypt secret data and embed them within the encrypted image before transmitting the image to the receiver.The receiver can extract secret data and recover the original image losslessly,with the processes of data extraction and image recovery being separable.Our innovative approach combines an intelligent predictor with additive secret sharing,achieving reversible data embedding and extraction while ensuring security and lossless recovery.Experimental results demonstrate that the predictor performs well and has a substantial embedding capacity.For the Lena image,the number of prediction errors within the range of[-5,5]is as high as 242500 and our predictor achieves an embedding capacity of 4.39 bpp.
基金supported by the Key Research Project of Hainan Province[ZDYF2018129]the Higher Education Research Project of Hainan Province(Hnky2019-73)+3 种基金the National Natural Science Foundation of China[61762033]the Natural Science Foundation of Hainan[617175]the Special Scientific Research Project of Philosophy and Social Sciences of Chongqing Medical University[201703]the Key Research Project of Haikou College of Economics[HJKZ18-01].
文摘In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.
文摘Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform(DWT)with the energy compaction of the Discrete Wavelet Transform(DCT).The multi-level Encryption-based Hybrid Fusion Technique(EbhFT)aims to achieve great advances in terms of imperceptibility and security of medical images.A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform.Afterwards,a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to encode the watermark.Lastly,a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT.Thus,the watermarked image is generated by enclosing both keys into DWT and DCT coefficients.The fusions ability of the proposed EbHFT technique makes the best use of the distinct privileges of using both DWT and DCT methods.In order to validate the proposed technique,a standard dataset of medical images is used.Simulation results show higher performance of the visual quality(i.e.,57.65)for the watermarked forms of all types of medical images.In addition,EbHFT robustness outperforms an existing scheme tested for the same dataset in terms of Normalized Correlation(NC).Finally,extra protection for digital images from against illegal replicating and unapproved tampering using the proposed technique.
基金The research is supported by the National Natural Science Foundation of China(61461047,U1536110).
文摘To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR(XOR),which improves the security of encrypted images.And then,a pixel-typemark generation method based on block-compression is designed to reduce the extra burden of key management and transfer.At last,an iterative recovery strategy is proposed to optimize the marked decrypted image,which allows the original image to be obtained only using the encryption key.The proposed reversible data hiding scheme in encrypted image is not vulnerable to the ciphertext-only attack due to the fact that the XOR-encrypted pixels are scrambled in the corresponding encrypted image.Experimental results demonstrate that the decrypted images obtained by the proposed method are the same as the original ones,and the maximum embedding rate of proposed method is higher than the previously reported reversible data hiding methods in encrypted image.
基金This work is supported in part by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20181407in part by the National Natural Science Foundation of China under grant numbers U1936118,61672294+3 种基金in part by Six peak talent project of Jiangsu Province(R2016L13)Qinglan Project of Jiangsu Province,and“333”project of Jiangsu Province,in part by the National Natural Science Foundation of China under grant numbers U1836208,61702276,61772283,61602253,and 61601236in part by National Key R\&D Program of China under grant 2018YFB1003205in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund,in part by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.Zhihua Xia is supported by BK21+program from the Ministry of Education of Korea.
文摘A privacy-preserving search model for JPEG images is proposed in paper,which uses the bag-of-encrypted-words based on QDCT(Quaternion Discrete Cosine Transform)encoding.The JPEG image is obtained by a series of steps such as DCT(Discrete Cosine Transform)transformation,quantization,entropy coding,etc.In this paper,we firstly transform the images from spatial domain into quaternion domain.By analyzing the algebraic relationship between QDCT and DCT,a QDCT quantization table and QDTC coding for color images are proposed.Then the compressed image data is encrypted after the steps of block permutation,intra-block permutation,single table substitution and stream cipher.At last,the similarity between original image and query image can be measured by the Manhattan distance,which is calculated by two feature vectors with the model of bag-of-words on the cloud server side.The outcome shows good performance in security attack and retrieval accuracy.
基金A This work was supported in part by the National Natural Science Foundation of China(61872408)the Natural Science Foundation of Hunan Province(2020JJ4238)+2 种基金the Social Science Fund of Hunan Province(16YBA102)the Study and Innovative Experiment Project for College Students in HNFNU(YSXS1842)the Research Fund of Hunan Provincial Key Laboratory of Informationization Technology for Basic Education(2015TP1017).
文摘In smart environments,more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus.The outsourcing of massive teaching data can reduce storage burden and computational cost,but causes some privacy concerns because those teaching data(especially personal image data)may contain personal private information.In this paper,a privacy-preserving image feature extraction algorithm is proposed by using mean value features.Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers.Cloud servers can directly extract image mean value features from encrypted images.Experiments show the effectiveness and security of our algorithm.It can achieve information search over the encrypted images on the smart campus.
文摘A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research.
基金funded by Deanship of Research and Graduate Studies at King Khalid University.The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Group Project under grant number(RGP.2/556/45).
文摘Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications.
基金supported by the Large Group Project under grant number(RGP2/473/46).
文摘Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images.
基金funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544)Hubei Provincial Department of Education Project(No.Q20232206)Project of Hubei University of Economics(No.T201410).
文摘With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
文摘The large-scale acquisition and widespread application of remote sensing image data have led to increasingly severe challenges in information security and privacy protection during transmission and storage.Urban remote sensing image,characterized by complex content and well-defined structures,are particularly vulnerable to malicious attacks and information leakage.To address this issue,the author proposes an encryption method based on the enhanced single-neuron dynamical system(ESNDS).ESNDS generates highquality pseudo-random sequences with complex dynamics and intense sensitivity to initial conditions,which drive a structure of multi-stage cipher comprising permutation,ring-wise diffusion,and mask perturbation.Using representative GF-2 Panchromatic and Multispectral Scanner(PMS)urban scenes,the author conducts systematic evaluations in terms of inter-pixel correlation,information entropy,histogram uniformity,and number of pixel change rate(NPCR)/unified average changing intensity(UACI).The results demonstrate that the proposed scheme effectively resists statistical analysis,differential attacks,and known-plaintext attacks while maintaining competitive computational efficiency for high-resolution urban image.In addition,the cipher is lightweight and hardware-friendly,integrates readily with on-board and ground processing,and thus offers tangible engineering utility for real-time,large-volume remote-sensing data protection.
基金Project supported by the Basic Scientific Research Projects of Department of Education of Liaoning Province,China(Grant No.LJ212410152049)the Technological Innovation Projects in the field of artificial intelligence of Liaoning Province,China(Grant No.2023JH26/10300011)。
文摘Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spherical attractor is proposed,which is constructed using spherical coordinates.Dynamical analyses reveal that the hyperchaotic map exhibits global hyperchaos and high complexity,making it capable of generating more complex chaotic sequences suitable for image encryption.A hybrid encryption scheme based on a hyperchaotic map is proposed for two-dimensional(2D)images,three-dimensional(3D)models,and 3D point clouds.Firstly,the pixels of 2D image and the coordinate data of 3D image are fused into a plaintext cube,which is combined with Hash-512 to obtain the initial value of the hyperchaotic map.Chaotic sequences are utilized for cube space internal confusion and dynamic cross-diffusion.The encrypted images demonstrate high information entropy,and the test results show that the encryption scheme effectively protects the images.The proposed hybrid image encryption scheme provides an efficient solution for securing various types of images.
基金supported in part by the National Key Research and Development Program of China(No.2021YFB3101500)the Fundamental Research Funds for the Central Universities(No.2023RC69).
文摘In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,particularly when relying on chaotic sequences,which may exhibit vulnerabilities to brute-force and predictability-based attacks.To address the limitations,this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks(CNNs).Firstly,a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space,which can enhance the key space complexity and randomness,ensuring resistance against cryptanalysis.Secondly,an innovative CNN architecture is introduced for generating the key stream for the cryptographic system.CNN architecture exhibits excellent nonlinearity and can further optimize the key generation process.To rigorously evaluate the encryption performance,extensive simulation analyses were conducted,including visualization,statistical histogram,information entropy,correlation,differential attack,and resistance.The method has shown a high NPCR(Number of Pixel Change Rate)of 99.642%and a UACI(Unified Average Changing Intensity)value of 33.465%,exhibiting powerful resistance to differential attacks.A series of comprehensive experimental tests have illustrated that the proposed scheme exhibits superior distribution characteristics,which underscores the robustness and efficacy of the image encryption,and helps for communication security.
基金supported by the Scientific Research Fund of Hunan Provincial Education Department(Grant No.24A0248)the National Key Research and Development Program“National Quality Infrastructure System”Special Project(Grant No.2024YFF0617900)the Hefei Minglong Electronic Technology Co.,Ltd.(Grant Nos.2024ZKHX293,2024ZKHX294,and 2024ZKHX295).
文摘Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural networks.As a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the literature.Therefore,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the RTD-MCNN.Based on this model,a simple encryption scheme for the protection of digital images in police forensic applications is proposed.The results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting multistability.Furthermore,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear variations.Undoubtedly,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy protection.Encryption tests and security analyses validate the effectiveness of this scheme.
基金supported by the NationalNatural Science Foundation of China(No.61862041).
文摘Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality.
基金Project supported by the Natural Science Foundation of Shandong Province, China (Grant No. ZR2021MF049)Joint Fund of Natural Science Foundation of Shandong Province (Grant Nos. ZR2022LLZ012 and ZR2021LLZ001)the Key R&D Program of Shandong Province, China (Grant No. 2023CXGC010901)。
文摘In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario.