Binary image transformation using two-dimensional chaotic maps

Author(s):  
F. Belkhouche ◽  
U. Qidwai ◽  
I. Gokcen ◽  
D. Joachim
2000 ◽  
Vol 10 (01) ◽  
pp. 251-256 ◽  
Author(s):  
FRANCISCO SASTRE ◽  
GABRIEL PÉREZ

The diffusively coupled lattice of odd-symmetric chaotic maps introduced by Miller and Huse undergoes a continuous ordering phase transition, belonging to a universality class close but not identical to that of the two-dimensional Ising model. Here we consider a natural mean-field approach for this model, and find that it does not have a well-defined phase transition. We show how this is due to the coexistence of two attractors in its mean-field description, for the region of interest in the coupling. The behavior of the model in this limit then becomes dependent on initial conditions, as can be seen in direct simulations.


2004 ◽  
Vol 14 (04) ◽  
pp. 1177-1194 ◽  
Author(s):  
RACHEL M. HILLIAM ◽  
ANTHONY J. LAWRANCE

Statistical and dynamical properties of bivariate (two-dimensional) maps are less understood than their univariate counterparts. This paper gives a synthesis of extended results with exemplifications by bivariate logistic maps, the bivariate Arnold cat map and a bivariate Chebyshev map. The use of synchronization from bivariate maps in communication modeling is exemplified by an embryonic chaos shift keying system.


Author(s):  
Ibrahim S. I. Abuhaiba ◽  
Amina Y. AlSallut ◽  
Hana H. Hejazi ◽  
Heba A. AbuGhali
Keyword(s):  

2021 ◽  
Vol 03 (05) ◽  
pp. 245-250
Author(s):  
Bakhtiyar Saidovich Rakhimov ◽  
◽  
Feroza Bakhtiyarovna Rakhimova ◽  
Sabokhat Kabulovna Sobirova ◽  
Furkat Odilbekovich Kuryazov ◽  
...  

Computer vision as a scientific discipline refers to the theories and technologies for creating artificial systems that receive information from an image. Despite the fact that this discipline is quite young, its results have penetrated almost all areas of life. Computer vision is closely related to other practical fields like image processing, the input of which is two-dimensional images obtained from a camera or artificially created. This form of image transformation is aimed at noise suppression, filtering, color correction and image analysis, which allows you to directly obtain specific information from the processed image. This information may include searching for objects, keypoints, segments, and annexes;


2010 ◽  
Vol 44-47 ◽  
pp. 3383-3387
Author(s):  
Li Sen Peng ◽  
Yong Qiang Chen ◽  
Han Ping Hu

An effective and integrated video watermark scheme mainly includes watermark generation, watermark embedding, watermark detecting, and watermark attack. The watermark data come from a meaningful binary image encrypted by two-dimensional chaotic stream encryption to improve watermark security. In the procedure of watermark embedding, watermarks are embedded into the random selected video frames through modifying the DCT coefficients. After robust and frame processes, watermarks can be mainly extracted and identified through watermark extracting algorithm. The experimental results show that the proposed video watermark method has some performances of security, imperceptibility and robustness.


Sign in / Sign up

Export Citation Format

Share Document