I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
,
p
p
.
5
7
3
6
~
5
7
4
8
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
1
0
i
6
.
pp
5
7
3
6
-
5
7
4
8
5736
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
Co
lo
r i
m
a
g
e e
ncr
y
ption ba
sed o
n c
ha
o
tic
shit
key
ing
w
ith
lo
ss
less
co
m
press
i
o
n
Ash
w
a
q T
.
H
a
s
hi
m
,
B
a
ha
a
D.
J
a
lil
C
o
n
tr
o
l
a
n
d
S
y
ste
m
s E
n
g
in
e
e
rin
g
De
p
a
rtm
e
n
t,
Un
iv
e
rsit
y
o
f
T
e
c
h
n
o
lo
g
y
-
Ira
q
,
Ira
q
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
an
2
,
2
0
20
R
ev
i
s
ed
Ma
y
7
,
2020
A
cc
ep
ted
Ma
y
20
,
2
0
2
0
In
o
r
d
e
r
to
p
ro
tec
t
v
a
lu
a
b
le
d
a
ta
f
ro
m
u
n
d
e
sira
b
le
re
a
d
e
rs
o
r
a
g
a
in
st
il
leg
a
l
re
p
ro
d
u
c
ti
o
n
a
n
d
m
o
d
if
ica
ti
o
n
s,
th
e
re
h
a
v
e
b
e
e
n
v
a
rio
u
s
d
a
ta
e
n
c
r
y
p
ti
o
n
tec
h
n
iq
u
e
s.
M
a
n
y
m
e
th
o
d
s
a
re
d
e
v
e
lo
p
e
d
to
p
e
rf
o
rm
i
m
a
g
e
e
n
c
r
y
p
ti
o
n
.
T
h
e
u
se
o
f
c
h
a
o
ti
c
m
a
p
f
o
r
ima
g
e
e
n
c
r
y
p
ti
o
n
is
v
e
r
y
e
ff
e
c
ti
v
e
,
sin
c
e
it
in
c
re
a
se
s
th
e
se
c
u
rit
y
,
d
u
e
to
it
s r
a
n
d
o
m
b
e
h
a
v
io
r.
T
h
e
m
o
st attr
a
c
t
iv
e
f
e
a
tu
re
o
f
d
e
term
in
isti
c
c
h
a
o
ti
c
sy
ste
m
s
is
th
e
e
x
trem
e
l
y
u
n
e
x
p
e
c
ted
a
n
d
ra
n
d
o
m
-
lo
o
k
n
a
t
u
re
o
f
c
h
a
o
ti
c
si
g
n
a
ls
th
a
t
m
a
y
lea
d
to
n
o
v
e
l
a
p
p
li
c
a
ti
o
n
s.
A
n
o
v
e
l
a
lg
o
rit
h
m
f
o
r
i
m
a
g
e
e
n
c
r
y
p
ti
o
n
b
a
se
d
o
n
c
o
m
p
re
ss
io
n
a
n
d
h
y
p
e
r
c
h
a
o
ti
c
m
a
p
tec
h
n
iq
u
e
s
is
su
g
g
e
ste
d
.
F
irst,
th
e
RG
B
i
m
a
g
e
is
b
r
o
k
e
n
d
o
w
n
in
to
R,
G
a
n
d
B
su
b
b
a
n
d
s
a
f
ter
t
h
a
t
e
a
c
h
b
a
n
d
is
c
o
m
p
re
ss
e
d
u
sin
g
lo
ss
les
s
tec
h
n
iq
u
e
.
T
h
e
g
e
n
e
ra
ted
c
h
a
o
ti
c
se
q
u
e
n
c
e
s
f
ro
m
th
e
3
D
c
h
a
o
ti
c
s
y
ste
m
a
r
e
e
m
p
lo
y
e
d
to
c
o
d
e
th
e
c
o
m
p
re
ss
e
d
re
su
lt
s
b
y
e
m
p
lo
y
in
g
th
e
id
e
a
o
f
c
h
a
o
ti
c
sh
if
t
e
n
c
o
d
i
n
g
(CS
K)
m
o
d
u
lati
o
n
to
e
n
c
o
d
e
t
h
e
t
h
re
e
b
a
n
d
s
t
o
g
e
n
e
ra
te
th
e
e
n
c
ry
p
ted
im
a
g
e
.
T
h
e
e
x
p
e
rime
n
ts
sh
o
w
th
a
t
th
e
p
ro
p
o
se
d
m
e
th
o
d
g
iv
e
g
o
o
d
re
su
l
ts i
n
term
o
f
se
c
u
rit
y
,
fe
a
sib
il
it
y
,
a
n
d
ro
b
u
stn
e
ss
.
K
ey
w
o
r
d
s
:
C
h
ao
tic
m
ap
C
r
y
p
to
g
r
ap
h
y
C
SK
I
m
ag
e
c
o
m
p
r
es
s
io
n
I
m
ag
e
e
n
cr
y
p
tio
n
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
B
ah
aa
Dh
iaa
J
alil,
Dep
ar
t
m
en
t o
f
C
o
n
tr
o
l a
n
d
S
y
s
te
m
s
E
n
g
i
n
ee
r
in
g
,
Un
i
v
er
s
it
y
o
f
T
ec
h
n
o
lo
g
y
-
I
r
aq
,
B
ag
h
d
ad
,
I
r
aq
.
E
m
ail:
6
0
0
4
2
@
u
o
tech
n
o
lo
g
y
.
ed
u
.
iq
1.
I
NT
RO
D
UCT
I
O
N
R
ec
en
t
l
y
,
co
m
p
u
ter
tec
h
n
o
lo
g
y
h
as
d
ev
elo
p
ed
r
ap
id
l
y
,
s
o
d
ig
ital
i
m
ag
e
p
r
o
ce
s
s
in
g
h
a
s
it
s
s
h
ar
e
f
r
o
m
th
is
d
ev
elo
p
m
e
n
t a
n
d
it e
n
ter
e
d
in
to
m
an
y
li
f
e
a
s
p
ec
ts
lik
e
i
n
v
e
s
ti
g
atio
n
,
in
d
u
s
tr
ial
d
etec
t
i
o
n
,
co
m
m
u
n
icatio
n
,
r
e
m
o
te
s
en
s
i
n
g
,
i
n
telli
g
e
n
t
r
o
b
o
ts
,
m
ed
icin
e
,
m
eteo
r
o
lo
g
y
,
etc.
T
h
er
ef
o
r
e,
i
m
a
g
e
i
n
f
o
r
m
atio
n
e
n
tice
s
w
id
esp
r
ea
d
a
w
ar
e
n
ess
.
I
n
m
a
n
y
f
ield
s
;
esp
ec
iall
y
in
m
ilit
a
r
y
a
n
d
m
ed
ical
f
ield
s
,
s
ec
u
r
it
y
o
f
i
m
a
g
e
d
ata
is
v
er
y
s
i
g
n
i
f
ica
n
t.
So
a
w
a
y
to
p
r
o
tect
tr
an
s
m
i
s
s
io
n
o
f
d
ig
ital
i
m
ag
e
s
is
n
ee
d
ed
w
h
ich
lead
s
t
o
f
o
u
n
d
th
e
i
m
a
g
e
en
cr
y
p
tio
n
.
C
las
s
ical
e
n
cr
y
p
ti
o
n
alg
o
r
it
h
m
s
li
k
e
A
d
v
an
ce
d
E
n
cr
y
p
tio
n
Sta
n
d
ar
d
(
A
E
S)
an
d
Data
E
n
cr
y
p
tio
n
Stan
d
ar
d
(
DE
S)
d
o
n
’
t
o
f
f
er
i
m
ag
e
en
cr
y
p
tio
n
n
ee
d
s
b
ec
au
s
e
o
f
th
e
i
m
ag
e
d
ata
ch
ar
ac
ter
i
s
ti
cs
s
u
c
h
as
t
h
e
d
ata
a
m
o
u
n
t,
t
h
e
h
ig
h
l
y
r
ed
u
n
d
a
n
c
an
d
t
h
e
s
tr
o
n
g
i
n
ter
r
elati
o
n
s
h
ip
w
h
ic
h
p
r
ese
n
t
lo
w
p
r
o
tectio
n
an
d
lo
w
ef
f
icien
c
y
e
n
cr
y
p
tio
n
[
1
]
.
As
a
r
esu
lt
o
f
h
i
g
h
r
ed
u
n
d
an
c
y
,
d
ata
co
m
p
r
ess
io
n
is
t
h
e
m
ai
n
th
r
u
s
t
in
m
u
lti
m
ed
ia
ap
p
licatio
n
s
b
ec
au
s
e
w
it
h
n
o
co
m
p
r
es
s
io
n
,
co
m
m
u
n
icatio
n
r
eso
u
r
ce
s
an
d
s
to
r
ag
e
w
i
ll
b
e
u
s
ed
in
e
f
fici
en
tl
y
.
Du
e
to
p
o
w
er
an
d
b
an
d
w
id
th
r
e
s
tr
ictio
n
s
,
lo
w
-
b
it
-
r
ate
co
m
p
r
ess
io
n
is
r
eq
u
ir
ed
f
o
r
p
o
w
er
-
li
m
ited
d
ev
ice
s
a
n
d
lo
w
-
b
an
d
w
id
t
h
co
m
m
u
n
ica
tio
n
ch
a
n
n
els.
Fu
r
t
h
er
m
o
r
e
a
n
d
esp
ec
iall
y
f
o
r
o
p
en
-
ac
ce
s
s
n
et
w
o
r
k
,
e
n
cr
y
p
tio
n
i
s
n
ee
d
ed
f
o
r
in
te
g
r
it
y
a
n
d
p
r
iv
ac
y
o
f
in
f
o
r
m
a
tio
n
.
A
l
g
o
r
it
h
m
s
o
f
e
n
cr
y
p
tio
n
ar
e
i
m
p
r
o
v
ed
to
a
p
ar
ticu
lar
k
in
d
o
f
d
ata
b
ased
o
n
m
a
n
y
ch
ar
ac
ter
i
s
tics
lik
e
p
o
w
er
o
f
p
r
o
ce
s
s
in
g
,
s
e
n
s
iti
v
it
y
t
o
b
it
ch
an
g
es
a
n
d
cip
h
er
ed
s
p
ee
d
[
2
]
.
C
o
m
p
r
ess
io
n
co
n
ta
in
s
t
w
o
ap
p
r
o
ac
h
es
w
h
ic
h
ar
e
lo
s
s
le
s
s
a
n
d
lo
s
s
y
.
I
n
t
h
e
ca
s
e
o
f
l
o
s
s
le
s
s
co
m
p
r
es
s
io
n
,
t
h
e
co
m
p
r
ess
ed
d
ata
m
a
in
tai
n
s
its
o
r
ig
i
n
al
f
o
r
m
at
d
ev
o
id
o
f
lo
s
i
n
g
in
f
o
r
m
at
io
n
,
w
h
er
ea
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
C
o
lo
r
ima
g
e
en
cryp
tio
n
b
a
s
ed
o
n
ch
a
o
tic
s
h
it k
ey
in
g
w
ith
lo
s
s
les
s
co
mp
r
es
s
io
n
(
A
s
h
w
a
q
T
.
Ha
s
h
im)
5737
co
m
p
r
es
s
ed
d
ata
th
at
lo
s
es
d
at
a
w
i
ll
lo
s
e
s
o
m
e
o
f
th
e
o
r
i
g
i
n
al
in
f
o
r
m
atio
n
,
b
u
t
t
h
e
lo
s
s
is
s
m
al
l
to
n
o
ticea
b
le
th
r
o
u
g
h
a
p
er
s
o
n
'
s
s
e
n
s
e
o
f
e
y
e
an
d
ea
r
.
L
o
s
s
le
s
s
co
m
p
r
e
s
s
io
n
i
s
u
s
ed
f
o
r
cr
itical
m
is
s
i
o
n
ap
p
licatio
n
s
u
ch
f
i
n
an
cia
l
d
o
cu
m
en
t
an
d
lo
s
s
y
is
f
o
r
ap
p
licatio
n
ca
n
b
e
t
o
ler
ated
in
s
li
g
h
tl
y
lo
s
s
o
f
i
n
f
o
r
m
atio
n
s
u
ch
as
p
ictu
r
es.
C
o
m
p
r
ess
io
n
r
eq
u
ir
ed
alg
o
r
ith
m
an
d
s
e
v
er
al
p
r
o
m
in
en
t
co
m
p
r
es
s
io
n
al
g
o
r
ith
m
t
ec
h
n
iq
u
es
s
u
ch
a
s
th
e
H
u
f
f
m
a
n
,
R
u
n
L
e
n
g
t
h
E
n
co
d
in
g
,
ar
ith
m
et
ic,
an
d
e
n
tr
o
p
y
.
T
h
e
m
ai
n
o
b
j
ec
tiv
e
o
f
pr
o
p
o
s
ed
lo
s
s
less
co
m
p
r
es
s
io
n
is
to
r
ed
u
ce
t
h
e
s
ize
o
f
i
m
a
g
e
f
ile,
m
ai
n
t
ain
q
u
alit
y
o
f
t
h
e
r
ec
o
n
s
tr
u
ctio
n
i
m
a
g
e
f
r
o
m
co
m
p
r
es
s
io
n
,
a
n
d
ca
n
b
e
m
a
n
a
g
ed
in
av
a
ilab
le
tr
an
s
m
i
s
s
io
n
b
an
d
w
id
t
h
an
d
s
ec
u
r
ed
d
u
r
in
g
tr
an
s
m
is
s
io
n
[
3
]
.
E
n
cr
y
p
tio
n
al
g
o
r
ith
m
s
li
k
e
B
lo
w
fis
h
,
R
C
6
,
an
d
A
E
S
w
h
ic
h
in
te
n
d
ed
f
o
r
tex
t d
ata
en
cr
y
p
t
i
o
n
s
ar
e
n
o
t
ap
p
r
o
p
r
iate
f
o
r
im
a
g
e
d
ata
en
cr
y
p
tio
n
.
P
ar
ticu
lar
en
cr
y
p
tio
n
tech
n
iq
u
e
s
ar
e
w
a
n
ted
f
o
r
en
cr
y
p
tio
n
o
f
i
m
a
g
e
b
ec
au
s
e
o
f
t
h
e
s
tr
o
n
g
co
r
r
elatio
n
an
d
th
e
r
ed
u
n
d
an
c
y
a
m
o
n
g
n
eig
h
b
o
r
in
g
p
ix
els.
C
h
ao
tic
m
ap
cr
y
p
to
s
y
s
te
m
s
,
co
m
p
ar
ed
w
ith
t
h
e
clas
s
ical
t
ec
h
n
iq
u
es
o
f
e
n
cr
y
p
tio
n
,
ar
e
m
o
r
e
ap
p
r
o
p
r
iate
to
en
cr
y
p
tio
n
o
f
i
m
a
g
e
.
W
ith
it
s
h
ig
h
s
e
n
s
ib
il
it
y
f
o
r
b
o
th
elem
en
tar
y
co
n
d
itio
n
s
an
d
s
y
s
te
m
p
ar
am
eter
s
lik
e
f
a
ls
e
ar
b
itra
r
in
es
s
,
n
o
n
-
r
ep
etitio
n
,
r
etr
o
g
r
ad
e,
an
d
a
cc
u
r
atel
y
g
e
n
er
ated
an
d
r
eg
e
n
er
ated
o
f
c
h
ao
tic
s
eq
u
e
n
ce
s
,
c
h
ao
s
is
p
ar
t
icu
lar
l
y
ap
p
r
o
p
r
iate
f
o
r
cip
h
er
ed
i
m
a
g
e.
T
h
er
ef
o
r
e,
th
e
ch
ao
tic
s
y
s
te
m
is
u
s
ed
a
s
a
b
ase
f
o
r
m
a
n
y
i
m
ag
e
e
n
cr
y
p
t
io
n
al
g
o
r
ith
m
s
.
I
n
1
9
9
8
,
Am
er
ica
n
s
cie
n
ti
s
t
Frie
d
r
ich
in
tr
o
d
u
ce
d
alter
n
at
i
v
e
ar
ch
itec
tu
r
e
f
o
r
p
u
b
lis
h
i
n
g
i
m
a
g
es
to
e
n
cr
y
p
t
i
m
a
g
es [
4
].
L
ater
,
t
h
is
s
tr
u
ct
u
r
e
w
as
w
id
el
y
r
ec
ei
v
ed
,
an
d
to
d
a
y
,
m
o
s
t
i
m
ag
e
e
n
cr
y
p
tio
n
p
atter
n
s
d
ep
en
d
o
n
th
i
s
ch
ao
tic
s
tr
u
ct
u
r
e
[
5
-
1
6
]
,
b
u
t
th
e
o
n
l
y
u
s
i
n
g
o
f
th
e
lo
w
d
i
m
en
s
io
n
a
l
ch
ao
tic
s
y
s
te
m
i
n
i
m
ag
e
en
cr
y
p
tio
n
d
o
esn
’
t
p
r
ese
n
t
en
o
u
g
h
s
ec
u
r
it
y
.
C
o
m
p
r
es
s
io
n
i
s
o
n
th
e
s
a
m
e
i
m
p
o
r
tan
ce
o
f
e
n
cr
y
p
tio
n
,
an
d
if
t
h
ese
t
w
o
p
r
o
ce
s
s
es
ar
e
s
ep
ar
ated
,
th
e
h
ig
h
d
eg
r
ee
o
f
u
n
ce
r
tai
n
t
y
i
n
cip
h
er
i
m
ag
e
le
n
g
th
ca
n
n
o
t
b
e
ac
h
iev
ed
.
B
y
u
s
in
g
b
o
th
en
cr
y
p
tio
n
a
n
d
co
m
p
r
ess
io
n
tech
n
iq
u
es
[
2
,
1
7
-
1
9
]
,
s
ec
u
r
e
a
n
d
ef
f
ic
ien
t
i
m
ag
e
tr
an
s
m
i
s
s
io
n
o
v
er
n
o
n
-
p
r
iv
ate
n
et
w
o
r
k
ca
n
b
e
g
u
ar
an
teed
a
n
d
th
at
lead
s
to
in
cr
ea
s
e
th
e
d
i
f
f
icu
l
t
y
le
v
el
th
at
th
e
attac
k
er
s
w
o
u
ld
b
e
ex
p
er
ien
ce
d
d
u
e
to
th
e
s
ize
o
f
th
e
e
n
cr
y
p
ted
i
m
a
g
e
w
h
ich
w
o
u
ld
b
e
u
n
ce
r
tai
n
.
E
m
ad
et
al.
,
[
20
]
,
p
r
esen
ted
a
s
ec
u
r
ed
i
m
a
g
e
co
m
p
r
ess
io
n
s
y
s
te
m
f
o
r
i
m
ag
e
s
atellite
co
m
m
u
n
icat
io
n
b
ased
o
n
th
e
f
r
ac
tal
co
m
p
r
es
s
i
o
n
th
eo
r
y
co
m
b
i
n
ed
w
it
h
t
h
e
en
h
a
n
ce
d
h
ill
m
u
lti
m
ed
ia
cr
y
p
to
s
y
s
te
m
(
E
HM
C
)
alg
o
r
ith
m
f
o
r
en
cr
y
p
tio
n
.
So
m
a
y
a
e
t
al.
,
[2
1
],
p
r
o
p
o
s
ed
i
m
a
g
e
-
e
n
cr
y
p
tio
n
tec
h
n
iq
u
e
b
y
co
m
b
in
i
n
g
t
w
o
tech
n
iq
u
es
:
en
cr
y
p
t
io
n
a
n
d
co
m
p
r
es
s
io
n
.
A
w
av
elet
tr
an
s
f
o
r
m
w
as
u
s
ed
to
d
ec
o
m
p
o
s
e
th
e
i
m
a
g
e
a
n
d
d
ec
o
r
r
elate
its
p
ix
els
i
n
to
ap
p
r
o
x
im
a
tio
n
a
n
d
d
etail
c
o
m
p
o
n
en
t
s
.
T
h
e
m
o
r
e
i
m
p
o
r
tan
t
co
m
p
o
n
e
n
t
(
th
e
ap
p
r
o
x
i
m
atio
n
co
m
p
o
n
e
n
t)
is
en
cr
y
p
ted
u
s
i
n
g
a
ch
ao
s
-
b
ased
en
cr
y
p
tio
n
alg
o
r
it
h
m
.
T
h
e
r
e
m
ai
n
i
n
g
co
m
p
o
n
e
n
t
s
(
th
e
d
etail
co
m
p
o
n
en
ts
)
ar
e
co
m
p
r
ess
ed
u
s
in
g
a
w
a
v
elet
tr
a
n
s
f
o
r
m
.
T
ab
ash
et
al.
,
[2
2
]
,
in
tr
o
d
u
ce
d
an
i
m
ag
e
e
n
cr
y
p
ti
o
n
tech
n
iq
u
e
b
ased
o
n
th
r
ee
ch
ao
tic
lo
g
i
s
tic
m
ap
s
an
d
m
u
lti
-
p
s
e
u
d
o
r
an
d
o
m
b
lo
ck
p
er
m
u
tatio
n
.
T
h
e
en
cr
y
p
t
io
n
p
r
o
ce
s
s
h
a
s
b
ee
n
d
i
v
i
d
ed
m
ai
n
l
y
in
to
th
r
ee
s
tep
s
;
th
e
f
ir
s
t
s
tep
i
s
to
en
cr
y
p
t
th
e
w
h
o
le
i
m
a
g
e
u
s
i
n
g
lo
g
is
t
ic
m
ap
,
th
e
s
ec
o
n
d
s
te
p
is
to
d
iv
id
e
th
e
i
m
ag
e
i
n
to
a
r
an
d
o
m
n
u
m
b
er
o
f
b
lo
ck
s
,
th
e
t
h
ir
d
s
tep
is
to
g
e
n
er
ate
a
r
an
d
o
m
p
er
m
u
tatio
n
f
o
r
th
ese
b
lo
ck
s
.
B
o
r
is
lav
et
al.
,
[2
3
]
,
s
u
g
g
ested
an
al
g
o
r
ith
m
f
o
r
i
m
ag
e
en
cr
y
p
tio
n
w
h
ic
h
s
ta
n
d
s
o
n
t
w
o
p
s
eu
d
o
r
an
d
o
m
b
it
g
en
er
ato
r
s
,
o
n
e
is
b
ased
o
n
C
h
eb
y
s
h
ev
m
ap
an
d
th
e
o
th
er
o
n
r
o
tatio
n
eq
u
atio
n
.
T
h
e
C
h
eb
y
s
h
e
v
m
ap
p
ar
t
is
f
o
r
v
ar
iatio
n
w
h
i
le
th
e
r
o
tatio
n
eq
u
atio
n
is
f
o
r
r
ep
lace
m
e
n
t
.
Z
h
a
n
g
et
al.
,
[2
4
]
,
p
r
o
p
o
s
ed
a
s
ch
e
m
e
th
at
ca
n
s
i
m
u
ltan
eo
u
s
l
y
e
n
cr
y
p
t
an
d
co
m
p
r
ess
a
m
ed
ical
i
m
a
g
e
u
s
in
g
co
m
p
r
e
s
s
i
v
e
s
en
s
in
g
(
C
S)
a
n
d
p
i
x
el
s
w
ap
p
in
g
b
ased
p
er
m
u
tatio
n
ap
p
r
o
ac
h
.
P
o
o
r
an
i
et
al.
,
[2
5
]
,
p
r
o
p
o
s
ed
a
s
ch
e
m
e
o
f
co
m
p
r
es
s
i
n
g
en
cr
y
p
ted
i
m
a
g
e
s
w
it
h
a
u
x
iliar
y
i
n
f
o
r
m
atio
n
.
So
m
e
a
u
x
iliar
y
in
f
o
r
m
a
tio
n
w
it
h
u
n
co
m
p
r
es
s
ed
en
cr
y
p
ted
i
m
a
g
e
is
u
s
ed
f
o
r
d
ata
co
m
p
r
ess
io
n
an
d
i
m
a
g
e
r
ec
o
n
s
tr
u
ctio
n
.
J
iao
j
iao
et
al.
,
[2
6
]
,
p
r
o
p
o
s
ed
a
s
p
ar
s
e
d
ec
o
m
p
o
s
it
io
n
a
n
d
t
h
e
C
h
i
n
ese
r
e
m
ai
n
d
er
t
h
eo
r
e
m
to
co
m
p
r
ess
th
e
i
m
a
g
e,
a
n
d
t
h
en
c
h
ao
s
m
ap
w
as
u
s
ed
in
e
n
cr
y
p
tio
n
p
r
o
ce
s
s
.
T
h
at
is
d
o
n
e
to
ac
h
iev
e
t
h
e
j
o
in
t c
o
m
p
r
es
s
io
n
a
n
d
en
cr
y
p
tio
n
ef
f
ec
t.
Sire
esh
a
et
al.
,
[2
7
]
,
p
r
esen
ted
an
en
cr
y
p
tio
n
alg
o
r
it
h
m
o
f
p
ix
el
lev
e
l
i
m
a
g
e
b
ased
o
n
ch
ao
tic
m
ap
p
in
g
an
d
C
h
in
e
s
e
r
e
m
a
in
d
er
th
eo
r
e
m
.
Nasr
u
lla
h
et
al.
,
[
2
]
,
p
r
o
p
o
s
ed
a
co
m
b
in
ed
al
g
o
r
ith
m
o
f
i
m
ag
e
co
m
p
r
es
s
io
n
w
it
h
e
n
cr
y
p
tio
n
w
h
ic
h
i
s
s
ta
n
d
s
o
n
i
n
te
g
er
w
a
v
elet
tr
a
n
s
f
o
r
m
(
I
W
T
)
b
esid
e
a
s
et
o
f
s
u
b
d
iv
id
e
i
n
h
ier
ar
ch
ical
tr
ee
s
(
SP
I
HT
)
,
K
d
-
tr
ee
an
d
m
u
ltip
le
ch
ao
tic
m
ap
s
.
Sh
u
q
in
e
t
al.
,
[
1
]
,
p
r
o
p
o
s
ed
an
alg
o
r
it
h
m
f
o
r
i
m
a
g
e
e
n
cr
y
p
tio
n
th
a
t
s
ta
n
d
s
o
n
ch
ao
s
an
d
SH
A
-
2
5
6
f
ir
s
tl
y
b
y
s
u
r
r
o
u
n
d
i
n
g
th
e
p
lain
te
x
t
i
m
a
g
e
b
y
a
h
as
h
v
alu
e
s
eq
u
e
n
ce
,
th
e
n
s
cr
a
m
b
li
n
g
t
h
e
i
m
ag
e,
f
in
al
l
y
ad
o
p
tin
g
th
e
f
ee
d
b
ac
k
m
ec
h
a
n
is
m
o
f
t
h
e
d
y
n
a
m
ic
i
n
d
ex
.
Sar
av
an
a
n
et
al.
,
[2
8
]
,
p
r
o
p
o
s
e
d
an
i
m
a
g
e
en
cr
y
p
tio
n
al
g
o
r
ith
m
i
n
w
h
ic
h
d
is
cr
ete
w
a
v
elet
tr
an
s
f
o
r
m
(
DW
T
)
is
ap
p
lied
an
d
r
an
d
o
m
l
y
g
e
n
er
at
ed
2
5
6
b
it
k
ey
is
u
s
ed
to
cr
ea
te
th
e
m
ea
s
u
r
e
m
en
t
m
a
tr
ix
u
s
ed
in
co
m
p
r
ess
iv
e
s
en
s
in
g
.
O
s
a
m
a
et
al.
,
[
29
]
,
p
r
o
p
o
s
ed
an
i
m
a
g
e
e
n
cr
y
p
tio
n
alg
o
r
ith
m
,
w
h
ic
h
in
v
o
lv
e
s
a
c
h
ao
tic
b
lo
ck
i
m
ag
e
s
cr
a
m
b
li
n
g
f
o
llo
w
ed
b
y
a
t
w
o
–
d
im
e
n
s
io
n
al
(
2
D)
d
is
cr
ete
lin
ea
r
ch
ir
p
tr
an
s
f
o
r
m
.
T
h
is
r
esear
ch
p
r
esen
t
a
co
m
b
i
n
ed
i
m
a
g
e
co
m
p
r
ess
io
n
an
d
e
n
cr
y
p
tio
n
s
tr
u
ct
u
r
e
w
h
ich
s
tan
d
s
o
n
C
S
K
m
o
d
u
latio
n
is
o
f
f
er
ed
.
T
h
e
u
s
in
g
o
f
3
D
ch
ao
tic
s
y
s
te
m
w
h
i
ch
is
u
s
ed
f
o
r
th
e
d
if
f
u
s
io
n
a
n
d
p
er
m
u
tat
io
n
s
o
f
i
m
a
g
e
p
ix
el
s
is
t
h
e
co
n
tr
ib
u
tio
n
o
f
t
h
e
w
o
r
k
.
I
n
t
h
e
p
r
o
p
o
s
ed
j
o
in
t
co
m
p
r
es
s
io
n
a
n
d
en
cr
y
p
tio
n
w
as
p
er
f
o
r
m
ed
.
Firs
tl
y
,
o
n
l
y
lo
s
s
le
s
s
co
m
p
r
e
s
s
io
n
i
s
u
s
ed
,
th
en
3
D
c
h
ao
tic
m
ap
s
ar
e
u
s
ed
to
p
er
f
o
r
m
th
e
e
n
cr
y
p
tio
n
.
B
y
co
m
p
ar
i
n
g
t
h
e
s
u
g
g
ested
m
et
h
o
d
w
it
h
t
h
e
r
e
m
ain
in
g
j
o
in
t
i
m
a
g
e
co
m
p
r
ess
io
n
a
n
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
5
7
3
6
-
5
7
4
8
5738
en
cr
y
p
tio
n
m
e
th
o
d
s
,
it
o
f
f
er
s
h
i
g
h
s
ec
u
r
it
y
an
d
m
u
ch
m
o
r
e
co
m
p
r
es
s
io
n
a
n
d
it
s
e
f
f
ec
tiv
e
n
ess
is
clea
r
l
y
d
em
o
n
s
tr
ated
b
y
t
h
e
ex
p
er
i
m
e
n
tal
r
es
u
lts
w
h
ic
h
ar
e
o
b
tain
ed
.
T
h
e
r
em
ai
n
s
o
f
t
h
i
s
p
ap
er
is
o
r
g
an
ized
a
s
f
o
llo
w
s
:
I
n
Sectio
n
2
,
r
elate
d
w
o
r
k
s
ar
e
d
is
cu
s
s
ed
,
w
h
ile
s
ec
t
io
n
3
illu
s
tr
ate
th
e
p
r
o
p
o
s
ed
s
tr
u
ctu
r
e
o
f
th
e
i
m
a
g
e
co
m
p
r
ess
io
n
an
d
en
cr
y
p
tio
n
.
Sectio
n
4
s
h
o
w
s
th
e
e
x
p
er
i
m
e
n
tal
r
e
s
u
l
ts
a
n
d
s
ec
u
r
it
y
a
n
al
y
s
i
s
o
f
th
e
s
u
g
g
ested
s
tr
u
ctu
r
e
a
n
d
f
in
a
ll
y
,
t
h
e
co
n
cl
u
s
io
n
s
ar
e
d
is
cu
s
s
ed
in
s
ec
tio
n
5
.
2.
RE
L
AT
E
D
WO
RK
S
I
n
th
i
s
s
ec
tio
n
th
e
r
elate
d
w
o
r
k
s
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
ar
e
r
ev
ie
w
ed
in
n
ex
t t
w
o
s
u
b
s
ec
ti
o
n
s
:
2
.
1
.
H
y
per
-
cha
o
t
ic
s
y
s
t
em
a
nd
cheby
s
hev
m
a
p
T
h
e
s
y
s
te
m
s
u
g
g
e
s
ted
b
y
[
1
]
is
e
m
p
lo
y
ed
to
g
e
n
er
ate
th
e
th
r
ee
r
an
d
o
m
s
eq
u
en
ce
s
co
n
s
tr
u
cted
b
y
h
y
p
er
c
h
ao
tic
s
y
s
te
m
an
d
t
wo
C
h
eb
y
s
h
ev
m
ap
s
.
T
h
i
s
ap
p
r
o
ac
h
u
tili
ze
d
a
h
y
p
er
-
c
h
ao
tic
s
y
s
te
m
o
f
f
o
u
r
d
i
m
en
s
io
n
al
i
n
ad
d
itio
n
to
f
o
u
r
in
itial c
o
n
d
itio
n
s
a
n
d
fiv
e
s
y
s
te
m
p
ar
a
m
e
ter
s
w
h
ich
i
s
s
h
o
w
ed
b
y
(
1
)
:
⁄
=
(
−
)
+
⁄
=
−
+
⁄
=
−
⁄
=
−
(
1
)
T
h
e
s
y
s
te
m
p
ar
a
m
eter
s
ar
e
a,
b
,
c,
d
an
d
e.
an
d
th
e
s
y
s
te
m
is
h
y
p
er
-
c
h
ao
t
ic
i
f
a
=
3
5
,
b
=
3
,
c
=
1
2
,
d
=
7
an
d
e
∈
(
0
.
0
8
5
,
0
.
7
9
8
)
,
an
d
i
t
h
as
t
w
o
p
o
s
iti
v
e
L
y
ap
u
n
o
v
e
x
p
o
n
e
n
ts
,
L
E
1
=
0
.
5
9
6
,
L
E
2
=
0
.
1
5
4
.
So
th
e
s
y
s
te
m
is
i
n
a
h
y
p
er
-
c
h
ao
tic
s
tate.
T
h
e
t
w
o
C
h
eb
y
s
h
e
v
m
ap
s
ar
e
d
esi
g
n
ed
b
y
(
2
)
:
1
(
+
1
)
=
(
4
×
(
1
(
)
)
)
2
(
+
1
)
=
(
4
×
(
2
(
)
)
)
(
2
)
T
h
e
in
itial v
al
u
e
s
ar
e
u
1
(
1
)
an
d
u
2
(
1
)
.
Af
ter
iter
ated
t
h
e
h
y
p
er
-
ch
a
o
tic
s
y
s
te
m
,
f
o
u
r
s
eq
u
en
ce
s
ar
e
g
e
n
er
ated
w
h
ic
h
ar
e
s
i
g
n
i
f
ied
a
s
X
=
[
x
(
i)
]
,
Y=
[
y
(
i)
]
,
Z
=
[
z(
i)
]
an
d
W
=
[
w
(
i)
]
,
r
es
p
ec
tiv
el
y
,
w
h
er
e,
i
=
1
,
2
,
.
.
.
On
th
e
o
th
er
h
a
n
d
t
w
o
C
h
eb
y
s
h
e
v
m
ap
s
w
it
h
u
1
(
1
)
an
d
u
2
(
1
)
as
in
itial
v
al
u
es
ar
e
r
ep
ea
ted
f
o
r
co
n
s
tr
u
cti
n
g
U
1
an
d
U
2
s
eq
u
en
ce
s
r
esp
ec
ti
v
el
y
.
T
h
r
ee
s
eq
u
en
ce
s
o
f
r
ea
l
v
al
u
e
s
D
1
, D
2
an
d
D
3
ar
e
tr
an
s
f
o
r
m
ed
to
s
ix
ch
ao
tic
s
eq
u
e
n
ce
s
X,
Y,
Z
,
W
,
U
1
an
d
U
2
to
ex
tr
a
en
h
a
n
ce
s
eq
u
e
n
c
es
co
m
p
licatio
n
.
T
h
e
in
ter
v
al
o
f
th
e
t
h
r
ee
s
eq
u
e
n
c
es
is
in
[
0
,
1
]
.
B
y
t
h
e
f
o
llo
w
i
n
g
Fo
r
m
u
la
s
(
3
)
-
(
5
)
th
e
D
1
, D
2
an
d
D
3
ar
e
ca
lcu
lated
.
1
=
2
(
(
+
+
)
/
3
)
(
3
)
2
=
2
(
(
+
1
+
2
)
/
3
)
(
4
)
3
=
2
(
(
+
+
2
)
/
3
)
(
5
)
2
.
2
.
Cha
o
t
ic
s
hift
k
ey
ing
I
n
b
in
ar
y
C
SK
m
o
d
u
latio
n
,
th
e
b
in
ar
y
in
f
o
r
m
a
tio
n
is
co
n
v
e
y
ed
b
y
c
h
ao
tic
s
i
g
n
al
s
w
h
ic
h
ar
e
tak
e
n
en
er
g
ie
s
o
f
d
i
f
f
er
e
n
t
b
it.
B
y
m
ea
n
s
o
f
tr
a
n
s
f
er
r
in
g
o
n
e
c
h
a
o
tic
s
i
g
n
a
l
x
1
(
t)
o
r
x
0
(
t)
at
a
ti
m
e,
t
h
e
e
n
co
d
in
g
o
f
in
f
o
r
m
atio
n
s
ig
n
al
is
d
o
n
e.
So
ch
ao
s
s
ig
n
al
x
1
(
t)
w
ill
b
e
tr
an
s
f
er
r
ed
if
th
e
in
f
o
r
m
a
tio
n
s
i
g
n
al
b
in
ar
y
b
it
is
"1
"
,
o
th
er
w
is
e,
x
0
(
t)
w
ill
b
e
tr
an
s
f
er
r
ed
.
T
h
e
m
o
d
u
latio
n
a
n
d
d
em
o
d
u
latio
n
o
f
C
SK
ar
e
s
h
o
w
n
i
n
Fi
g
u
r
e
1
.
B
y
u
s
i
n
g
eit
h
er
th
e
s
a
m
e
ch
ao
s
s
y
s
te
m
w
it
h
d
if
f
er
en
t
p
ar
am
eter
s
o
r
b
y
t
w
o
d
if
f
er
e
n
t
s
y
s
te
m
s
,
th
e
t
w
o
ch
ao
ti
c
s
ig
n
al
s
b
e
o
b
tain
ed
.
T
h
e
tr
an
s
m
itted
s
i
g
n
al
ca
n
b
e
g
i
v
e
n
[
3
0
]
as d
escr
ib
e
b
y
th
e
f
o
llo
w
i
n
g
f
o
r
m
u
la:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
C
o
lo
r
ima
g
e
en
cryp
tio
n
b
a
s
ed
o
n
ch
a
o
tic
s
h
it k
ey
in
g
w
ith
lo
s
s
les
s
co
mp
r
es
s
io
n
(
A
s
h
w
a
q
T
.
Ha
s
h
im)
5739
(
)
=
{
1
(
)
,
1
0
(
)
,
0
(
6
)
Fig
u
r
e
1
.
B
lo
ck
d
iag
r
a
m
o
f
t
h
e
C
SK
f
o
r
m
o
d
u
lato
r
an
d
d
e
m
o
d
u
lato
r
[
3
1
]
3.
P
RO
P
O
SE
D
SYS
T
E
M
T
o
im
p
r
o
v
e
t
h
e
d
e
g
r
ee
o
f
s
ec
u
r
it
y
,
d
u
al
i
m
a
g
e
co
m
p
r
ess
io
n
a
n
d
en
cr
y
p
tio
n
w
h
ich
s
ta
n
d
s
o
n
h
y
p
er
ch
ao
tic
s
y
s
te
m
i
s
u
s
ed
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
is
d
i
v
id
ed
in
to
t
w
o
s
tag
e
a
t
f
ir
s
t
t
h
e
i
m
ag
e
is
co
m
p
r
es
s
ed
u
s
in
g
p
r
o
p
o
s
ed
lo
s
s
less
co
m
p
r
e
s
s
io
n
m
eth
o
d
an
d
t
h
e
n
en
cr
y
p
ted
b
y
e
m
p
lo
y
in
g
t
h
e
C
SK
w
h
i
ch
is
u
s
ed
a
h
y
p
er
ch
ao
tic
s
y
s
te
m
.
Fi
g
u
r
e
2
d
is
p
l
a
y
s
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
b
lo
ck
d
iag
r
a
m
.
Fig
u
r
e
2
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
b
lo
ck
d
iag
r
a
m
3
.
1
.
P
r
o
po
s
ed
encr
y
ptio
n
Ma
n
y
a
lg
o
r
it
h
m
s
o
f
e
n
cr
y
p
tio
n
,
p
r
ec
is
el
y
f
o
r
d
ig
ital
i
m
a
g
es,
ar
e
in
tr
o
d
u
ce
d
to
m
a
in
ta
in
t
h
e
n
ee
d
s
o
f
s
tr
o
n
g
ap
p
licatio
n
s
f
o
r
en
cr
y
p
tio
n
o
f
i
m
a
g
e.
C
h
ao
s
-
b
ased
cip
h
er
ed
alg
o
r
ith
m
s
a
m
o
n
g
th
e
m
,
w
h
ic
h
ar
e
b
ec
am
e
co
m
m
o
n
d
u
e
to
n
u
m
e
r
o
u
s
o
p
ti
m
al
f
ea
tu
r
e
s
lik
e
u
n
ex
p
ec
ted
an
d
h
i
g
h
s
en
s
iti
v
it
y
t
o
in
itial
co
n
d
itio
n
s
an
d
v
ar
io
u
s
p
ar
a
m
eter
s
.
T
h
e
c
h
ao
tic
m
ap
s
s
ec
u
r
it
y
is
i
n
f
l
u
en
ce
d
b
y
t
h
e
n
u
m
b
er
o
f
p
ar
a
m
et
er
s
o
f
t
h
ese
c
h
ao
tic
cr
y
p
to
s
y
s
te
m
s
.
T
o
in
cr
ea
s
e
th
e
k
e
y
s
p
ac
e
o
f
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
a
s
y
s
te
m
p
r
o
p
o
s
ed
b
y
[
1
]
an
d
ex
p
lain
ed
in
s
ec
tio
n
(
2
.
1
)
is
u
s
ed
.
Alg
o
r
it
h
m
1
s
h
o
w
s
th
e
s
tep
s
o
f
p
r
o
p
o
s
ed
en
cr
y
p
tio
n
al
g
o
r
ith
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
5
7
3
6
-
5
7
4
8
5740
A
l
g
o
r
ith
m
1
.
I
m
a
g
e
en
cr
y
p
t
io
n
Input
:
I
// RGB color image
W, H
// width and height of
I
Output
:
E
// Encrypted image
Step 1
:
Let the size of the color image
I
is W × H
Step 2
:
Separate the three bands R, G, B of the color image
I
Step 3
:
The band matrices R, G, and B are converted to a one dimensional vector
R
=
{R(1), R(2),
..., R(l)}, G={G(1), G(2),..., G(
l)}, B={B(1), B(2),
..., B(l)}
,
where l
=
W × H
Step 4
:
Compressed
the
three
vectors
R,
G
and
B
separately
using
algorithm
(2)
to
generate
three binary compressed streams
RComp, GComp and BComp
Step 5
:
Cr
ea
te
th
e
ch
ao
ti
c
se
qu
en
ce
s
D
1
,
D
2
,
D
3
of
le
ng
th
l
1
,
l
2
,
l
3
as
de
fi
ne
d
in
se
ct
io
n
2.1 for encryption.
Step 6
:
Convert the range of generated real sequences
D
1
, D
2
, D
3
from [0 1] to [
-
1 1].
Step 7
:
Encoded
the
compressed
streams
RC
om
p,
GC
om
p
an
d
BC
om
p
by
em
be
dd
in
g
t
he
m
in
generated
random
sequenc
es
D
1
,
D
2
,
D
3
us
in
g
fo
rm
ul
a
(6
)
to
ge
ne
ra
te
th
r
ee
re
al
encoded seq
uences
E
1
, E
2
, E
3.
F
or i= 1 to W×H
If
RComp
(i) =1
E
1
(i)
=
D
1
(i)
Else
E
1
(i)
=
-
D
1
(i)
EndIF
EndFor
Step 8
:
Repeat step7 for
GComp
and
BComp
to generate
E
2
and
E
3
respectively.
Step
9
:
Convert the three real sequences
E
1
, E
2
and
E
3
to binary using following formula
BinE
1
=Round (
E
1
+ 0.5)
BinE
2
=Round
(
E
2
+0.5)
(
7
)
BinE
3
=Round (
E
3
+ 0.5)
w
he
re
th
e
re
al
nu
mb
er
s
l
es
s
th
an
ze
ro
be
ca
me
0
a
nd
th
e
nu
mb
er
s
gr
ea
te
r
t
ha
n
ze
ro
become 1.
Step
10
:
Combine
BinE
1,
BinE
2
and
BinE
3
into encrypted image
E
.
3
.
2
.
P
r
o
po
s
ed
lo
s
s
les
s
i
m
a
g
e
co
m
pre
s
io
n
L
o
s
s
less
co
m
p
r
ess
in
g
i
s
p
r
o
p
o
s
ed
to
d
ec
r
ea
s
e
th
e
r
ed
u
n
d
an
c
y
a
n
d
ir
r
elev
a
n
ce
o
f
i
m
ag
e
d
ata
to
s
to
r
e
o
r
tr
an
s
f
er
d
ata
i
n
a
n
e
f
f
ici
en
t
f
o
r
m
.
He
n
ce
t
h
e
i
m
a
g
e
co
m
p
r
es
s
io
n
r
ai
s
es
th
e
tr
an
s
m
is
s
io
n
s
p
ee
d
an
d
d
ec
r
ea
s
es
th
e
s
to
r
ag
e
r
eq
u
ir
e
m
en
t.
I
n
L
o
s
s
le
s
s
tech
n
iq
u
e
o
f
i
m
a
g
e
co
m
p
r
e
s
s
io
n
,
n
o
d
ata
g
et
lo
s
t
w
h
ile
d
o
i
ng
th
e
co
m
p
r
ess
io
n
.
T
h
e
s
tep
s
o
f
A
l
g
o
r
ith
m
2
d
escr
ib
e
th
e
p
r
o
p
o
s
ed
lo
s
s
less
co
m
p
r
es
s
io
n
m
et
h
o
d
.
A
l
g
o
r
ith
m
2
.
L
o
s
s
les
s
i
m
ag
e
c
o
m
p
r
es
s
io
n
Input
:
R,G,B
// subands of input image
W, H
// width and height of suband
Output
:
RComp, GComp, BComp
, // compressed subands
Step
1
:
For each subbands do the following
:
Step
1.1
:
Th
e
su
bb
an
d
R
is
am
en
de
d
by
de
fi
ni
ng
th
e
di
ff
er
e
nc
es
be
tw
ee
n
ad
ja
ce
nt
pixels using the following formula:
=
−
−
1
for i=1,.., n
-
1
(
8
)
where
n
is the length of subband R (i.e., W×H).
Step
1.2
:
Mapping
the
R
i
to
po
si
ti
ve
by
th
is
po
in
t
th
e
co
di
ng
co
mp
le
xi
ty
resulting
from
positive
/negative
values
is
rem
oved.
The
modulated
va
lu
es
ar
e
co
nv
er
te
d
to
be
al
wa
ys
po
si
ti
ve
,
by
pe
rf
or
mi
ng
th
e
following mapping equation:
=
{
2
≥
0
−
2
−
1
<
0
(
9
)
where
C
i
is
th
e
i
th
el
em
en
t.
Ac
co
rd
in
g
ma
pp
in
g
e
qu
at
io
n
al
l
po
si
ti
ve
va
lu
es
ar
e
co
nv
er
te
d
to
ev
en
nu
mb
er
s
wh
il
e
th
e
ne
ga
ti
ve
va
lu
es
ar
e
became positive odd numbers.
Step
1.3
:
Huffman
Entropy
encoding
is
used
to
encode
the
modulated
band
C
to
generate compressed stream
RComp
Step
4
:
Repeat step1 to generate
GComp and BComp
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
C
o
lo
r
ima
g
e
en
cryp
tio
n
b
a
s
ed
o
n
ch
a
o
tic
s
h
it k
ey
in
g
w
ith
lo
s
s
les
s
co
mp
r
es
s
io
n
(
A
s
h
w
a
q
T
.
Ha
s
h
im)
5
741
3.
3
.
I
m
a
g
e
deciphering
T
h
e
o
p
er
atio
n
o
f
d
ec
ip
h
er
in
g
f
o
r
cip
h
er
ed
i
m
ag
e
is
d
e
co
m
p
o
s
ed
o
f
t
w
o
o
p
er
atio
n
s
.
A
t
f
ir
s
t
th
e
d
ec
o
m
p
r
ess
in
g
i
s
p
er
f
o
r
m
ed
f
o
r
ea
c
h
co
m
p
r
es
s
ed
s
u
b
b
an
d
s
.
Seco
n
d
l
y
,
t
h
r
ee
s
eq
u
en
ce
s
ar
e
g
e
n
er
ated
u
s
i
n
g
th
e
s
a
m
e
k
e
y
s
o
f
en
cr
y
p
tio
n
p
r
o
ce
s
s
.
T
h
ese
s
eq
u
en
ce
s
ar
e
u
s
ed
as
ch
ao
tic
s
ig
n
al
s
to
tr
an
s
m
it
o
r
d
ec
o
d
e
d
ec
o
m
p
r
ess
ed
s
u
b
b
an
d
s
to
g
e
n
er
ate
th
e
d
ec
r
y
p
ted
i
m
ag
e.
T
h
e
s
tep
s
o
f
d
ec
r
y
p
t
io
n
alg
o
r
ith
m
ar
e
d
escr
ib
ed
in
A
l
g
o
r
ith
m
3
.
A
l
g
o
r
ith
m
3
.
I
m
a
g
e
d
ec
r
y
p
tio
n
Input
:
E
// Encrypted image
l
1
, l
2
, l
3
// length of
BinE
1,
BinE
2
and
BinE
3
Output
:
I
// decrypted image
Step 1
:
Separate the three encrypted subbands
BinE
1,
BinE
2
and
BinE
3
of the encrypted image
E
Step
2
:
Produce
the
required
chao
tic
sequences
D
1
,
D
2
,
D
3
o
f
le
ng
th
l
1
,
l
2
,
l
3
us
ed
t
he
sa
me
chaotic parameters used in encryption process.
Step
3
:
Convert the range of generated real sequences
D
1
, D
2
, D
3
from [0 1] to [
-
1 1].
Step
4
:
For each encrypted subbands decoded them such as follows:
For I←1.. to
l
1
H (I)
=
D
1
(I) × Round( (
BinE
1
1
(I)+ (
-
0.5) ) )
IF
H
> T) // T is the threshold value
RComp
i
=
1
Else
RComp
i
=
0
EndIf
EndFor
Step
5
:
Repeat step4 to generate
GComp
i
and
GComp
i
Step
6
:
decompressed
the
three
ve
ctors
RComp
i
,
GComp
i
and
G
Co
mp
i
separately
using
A
l
go
ri
th
m
4 to generate three binary streams
R, G and B
Step
7
:
Combine the three subbands into decrepted image
I
A
l
g
o
r
ith
m
4
.
L
o
s
s
les
s
i
m
ag
e
d
ec
o
m
p
r
es
s
io
n
Input
:
RComp, GComp, BComp
// Compressed streams
Output
:
R, G, B
// R,G,B subbands
Step
1
:
For each compressed subbands
RComp, GComp, BComp
;
Step
1.1
:
Huffman
Entropy
deccoding
is
applied
on
the
compr
essed
stream
RCom
to
generate
C.
Step
1.2
:
Mapping
to
Negative
is
u
sed
for
the
decoded
data
resulted
from
step1
performing the
following equation:
=
{
2
−
(
+
1
)
2
(
1
0
)
where
R
i
is
th
e
i
th
element.
The
previous
equation
turns
the
odd
values
to negative and the even values to positive.
E
x
a
m
p
le
o
f
e
n
cr
y
p
tio
n
f
o
u
r
p
i
x
el
o
f
s
u
b
b
an
d
R
w
it
h
o
u
t
co
m
p
r
e
s
s
io
n
to
clar
i
f
y
p
r
o
p
o
s
ed
en
cr
y
p
tio
n
alg
o
r
ith
m
:
-
E
n
cr
y
p
t
io
n
-
L
e
t f
o
u
r
R
s
u
b
b
an
d
p
ix
els ar
e
1
0
7
1
4
9
5
1
8
8
-
I
n
b
in
ar
y
1
0
7
=
0
1
1
0
1
0
1
1
1
4
9
=
1
0
0
1
0
1
0
1
5
1
=
0
0
1
1
0
0
1
1
8
8
=
0
1
0
1
1
0
0
0
-
1
D
o
f
f
o
u
r
b
in
ar
y
p
ix
e
ls
=
0
1
1
0
1
0
1
1
1
0
0
1
0
1
0
1
0
0
1
1
0
0
1
1
0
1
0
1
1
0
0
0
-
L
e
t
D
1
g
e
n
er
ated
f
r
o
m
ch
ao
ti
c
m
ap
af
ter
co
n
v
er
t its
r
an
g
e
t
o
[
-
1
1
]
D
1
=
-
0
.
5
0
2
5
0
.
0
0
0
0
-
1
.
0
0
0
0
-
0
.
9
8
9
9
-
0
.
9
6
9
9
-
0
.
9
3
0
1
-
0
.
8
5
0
9
-
0
.
6
9
3
3
-
0
.
3
7
9
7
0
.
2
4
4
4
-
0
.
5
1
3
6
-
0
.
0
2
2
2
0
.
9
5
5
9
0
.
9
0
2
2
0
.
7
9
5
4
0
.
5
8
2
9
0
.
1
6
0
1
-
0
.
6
8
1
5
-
0
.
3
5
6
1
0
.
2
9
1
3
-
0
.
4
2
0
4
0
.
1
6
3
5
-
0
.
6
7
4
7
-
0
.
3
4
2
6
0
.
3
1
8
2
-
0
.
3
6
6
8
0
.
2
7
0
1
-
0
.
4
6
2
4
0
.
0
7
9
8
-
0
.
8
4
1
2
-
0
.
6
7
4
0
-
0
.
3
4
1
2
-
T
h
e
co
d
ed
E
=
0
.
5
0
2
5
0
.
0
0
0
0
-
1
.
0
0
0
0
0
.
9
8
9
9
-
0
.
9
6
9
9
0
.
9
3
0
1
-
0
.
8
5
0
9
-
0
.
6
9
3
3
-
0
.
3
7
9
7
-
0
.
2
4
4
4
0
.
5
1
3
6
-
0
.
0
2
2
2
-
0
.
9
5
5
9
0
.
9
0
2
2
-
0
.
7
9
5
4
0
.
5
8
2
9
-
0
.
1
6
0
1
0
.
6
8
1
5
-
0
.
3
5
6
1
0
.
2
9
1
3
0
.
4
2
0
4
-
0
.
1
6
3
5
-
0
.
6
7
4
7
-
0
.
3
4
2
6
-
0
.
3
1
8
2
-
0
.
3
6
6
8
-
0
.
2
7
0
1
-
0
.
4
6
2
4
0
.
0
7
9
8
0
.
8
4
1
2
0
.
6
7
4
0
0
.
3
4
1
2
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
5
7
3
6
-
5
7
4
8
5742
-
C
o
n
v
er
ted
to
b
in
ar
y
u
s
i
n
g
B
in
E
=
R
o
u
n
d
(
E
+
0
.
5
)
=
1
1
0
1
0
1
0
0
0
0
1
0
0
1
0
1
0
1
0
1
1
0
0
0
0
0
0
0
1
1
1
1
-
E
n
cr
y
p
ted
o
u
tp
u
t i
n
d
ec
i
m
al:
2
1
2
3
7
8
8
1
5
-
Dec
r
y
p
tio
n
:
2
1
2
3
7
8
8
1
5
-
C
o
n
v
er
t to
b
in
ar
y
B
in
E
1,
=
1
1
0
1
0
1
0
0
0
0
1
0
0
1
0
1
0
1
0
1
1
0
0
0
0
0
0
0
1
1
1
1
-
L
et
D
1
g
e
n
er
ated
f
r
o
m
c
h
ao
ti
c
m
ap
a
f
ter
co
n
v
er
t
its
r
an
g
e
t
o
[
-
1
1
]
u
s
in
g
th
e
s
a
m
e
p
ar
a
m
eter
s
o
f
en
cr
y
p
tio
n
p
r
o
ce
s
s
D
1
=
-
0
.
5
0
2
5
0
.
0
0
0
0
-
1
.
0
0
0
0
-
0
.
9
8
9
9
-
0
.
9
6
9
9
-
0
.
9
3
0
1
-
0
.
8
5
0
9
-
0
.
6
9
3
3
-
0
.
3
7
9
7
0
.
2
4
4
4
-
0
.
5
1
3
6
-
0
.
0
2
2
2
0
.
9
5
5
9
0
.
9
0
2
2
0
.
7
9
5
4
0
.
5
8
2
9
0
.
1
6
0
1
-
0
.
6
8
1
5
-
0
.
3
5
6
1
0
.
2
9
1
3
-
0
.
4
2
0
4
0
.
1
6
3
5
-
0
.
6
7
4
7
-
0
.
3
4
2
6
0
.
3
1
8
2
-
0
.
3
6
6
8
0
.
2
7
0
1
-
0
.
4
6
2
4
0
.
0
7
9
8
-
0
.
8
4
1
2
-
0
.
6
7
4
0
-
0
.
3
4
1
2
-
T
h
e
o
u
tp
u
t a
f
ter
th
i
s
f
o
r
m
u
la
:
G=
R
o
u
n
d
(
(
B
in
E
1
1
(
I
)
+
(
-
0
.
5
)
)
G
=
1
1
-
1
1
-
1
1
-
1
-
1
-
1
-
1
1
-
1
-
1
1
-
1
1
-
1
1
-
1
1
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
1
1
1
1
H
(
I
)
=
D
1
(
I
)
×
G
H
=
-
0
.
5
0
2
5
0
.
0
0
0
0
1
.
0
0
0
0
-
0
.
9
8
9
9
0
.
9
6
9
9
-
0
.
9
3
0
1
0
.
8
5
0
9
0
.
6
9
3
3
0
.
3
7
9
7
-
0
.
2
4
4
4
-
0
.
5
1
3
6
0
.
0
2
2
2
-
0
.
9
5
5
9
0
.
9
0
2
2
-
0
.
7
9
5
4
0
.
5
8
2
9
-
0
.
1
6
0
1
-
0
.
6
8
1
5
0
.
3
5
6
1
0
.
2
9
1
3
-
0
.
4
2
0
4
-
0
.
1
6
3
5
0
.
6
7
4
7
0
.
3
4
2
6
-
0
.
3
1
8
2
0
.
3
6
6
8
-
0
.
2
7
0
1
0
.
4
6
2
4
0
.
0
7
9
8
-
0
.
8
4
1
2
-
0
.
6
7
4
0
-
0
.
3
4
1
2
0
-
I
F H
(
i)
>
T
)
//
T
is
th
e
th
r
esh
o
ld
v
al
u
e
(
i.e
.
,
T
=
0
)
R
C
o
mp
(
i)
=
1
E
ls
e
R
C
o
mp
(
i)
=
0
R
C
o
mp
=
0
1
1
0
1
0
1
1
1
0
0
1
0
1
0
1
0
0
1
1
0
0
1
1
0
1
0
1
1
0
0
0
0
1
0
1
1
0
0
0
-
C
o
n
v
er
ted
to
d
ec
i
m
al:
1
0
7
1
4
9
5
1
8
8
4.
E
XP
E
R
I
M
E
NT
A
L
RE
SUL
T
S
I
n
th
is
p
ap
er
f
o
u
r
b
m
p
co
lo
r
im
a
g
es
o
f
s
ize
2
5
6
×2
5
6
a
r
e
test
ed
as
d
ep
icted
in
Fig
u
r
e
3
.
E
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
o
p
er
atio
n
s
ar
e
i
m
p
le
m
e
n
ted
u
s
in
g
Ma
tlab
2
0
1
8
a
an
d
(
x
0
,
y
0
,
z
0
,
w
0
)
ar
e
s
et
to
(
0
.
3
9
8
,
0
.
4
5
6
,
0
.
7
8
4
,
0
.
9
8
2
)
s
u
cc
es
s
iv
el
y
.
Fi
g
u
r
e
4
d
ep
icts
th
e
en
cr
y
p
ted
tes
t i
m
a
g
e
s
b
y
p
r
o
p
o
s
ed
s
y
s
te
m
.
Fig
u
r
e
3
.
T
est im
a
g
es
Fig
u
r
e
4
.
E
n
cr
y
p
ted
i
m
a
g
es b
y
p
r
o
p
o
s
ed
s
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
C
o
lo
r
ima
g
e
en
cryp
tio
n
b
a
s
ed
o
n
ch
a
o
tic
s
h
it k
ey
in
g
w
ith
lo
s
s
les
s
co
mp
r
es
s
io
n
(
A
s
h
w
a
q
T
.
Ha
s
h
im)
5743
T
ab
le
1
s
h
o
w
s
th
e
co
m
p
r
e
s
s
io
n
r
atio
(
C
R
)
o
f
tes
ted
i
m
a
g
es.
T
h
e
ai
m
ed
o
f
t
h
e
co
m
p
r
ess
io
n
i
n
th
is
r
esear
ch
to
r
ed
u
ce
th
e
ti
m
e
t
h
at
is
r
eq
u
ir
ed
f
o
r
co
d
in
g
th
e
i
m
ag
e
b
y
C
SK.
A
t
th
e
s
a
m
e
t
i
m
e
t
h
e
t
y
p
e
o
f
co
m
p
r
es
s
io
n
i
s
lo
s
s
les
s
t
h
er
e
i
s
n
o
e
f
f
ec
t
o
n
t
h
e
i
n
p
u
t
i
m
a
g
e
q
u
alit
y
.
T
ab
le
2
d
is
p
la
y
s
t
h
e
ti
m
e
co
n
s
u
m
in
g
o
f
p
r
o
p
o
s
ed
s
y
s
te
m
f
o
r
t
h
e
test
ed
i
m
ag
e
s
.
T
ab
le
1
.
T
h
e
co
m
p
ar
is
o
n
o
f
te
s
ted
i
m
a
g
es
I
mag
e
n
a
me
O
r
i
g
i
n
a
l
s
i
z
e
C
o
mp
r
e
sse
d
S
i
z
e
CR
A
1
9
6
6
0
8
5
6
0
0
8
3
.
5
N
i
k
e
1
9
6
6
0
8
2
8
8
5
0
6
.
8
P
e
p
p
e
r
s
1
9
6
6
0
8
3
3
2
3
4
1
.
4
8
L
e
n
a
1
9
6
6
0
8
1
2
0
0
0
5
1
.
6
4
T
ab
le
2
.
T
h
e
tim
e
co
n
s
u
m
in
g
o
f
test
ed
i
m
a
g
e
s
I
mag
e
n
a
me
C
o
mp
r
e
ssi
o
n
T
i
me
i
n
S
e
c
.
C
o
d
i
n
g
T
i
me
i
n
S
e
c
.
T
o
t
a
l
t
i
me
i
n
S
e
c
.
A
1
.
8
7
5
1
.
5
6
3
3
.
4
3
8
N
i
k
e
1
.
8
6
7
0
.
8
5
1
2
.
7
1
8
P
e
p
p
e
r
s
1
.
4
3
2
3
.
1
3
7
4
.
5
6
9
L
e
n
a
1
.
3
6
8
3
.
9
2
2
5
.
2
9
4
.
1
.
Securit
y
a
na
ly
s
is
T
h
e
s
u
g
g
e
s
ted
en
cr
y
p
t
io
n
s
c
h
e
m
e
s
ec
u
r
it
y
is
i
n
s
p
ec
t
in
t
h
is
s
ec
tio
n
w
it
h
t
h
e
R
GB
co
lo
r
i
m
ag
e
s
as a
n
ex
a
m
p
le
.
4
.
1
.
1
.
H
is
t
o
g
ra
m
a
na
ly
s
is
A
p
er
f
ec
t
h
is
to
g
r
a
m
o
f
a
n
e
f
f
icie
n
tl
y
cip
h
er
ed
i
m
a
g
e
m
u
s
t
b
e
u
n
if
o
r
m
a
n
d
m
u
c
h
d
if
f
e
r
en
t
f
r
o
m
th
e
o
r
ig
i
n
al
i
m
ag
e.
Fo
r
a
2
4
-
b
it
co
lo
r
im
a
g
e,
t
h
e
h
i
s
to
g
r
a
m
f
o
r
r
ed
,
g
r
ee
n
,
b
lu
e
c
h
an
n
el
s
ar
e
d
r
a
w
n
r
esp
ec
tiv
el
y
.
T
h
u
s
h
is
to
g
r
a
m
s
f
o
r
r
ed
,
g
r
ee
n
,
b
l
u
e
c
h
an
n
els
o
f
L
en
a
an
d
t
h
e
cip
h
er
-
i
m
ag
e
ar
e
p
lo
tted
i
n
Fig
u
r
e
5
.
I
t
is
n
o
tice
t
h
at
th
e
h
is
to
g
r
a
m
s
o
f
th
e
cip
h
er
i
m
a
g
e
ar
e
u
n
if
o
r
m
an
d
f
u
ll
y
u
n
l
ik
e
f
r
o
m
th
e
o
r
i
g
in
a
l
i
m
a
g
e,
n
ec
ess
itati
n
g
t
h
at
th
e
r
ed
u
n
d
an
c
y
o
f
t
h
e
o
r
i
g
i
n
al
i
m
ag
e
b
e
s
u
cc
e
s
s
f
u
ll
y
h
id
d
en
af
ter
t
h
e
e
n
cr
y
p
ti
o
n
,
an
d
th
er
ef
o
r
e
d
o
es n
o
t p
r
o
v
id
e
an
y
v
alu
ab
le
i
n
f
o
r
m
atio
n
f
o
r
s
tatis
t
ical
attac
k
s
.
Fig
u
r
e
5
.
T
h
e
h
is
to
g
r
a
m
a
n
al
y
s
is
r
es
u
lt
,
(
c)
-
(
e)
r
ed
,
g
r
ee
n
,
b
lu
e
ch
a
n
n
e
l c
o
m
p
o
n
e
n
ts
o
f
p
lai
n
-
i
m
a
g
e
,
(
f
)
-
(
h
)
r
ed
,
g
r
ee
n
,
b
lu
e
c
h
an
n
e
l
co
m
p
o
n
e
n
t
s
o
f
en
cr
y
p
ted
i
m
ag
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
6
,
Dec
em
b
er
2
0
2
0
:
5
7
3
6
-
5
7
4
8
5744
4
.
1
.
2
.
K
ey
s
pa
ce
I
n
cr
y
p
to
g
r
ap
h
y
,
as
m
u
c
h
a
s
th
e
k
e
y
s
p
ac
e
i
s
lar
g
e,
a
s
m
u
ch
as
th
e
ca
p
ab
ilit
y
f
o
r
r
esi
s
t
in
g
f
o
r
ce
attac
k
s
is
s
tr
o
n
g
.
T
h
e
k
e
y
s
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
ar
e
r
ep
r
esen
ted
b
y
th
e
in
i
tial
v
alu
es
x
(
0
)
,
y
(
0
)
,
z(
0
)
,
w
(
0
)
o
f
t
h
e
c
h
ao
tic
s
y
s
te
m
in
(
1
)
,
th
e
p
ar
a
m
eter
e
o
f
c
h
ao
t
ic
s
y
s
te
m
a
n
d
th
e
C
h
eb
y
s
h
e
v
m
ap
s
i
n
itia
l
v
a
lu
e
s
u
1
(
1
)
,
u
2
(
1
)
in
(
2
)
.
T
h
e
x
0
,
y
0
,
z
0
,
w
0
,
u
1
(
1
)
an
d
u
2
(
1
)
is
p
r
ec
is
e
to
1
0
−
15
,
w
h
ile
th
e
p
ar
am
eter
e
f
o
r
e
∈
(
0
.
0
8
5
,
0
.
7
9
8
)
is
p
r
ec
is
e
to
1
0
−
12
,
s
o
th
e
s
ize
o
f
t
h
e
k
e
y
s
p
ac
e
is
(
1
0
15
)
6
×1
0
12
=
10
102
≈2
33
9
.
I
n
r
ef
er
en
ce
[
3
2
]
,
L
i
m
e
n
tio
n
ed
th
at
to
av
o
id
b
r
u
te
f
o
r
ce
attac
k
s
,
t
h
e
cip
h
er
ed
s
y
s
te
m
k
e
y
s
p
ac
e
s
h
o
u
ld
ex
ce
ed
2
100
.
C
o
n
s
eq
u
e
n
tl
y
,
t
h
e
al
g
o
r
ith
m
k
e
y
is
lar
g
e
ad
eq
u
ate
to
i
m
m
u
n
e
t
h
e
b
r
u
te
f
o
r
ce
attac
k
s
.
T
ab
le
3
co
m
p
ar
e
th
e
k
e
y
s
p
a
ce
s
ize
b
et
w
ee
n
t
h
e
u
s
ed
alg
o
r
ith
m
a
n
d
o
th
er
s
i
m
ilar
e
n
cr
y
p
t
io
n
al
g
o
r
ith
m
s
,
an
d
it is
clea
r
th
at
u
til
ized
alg
o
r
ith
m
’
s
k
e
y
s
p
ac
e
s
ize
is
lar
g
e
r
th
an
t
h
at
o
f
m
o
s
t a
n
alo
g
o
u
s
alg
o
r
ith
m
s
.
T
ab
le
3
.
T
h
e
k
e
y
s
p
ac
e
c
o
m
p
a
r
is
o
n
s
En
c
r
y
p
t
i
o
n
A
l
g
o
r
i
t
h
m
K
e
y
S
p
a
c
e
W
a
n
g
e
t
a
l
.
[
3
3
]
2
149
G
u
e
smi
e
t
a
l
.
[
3
4
]
2
256
L
i
e
t
a
l
.
[
3
5
]
2
299
L
i
e
t
a
l
.
[
3
6
]
2
375
C
u
r
i
a
c
e
t
a
l
.
[
3
7
]
2
128
C
u
r
i
a
c
e
t
a
l
.
[
3
8
]
2
357
U
se
d
S
y
st
e
m [
1
]
2
339
4
.
1
.
3
.
Co
rr
ela
t
io
n
a
na
ly
s
is
I
n
p
lain
-
i
m
a
g
e,
th
e
ad
j
ac
en
t
p
ix
els
h
a
v
e
h
i
g
h
co
r
r
elatio
n
w
h
ic
h
attac
k
er
u
s
e
i
n
th
e
ir
attac
k
s
,
s
o
th
e
co
r
r
elatio
n
co
e
f
f
icien
t
is
al
w
a
y
s
h
i
g
h
.
T
h
er
ef
o
r
e,
t
h
e
co
r
r
elatio
n
co
ef
f
icie
n
t
m
u
s
t
b
e
s
ig
n
i
f
ica
n
tl
y
r
ed
u
c
ed
af
ter
en
cr
y
p
tio
n
.
B
y
(1
1
)
,
th
e
co
r
r
elatio
n
co
ef
f
icien
t
s
o
f
f
o
u
r
d
ir
ec
tio
n
s
ar
e
ca
lcu
la
ted
.
=
(
,
)
√
(
)
×
√
(
)
(1
1
)
w
h
er
e
(
,
)
=
1
∑
(
−
(
)
)
0
(
−
(
)
)
,
(
)
=
1
∑
−
(
)
2
0
,
(
)
=
1
.
T
h
e
v
alu
es
o
f
t
w
o
ad
j
ac
en
t
p
i
x
els
o
f
f
o
u
r
d
ir
ec
tio
n
s
ar
e
r
ep
r
esen
ted
b
y
x
,
y
,
an
d
N
is
i
m
ag
e
p
ix
el
s
n
u
m
b
er
.
T
ab
le
4
lis
ts
t
h
e
co
r
r
elatio
n
co
ef
fi
cie
n
t
s
o
f
o
r
i
g
i
n
al
i
m
a
g
es
a
n
d
it
s
en
cr
y
p
ted
i
m
a
g
es
a
s
w
el
l
as
th
e
v
er
tical
(
V)
,
h
o
r
izo
n
ta
l
(
H)
,
d
iag
o
n
al
(
D)
d
ir
ec
tio
n
s
.
T
a
b
le
4
clea
r
ly
s
h
o
w
s
t
h
at
s
u
g
g
ested
alg
o
r
ith
m
ca
n
r
esis
t
h
ac
k
er
at
tack
s
ac
co
r
d
in
g
to
t
h
e
v
a
lu
e
o
f
t
h
e
co
r
r
elatio
n
co
ef
f
icie
n
t
w
h
ic
h
is
c
lo
s
e
to
0
o
f
th
e
cip
h
er
-
i
m
a
g
es
w
h
ile
it
is
clo
s
e
to
1
o
f
th
e
p
lai
n
-
i
m
a
g
e
s
.
Fig
u
r
es
6
an
d
7
s
h
o
w
t
h
e
v
er
t
ical,
h
o
r
izo
n
tal,
an
d
d
iag
o
n
a
l
d
ir
ec
tio
n
s
f
o
r
i
m
a
g
e
‘
A’
an
d
‘
l
en
a’
.
T
ab
le
4
.
Ho
r
izo
n
tal,
v
er
tical
a
n
d
d
iag
o
n
al
co
r
r
elatio
n
co
ef
fic
ien
ts
b
et
w
ee
n
o
r
ig
i
n
al
an
d
e
n
c
r
y
p
ted
i
m
ag
e
s
I
mag
e
n
a
me
C
o
r
r
e
l
a
t
i
o
n
o
f
p
l
a
i
n
i
m
a
g
e
C
o
r
r
e
l
a
t
i
o
n
o
f
c
i
p
h
e
r
e
d
i
mag
e
H
o
r
i
z
o
n
t
a
l
V
e
r
t
i
c
a
l
D
i
a
g
o
n
a
l
H
o
r
i
z
o
n
t
a
l
V
e
r
t
i
c
a
l
D
i
a
g
o
n
a
l
A
R
0
.
8
9
9
3
0
.
9
3
8
5
0
.
9
0
1
4
0
.
0
1
2
6
–
0
.
0
1
1
4
–
0
.
0
0
7
7
G
0
.
9
9
3
6
0
.
9
9
2
8
0
.
9
8
9
7
−
0
.
0
0
0
9
0
.
0
0
0
3
−
0
.
0
0
0
2
B
0
.
9
2
6
5
0
.
9
1
9
2
0
.
8
8
0
9
−
0
.
0
0
2
4
−
0
.
0
0
0
8
−
0
.
0
0
4
3
N
i
k
e
R
0
.
9
8
0
8
0
.
9
9
0
7
0
.
9
7
4
7
0
.
0
0
1
7
–
0
.
0
0
4
2
0
.
0
0
1
5
G
0
.
9
8
5
5
0
.
9
8
4
8
0
.
9
7
8
3
−
0
.
0
0
1
9
−
0
.
0
0
0
4
0
.
0
0
0
3
B
0
.
9
5
2
7
0
.
9
5
2
7
0
.
9
1
7
8
−
0
.
0
0
3
5
0
.
0
0
0
5
−
0
.
0
0
6
2
P
e
p
p
e
r
s
R
0
.
9
7
0
4
0
.
9
7
7
3
9
0
.
9
5
8
3
–
0
.
0
0
0
1
–
0
.
0
0
0
3
–
0
.
0
0
2
3
G
0
.
8
6
6
8
0
.
7
7
5
9
0
.
7
4
3
2
0
.
0
0
3
3
0
.
0
0
1
8
0
.
0
0
0
3
B
0
.
9
0
6
7
0
.
8
8
4
4
0
.
8
5
4
4
0
.
0
0
0
6
0
.
0
0
0
4
0
.
0
0
0
8
L
e
n
a
R
0
.
9
7
5
3
0
.
9
8
5
3
0
.
9
7
3
4
−
0
.
0
0
2
8
0
.
0
0
4
6
0
.
0
0
1
3
G
0
.
9
6
6
6
0
.
9
8
0
2
0
.
9
6
3
0
0
.
0
0
0
4
−
0
.
0
0
0
9
0
.
0
0
0
7
B
0
.
9
3
3
4
0
.
9
5
5
8
0
.
9
2
6
4
−
0
.
0
0
2
9
−
0
.
0
0
0
7
−
0
.
0
0
5
0
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
C
o
lo
r
ima
g
e
en
cryp
tio
n
b
a
s
ed
o
n
ch
a
o
tic
s
h
it k
ey
in
g
w
ith
lo
s
s
les
s
co
mp
r
es
s
io
n
(
A
s
h
w
a
q
T
.
Ha
s
h
im)
5745
Fig
u
r
e
6
.
T
h
e
co
r
r
elatio
n
o
f
th
e
i
m
ag
e
‘
A’
w
it
h
t
h
e
co
r
r
esp
o
n
d
en
t e
n
c
r
y
p
ted
i
m
a
g
e
o
f
‘
A’
Fig
u
r
e
7
.
T
h
e
co
r
r
elatio
n
o
f
th
e
‘
L
e
n
a
’
i
m
ag
e
a
n
d
th
e
co
r
r
es
p
o
n
d
en
t e
n
cr
y
p
ted
i
m
ag
e
o
f
‘
L
e
n
a’
Evaluation Warning : The document was created with Spire.PDF for Python.