Next Article in Journal
USV Search Mission Planning Methodology for Lost Target Rescue on Sea
Next Article in Special Issue
Fast Decision-Tree-Based Series Partitioning and Mode Prediction Termination Algorithm for H.266/VVC
Previous Article in Journal
Two-Layer Cooperative Optimization of Flexible Interconnected Distribution Networks Considering Electric Vehicle User Satisfaction Degree
Previous Article in Special Issue
Resource-Efficient Optimization for FPGA-Based Convolution Accelerator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An RGB Pseudo-Colorization Method for Filtering of Multi-Source Graphical Data

Military Communication Institute—National Research Institute, Warszawska 22A Str., 05-130 Zegrze Poludniowe, Poland
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(22), 4583; https://doi.org/10.3390/electronics12224583
Submission received: 18 September 2023 / Revised: 2 November 2023 / Accepted: 7 November 2023 / Published: 9 November 2023
(This article belongs to the Special Issue Signal, Image and Video Processing: Development and Applications)

Abstract

:
Artificial colorization (pseudo-colorization) is a commonly used method to improve the readability of images obtained from sources (sensors) that do not reflect the original color of the object of observation (e.g., X-ray). It is designed to draw the observer’s attention to the important details of the analyzed image (e.g., disease changes in medical imaging). Analogous needs occur in the process of assessing the emission security (EMSEC) of imaging devices used to process classified information, which is made on the basis of the analysis of images reproduced from compromising emanations related to the operation of these devices. The presence of many graphic elements in an image may reduce the level of perception of the information contained in it. Such images may be very noisy or contain overlapping graphic symbols, the source of which is devices processing graphic information operating in close proximity to each other. The use of various types of measures enabling data filtration at various stages of their processing, e.g., the use of a directional antenna, frequency filtering, point filtering or contextual contrast modification, does not always prove effective. The solution to the filtration problem is the pseudo-colorization of the image. However, the image colorization used based on the typical “Hot”, “Radar” or “Cold” color palettes does not meet the requirements for filtering graphic data from many sources. It is necessary to use a filter that will allow the sharp cut-off of graphic data at the border between the background and the graphic symbol. For the pseudo-colorization process itself, the exponential function as a function of transforming the amplitudes of image pixels from the gray color space to the RGB color space is sufficient. However, the smooth transition of the function shape from zero values to values greater than zero results in a low efficiency of filtering graphic data from noise. In this article, a method of filtering an image based on the pseudo-colorization of its content, i.e., reproduction of a compromising emanation signal level in the RGB value of image pixel color components, was proposed. A quadratic function was proposed as the transformation function. The higher effectiveness of the method based on the use of a square function (compared to the exponential function) was shown by conducting tests on many images, some of which are presented in this article. The proposed solution is a universal approach and can be used in various fields related to image analysis and the need for their filtration. Its universality is related to the possibility of changing function parameters affecting its position on the value axis from 0 to 255, its width, its minimum and its maximum value for each RGB channel.

1. Introduction

The issue of electromagnetic protection, i.e., minimizing threats to the confidentiality of information related to the possibility of using the so-called disclosing emissions, has been present in the awareness of a wide group of people from the IT (Information Technology) industry since at least half of the 1980s [1]. Considering that classified research programs related to this issue date back to the 1940s, one might assume that all threats have been recognized and eliminated [2]. Indeed, in the case of specialized devices produced in short series (e.g., encryption devices), their electromagnetic safety can be ensured by using filtration and shielding techniques [3]. However, modern information processing systems are based on the widespread use of computer hardware. Both economics and ergonomics mean that this equipment cannot significantly differ from commercial equipment [4].
It is true that technical progress related to the development of digital signal processing and transmission techniques (extensive modulation techniques, considerable processing speed) make it practically impossible to use radiated electromagnetic emissions related to the operation of ultra-fast interfaces currently used in computer systems in the classical sense of electromagnetic eavesdropping (SATA (Serial Advanced Technology Attachment), USB (Universal Serial Bus), Ethernet) [5]. However, it is still possible to explore these types of system elements related to the display of information in a form understandable to the user (monitors, displays, printers) [6]. These devices still use raster imaging techniques, and the information entered into them is processed serially, at a relatively slow pace. Such technologies still allow the reconstruction of information in the form of images, which can become an easy source of non-invasive data acquisition. As the experimental results show, laser printers are not safe in this respect, and digital DVI/HDMI (Digital Visual Interface/High-Definition Multimedia Interface) interfaces are characterized by their even greater susceptibility to electromagnetic eavesdropping than the analog VGA (Video Graphics Array) interface [7]. Data reproduced from emission signals leaking from analog sources have in their graphic structure only vertical and diagonal edges, which are very susceptible to disturbances inside the propagation channels. Compatibility requirements with older-generation hardware mean that the use of the DisplayPort interface is also not completely safe [8]. The reason for this phenomenon is the parallel existence of signals from analog VGA or digital HDMI standards. Each graphic imaging device may become a source of undesirable emissions [9]. This was demonstrated in [10,11], where the source of signals correlating with the displayed information was an LCD panel. A similar conclusion was reached by Guri in [12], who conducted research and showed the existence of a risk of electromagnetic infiltration in the case of LED monitors. The requirements related to ensuring the security of confidential information mean that devices intended for processing classified information, both in special and commercial versions, must be subject to tests to determine their ability to produce usable electromagnetic compromising emanations.
This type of research is conducted in specialized research laboratories operating under the auspices of national security services. It is obvious that they must have tools to identify compromising emanation signals. Especially in the case of signals that are video signals and therefore can be used using relatively unsophisticated reception and imaging methods, one cannot afford to make the mistake of missing the target. At the final stage of analysis, the reproduced images are assessed by the operator [13]. The verdict regarding the level of security of the tested device may depend on operator experience and predispositions, regardless of the colors of the processed images [14], the printing technology used for laser printers [15] or the quality of prints for LED and laser printers [16]. Therefore, it is important to equip it with tools enabling an objective assessment of the degree of similarity of the reproduced image to the source image.
It should be borne in mind that electromagnetic compromising emanation signals arise naturally and are the result of the laws of physics, so their nature has not been designed to ensure the best possible propagation, free from losses and distortions [17]. In the case of video signals, they usually reflect only part of the imaged information (edges of shapes) [18] and do not contain information about the colors used to present it [19]. Therefore, they are residual emissions, often distorted and disturbed by other signals accompanying the device’s operation. These may be emissions correlated with vertical and horizontal deflection signals of computer monitors [20], or signals of cooling systems, heaters and stepper motors as in the case of multifunctional devices [21]. Due to such a special form of these signals, it becomes difficult to use classical methods of assessing their quality based on comparing the replica with a standard to evaluate the images reproduced from them. In this case, a significant problem is the fact that even a distorted, noisy image reconstructed from the compromising emanation signal has information content that may contribute to the loss of confidentiality of the data associated with it [22]. Classical methods of assessing image quality would treat these types of images as illegible and unacceptable. It is therefore necessary to subject the reconstructed image to transformations that will minimize the impact of those elements of the reconstructed image that are distortive and highlight those that may be important for its content [23]. Filtering operations in the frequency domain, edge detection [24], edge detection using histogram equalization [25] and edge detection for images in the YUV color space [26] are most often used for this purpose. This method is effective when the bands of the useful signal and the interference overlap only slightly. In the case of analyzing such specific signals as compromising emanation signals, however, we quite often deal with situations in which the interference is a signal coming from another element of the graphic circuit or another imaging device. In the reproduced image, at least two unsynchronized replicas of the same or different images are observed. It is necessary to use a spatial filtering technique based on strengthening, weakening and manipulating the color [27] of specific elements of the reproduced image in order to obtain a higher level of perception [28] or increase its similarity to one of the source images. Color manipulation [28] is also used to reduce the sensitivity of processed data to the effectiveness of electromagnetic infiltration [29].
Color imaging devices use a color creation technique involving mixing the so-called primary colors. For example, in typical monitors, the color of each pixel on the screen is determined through appropriate control of each of the three elements responsible for producing colors, red ( R ), green ( G ) and blue ( B ), which is referred to as the R G B color space. The source of the compromising emanation signals are therefore all the elements processing these three signals [30]. This processing is carried out in parallel; the resulting compromising emanation signal does not allow for a simple reconstruction of the analyzed image in its original color [31]. At the same time, the human sense of sight, or rather the way we perceive the world around us, has been adapted to receive color information. The very structure of the human eye means that we can see some shades of color clearly but cannot distinguish others. Receptors called cones located in the retina of the eye are responsible for color vision. There are approximately 6 million of them and they are concentrated mainly in the so-called macula lutea. There are three types of cones in the retina of the human eye, each of which has a different spectral characteristic, i.e., different sensitivity to each wavelength of light. These three types of cones are marked as S (the maximum response for short waves), M (the maximum response for medium waves) and L (the maximum response for long waves). The individual colors perceived by humans are created as a result of the interactions of nerve impulses produced by all three types of cones. The first one has maximum sensitivity for a wavelength of approximately 445 nm, which corresponds to the blue color. The second one is “tuned” to waves with a length of 535 nm (this corresponds to the green color), and the third one is 575 nm, which in turn is usually considered as red. It is estimated that the ratio of the number of different types of suppositories is R : G : B = 40 : 20 : 1 . The resultant sensitivity of the human eye is therefore the lowest for blue.
Reproducing the color of an image reconstructed from electromagnetic compromising emanation signals is a difficult, but not impossible, task [32]. However, in typical applications of assessing the electromagnetic security of devices intended for processing classified information, the original color of the images being the “source” of compromising emanation signals is of secondary importance. The most important thing is to assess their information content [33]. Therefore, the images reconstructed from them are subjected to operations aimed at eliminating noise and interference, improving contrast [34] and edge detection. Assessment of the accuracy of reproducing the original information can be supported by changing the color space in which the image is reconstructed. Typically, these images are reproduced in shades of gray [8,12,16,29]. As mentioned, cones located in the retina of the eye are responsible for color vision. In addition to them, the human eye is equipped with other types of receptors, the so-called stamens. They are primarily responsible for night vision and shape and movement detection. Moreover, there are many more of them than cones (100 million). It would seem, therefore, that images reproduced using shades of gray are suitable for analysis in terms of identifying the details they contain. It turns out, however, that the detection of details is made thanks to cones, which are also responsible for detecting colors. Additionally, it should be noted that compromising emanation signals are usually characterized by a negligible difference between the useful signal level and the environmental noise background level and are significantly lower than the interference signals coming from the components of the tested device. In such conditions, the linear transformation of the signal level value into the gray level of the pixel does not ensure adequate contrast of the monochromatic image or extraction of its details from the noise background. For this purpose, various approaches are proposed for the analytical assessment of the quality of color images. In [35], the Root Mean Enhancement method is proposed, which explores the three-dimensional contrast relationships of the RGB color channels. In turn, in [36], contrast measurement of a color image is carried out based on a stimulus in the human visual system (HVS). Grayscale images are also assessed for quality as an initial stage of image qualification [37]. A more effective solution is to use a modified color map, which can be created by reflecting a non-linear mapping in the LUT (Look-up Table), enabling compression or expansion of the dynamics of the input signal (electromagnetic compromising emanation) [38]. At the same time, the human eye is adapted to perceive the surrounding reality in color. However, the appropriate selection of image colors can increase or decrease its clarity and readability. Modifying the color of an image can be an effective compositional tool that can diversify more of its details than when using a color palette limited to shades of gray. Color is often one of the first things that catches the eye. We are naturally drawn to brighter colors. Colors have long been associated with emotions, green with safety and red with threat. The color of an object contrasting with the background attracts the observer’s eye. Appropriate use of complementary (contrasting) colors allows the observer’s eye to capture the image as a whole. At the same time, the improper use of colors may result in a deterioration of image readability, e.g., the simultaneous use of intensely saturated colors whose wavelengths significantly differ should be avoided. Due to differences in eye accommodation depending on the wavelength of light, colors such as red, orange, yellow and green can be observed simultaneously without the need for further accommodation. However, this is not possible in the case of the red, blue and purple combination. For this reason, pairs of colors that are far apart in the visible light spectrum should not be combined. Similarly, using the blue color to represent text, thin lines or small objects should also be avoided. The human visual system is not adapted to the perception of stimuli in the form of high-frequency waves that represent small objects. It should be mentioned that the number of “blue” cones is the smallest, and “short” waves are absorbed significantly more in the eye. For the same reasons, shades of blue are indicated as background colors, so grouping colors that differ only in the blue component is not recommended. Since the pigment responsible for the perception of blue waves is not sensitive to changes in brightness, the color border areas are not perceived as distinct edges.
The above-mentioned conditions indicate that the method of the colorization of images reproduced from electromagnetic compromising emanation signals and filtering important graphic data, proposed in this article, becomes an effective tool for assessing their information content (the degree of correlation with the original images). Therefore, it is an effective tool for assessing the electromagnetic security of devices used to display classified information. It uses both the effects related to the application of knowledge provided by color psychology and, above all, the filtering of image content by means of the attenuation/expansion of signal dynamics.
The proposed method is called the pseudo-colorization of images. This is directly related to the final effect obtained. The colors of the restored image do not match the colors of the original image. Colorization is intended to improve the readability of the data contained therein. The aim of the method is therefore not to attempt to faithfully reproduce the colors used during image processing on the original side.
Images created using shades of gray are present in many applications. Very often, their quality corresponds to the applications, and their undeniable advantage is the economical use of resources related to their storage or analysis [39]. However, a significant disadvantage of such images is the difficulty in perceiving many details, especially in cases that may be important from the point of view of assessing health [40], life [41], the body’s bone structure [42] or information security. In the case of images acquired in the process of electromagnetic infiltration, the information contained in such images is distorted by other graphic elements due to very “weak” electromagnetic compromising emanation signals [20,21,43], which significantly impede data recognition and perception [44]. For better readability of the image, they should be removed (filtered). One of the methods is pseudo-colorization, which, on the one hand, introduces color to the image and, on the other hand, allows the removal of unnecessary elements from it.
The possibility of practical application of the pseudo-colorization of images appearing in shades of gray is of great interest in the field of scientific research [45]. This applies not only to the analysis of X-ray images (e.g., medicine, border control or monitoring systems) [46] but also to image perception in difficult climatic conditions [47] and to the evaluation of images of the Earth’s surface [48]. An important field of application of the results of work on image colorization methods, related to increasing the possibilities of visual perception, is the protection of information against electromagnetic penetration. In many cases, the use of methods to improve the brightness, contrast or binarization of image pixel amplitude values does not bring expected results [49].
Colorization techniques are commonly used in each of the above-mentioned areas. The authors propose various solutions enabling the perception of the smallest details important in a given activity, while at the same time carrying out considerations that take into account the psychological and physiological processes taking place in human color perception, as well as the effects of using various models and color transformations. In each case, the statistical analyses conducted show the advantage of using a color image over one using shades of gray. The most frequently used methods are the use of typical color palettes such as “Hot”, “Jet”, “Warm” or “Spring”, linearly modified for X-ray scanning applications, to assist, for example, airport control workers in identifying and detecting dangerous objects [50].
Problems with analyzing grayscale images have also been noticed in the case of analyzing Earth’s areas using SAR (Synthetic Aperture Radar). In [51], a pseudo-colorization method based on the CIE L*a*b* uniform color space was proposed. As the authors of the article point out, the main advantage of this method is that it does not generate SAR image distortions. Moreover, such an image contains all the information contained in the SAR image in grayscale, while improving the visual perception and cognitive abilities of the SAR image. Therefore, this method has no filtering properties.
An important area of using image colorization is medicine. The use of various methods of transforming images from the gray color palette into the R G B color space makes areas that are important for health assessment, visible. In [39], a colorization method based on Gabor filtering and Welsh colorization was presented, which is an effective method for the specificity of medical X-ray images. To assess the effectiveness of the method, the authors used a measure in the form of S S I M (Structural Similarity Index Measure), which takes into account image brightness, contrast and graphic structure. Another approach to the problem of colorization is presented in [41,42]. Coloring images has also found its interest in the case of X-ray images, which are very important in the detection and diagnosis of diseases [52]. The key idea of this method is to apply sine and cosine transformations to the pixel amplitudes of the input image, which facilitates the detection of the edges of important graphic areas contained in the image [53]. In the authors’ opinion, this approach facilitates and improves the process of detecting and diagnosing diseases for medical radiologists and specialists in this field [54].
Attempts at the colorization of images aimed at emphasizing the details contained in them are intensively carried out in the mentioned areas. Limitations on their use in other applications are caused by the specificity of the analyzed images. Different image analysis methods are used in the field of medicine and others in the field of Earth analysis. In each of these areas, we usually deal with good-quality images. Their only weakness is the color palette of shades of gray. In the case of research on information protection against electromagnetic penetration, the reproduced images are characterized by a large content of redundant data that must be removed.
At this point, it is worth mentioning attempts to use image colorization to recreate its original color [31], which may also contribute to increasing the readability of the reconstructed image. The method proposed by the authors uses the relationship between the color of the video pixel (pixel amplitude value) and the value of the compromising emanation signal level. However, the presented results show that the method does not provide faithful color reproduction and still requires improvement. Another problem is the possibility of using the method when data filtration is necessary.
As mentioned, compromising emanation signals resulting from the operation of imaging systems are generated by many mutually interfering sources. These signals, which are both video and control signals, radiate at similar frequencies and cover similar bands. For this reason, the use of classical signal filtering methods in the frequency domain may significantly distort the information content of the images reproduced from them. Therefore, it seems that it is more useful to use spatial filtration methods that enable the elimination of irrelevant or unnecessary elements of the reconstructed image that disturb the perception of the information contained in it. These methods are based on the analysis of the statistical properties of the image pixel set. However, classic contextual methods leave the final image in a color space corresponding to shades of gray, and therefore have a limited impact on the human sense of sight. It seems beneficial to transfer them to a color space built taking into account the properties of the human eye and thus highlight their important content.
This article presents a pseudo-colorization method that not only highlights important data by using the R G B color palette. Appropriate shaping of the color and brightness of image pixels is achieved by manipulating the signal amplitudes of the R , G and B channels by using a quadratic transformation function. In this way, the proposed method also makes it possible to remove unnecessary image elements that interfere with its readability.
In addition to the introduction, this article contains several other sections. Section 2, Materials and Methods, presents a form of graphic filter: it is a mathematical description, an algorithm for determining the value of the width of the quadratic function of each RGB component for input data specified for the exponential function and also test conditions. Section 3, Results and Discussions, contains results of the tests carried out for different images. The discussions apply to a comparison of SSIM values for exponential and quadratic functions. Finally, Section 4 concludes the main outcomes of this article.

2. Materials and Methods

2.1. Form of Graphic Filter

Images reconstructed from electromagnetic compromising emanation signals obtained during the electromagnetic eavesdropping process may be subjected to pseudo-colorization. However, this is not colorization, the effect of which is to reproduce the original colors of the image, i.e., the image displayed on graphic displays of ICT devices. The purpose of such colorization is to increase the level of readability of the reproduced image and increase the level of visual perception. Pseudo-colorization involves generating signals of three R G B color channels based on a transformation using the values of a one-dimensional signal and an adopted mathematical function. An important element of the entire pseudo-colorization process is the ability to selectively change the pixel amplitudes of the transformed image. This means that a typical linear transformation will not meet the expectations in terms of filtration, exposure and colorization of the image into a human-friendly form, due to the structure of the visual system. In one article, an exponential function was adopted as the function for calculating the R G B value [38]. The nature of the SCA (Side-Channel Attack) of the radiated type corresponds to the properties of a high-pass filter, which preserves the vertical edges of the original image and practically eliminates the horizontal ones. At the same time, the technique of creating characters (fonts) used in text editors means that the video signal (and the compromising emanation signal) does not abruptly change but increases/decreases quite gently. This is the result of MS Windows using an algorithm to smooth the edges of graphic characters. Its nature is best reflected by an exponential function. In older versions of MS Windows, the smoothing option of edges could be turned off. However, the sharpness of the edges then had a negative impact on the readability of the processed data.
Exponential function with mathematical notation (1) corresponding to the R channel:
E R x = F E R + C E R F E R · e 22.5 A E R 2 · x B E R 2                                 for   x x 1 E R , x 2 E R F E R               for   other   x 0 , x 1 E R x 2 E R , 255
where:
x 1 E R = B E R A E R 2 ,
x 2 E R = B E R + A E R 2 ,
  • A E R —width of the shape of the exponential function defined as
    A E R = x 2 E R x 1 E R ,
  • B E R —the maximum value of the exponential function in the range of x  x 1 E R , x 2 E R ;
  • x 1 E R and x 2 E R —zeros of the exponential function E R x for x x 1 E R , x 2 E R ;
  • C E R —maximum value (if C E R > F E R ) or minimum value (if C E R < F E R ) of the exponential function E R x in the range of x  x 1 E R , x 2 E R ;
  • F E R —value of the exponential function E R x for x 0 , x 1 E R x 2 E R , 255 .
And a shape as in Figure 1 was used to determine the values of the R G B color components for each pixel of the analyzed images, while maintaining the properties of human vision related to the perception of appropriate colors. The effectiveness of the adopted methodology for determining R G B values has been proven both by the results of visual analyses of the obtained images and the values of the adopted image contrast assessment measure for the Y channel of the Y U V color model [25].
It should be noted that the pseudo-colorization of images should support tasks related to image analysis in the following areas (the authors focused on the first mentioned area in the next stage of the analyses):
  • Data acquisition in the electromagnetic infiltration process;
  • Analysis of medical images allowing for highlighting disease lesions;
  • Identification of dangerous elements during border control;
  • Research on the structures of the Earth’s surface;
  • Other.
In each of these areas, colorization is related to the transformation of the image from the gray color scale into a color R G B image. The first task of colorization is for this transformation to significantly increase the level of perception of the data contained in the image [31,39,41,55,56]. The second task is to filter the image being analyzed. An appropriately adopted transformation function and thus appropriately determined R G B values allow for the removal of graphic elements from the image that disturb the readability of the image, while maintaining its colorful characteristic.
The exponential function is a solution suitable for the pseudo-colorization of images. However, it is too mild a function for image filtration. Its gentle transition at the limits of the image pixel amplitude range from the value of “0” to the value of “255” causes a barely noticeable border between the background and the sign. In many cases, it is necessary to use a sharper transition at the boundary of two areas than provided by the exponential function. The authors propose the use of a quadratic function, the form of which is described by Formula (5):
K R x = C K R 4 · C K R F K R A K R 2 · x B K R 2       for   x x 1 K R , x 2 K R   F K R                                 for   other   x 0 , x 1 K R x 2 K R , 255 ,
where:
x 1 K R = B K R A K R 2 ,
x 2 K R = B K R + A K R 2 ,
  • A K R —width of the shape of the quadratic function defined as
    A K R = x 2 K R x 1 K R ,
  • B K R —the maximum value of the quadratic function in the range of x  x 1 K R , x 2 K R ;
  • x 1 K R and x 2 K R —zeros of the quadratic function K R x for x x 1 K R , x 2 K R ;
  • C K R —maximum value (if C K R > F K R ) or minimum value (if C K R < F K R ) of the quadratic function K R x in the range of x  x 1 K R , x 2 K R ;
  • F K R —value of the quadratic function K R x for x 0 , x 1 K R x 2 K R , 255 .
The general shape of the function is shown in Figure 2.
As previously mentioned, the shape of the analyzed exponential function for the pseudo-colorization of images is not accidental. It is related to the form of signs contained in the reproduced images from compromising emanation signals. SCA, through which the radiated emission signal from the source to the receiver passes, has the characteristics of a high-pass filter. On the receiving side, the vertical and diagonal edges of graphic elements are identified. The value of the observed changes in image pixel amplitudes depends on the sharpness of the original image. The Windows system uses an anti-aliasing algorithm to display graphics. This affects the blurring effect of the reproduced edges of graphic characters, hence the proposed form of the function, the course of which is to adapt to the properties of the graphic symbols displayed on the receiving side. The proposed function, by creating the LUT values, performs a multi-level thresholding operation, which is important in cases of analyses of images containing graphics in the presence of other elements that make it difficult to recognize the information sought. However, to increase the effect of image filtration, the authors based their method on a quadratic function. The course of such a function allows for a sharper filtering of data at the border between the background and the graphic symbol, as opposed to the gentle transition that occurs for the exponential function.
The analyses performed showed a greater efficiency of filtration based on a quadratic function as opposed to an exponential function. Therefore, this article presents a filtering method for images reconstructed from compromising emanation signals, using pseudo-colorization based on a quadratic function.
In order to compare the effectiveness of the proposed methods, it was necessary to make an assumption regarding the width of the shape of the quadratic function in relation to the width of the shape of the exponential function while maintaining the remaining parameters of both functions, such as the maximum of the function, the minimum of the function and the shift in the function in the range 0 ; 255 . This is intended to enable the automation of the process of pseudo-colorization and the filtering of images at a later stage. The pseudo-colorization method based on the exponential function was the starting point as the basis for transforming the image from grayscale colors to R G B colors. This function meets the appropriate criterion that allows the acceptance of the method of pseudo-colorization of images in the electromagnetic infiltration process.
Moving on to defining the course of the quadratic function, in the first stage, we can assume a constant width A ( A E = A K ) of the exponential and quadratic functions, which means that x 1 E = x 1 K and x 2 E = x 2 K , with C E = C K , F E = F K and B E = B K (Figure 3).
This assumption causes the following differences:
D E K A K m , x 1 E + n = E A E , x 1 E + n K A K m , x 1 E + n ,
where
A K m = x 2 K m x 1 K m ,
x 2 K m = x 2 E m ,
x 1 K m = x 1 E + m ,
that is,
A K m = A E 2 · m ,
for n = 0 , , x 2 E x 1 E and m = 0 , i.e., A K = A E , achieves significant values and pseudo-colorization with a quadratic function, taking into account only image colorization, which does not bring acceptable results. In such a case, the quadratic function amplifies the pixels on the background-character boundary too quickly and does not effectively filter the character from the background.
Therefore, it was proposed to connect the width of the quadratic function with the width of the exponential function by using the average deviation parameter and minimizing its value in the range from x 1 E to x 2 E .
The above assumption allows for a given parameter A E , i.e., the values x 1 E and x 2 E , of the exponential function to determine the value A K of a quadratic function that will best approximate the shape of the function K x to the function E x . The average deviation described by Formula (13) was adopted as a measure of the approximation of the quadratic function K x to the exponential function E x :
d E K A K m = n = 0 N = A E 1 D E K A K m , x 1 E + n D E K A K m ¯ N ,
where
D E K A K m ¯ = n = 0 N = A E 1 D E K A K m , x 1 E + n N ,
and m = 0,1 , , M , M + 1 , where M is the value for which
d E K A K M = m i n d E K A K m .
The m i n d E K A K m values calculated according to the algorithm presented in Figure 4 for each R G B channel determine the widths of the K x function by determining the values of the zeros x 1 K and x 2 K , and thus the width of the A K function.
This allows for obtaining waveforms (Figure 5) for which the differences D E K provide both acceptable pseudo-colorization and image filtering efficiency.
The algorithm presented in Figure 4 begins with determining the parameters of the exponential function, the effectiveness of which in the pseudo-colorization process was demonstrated in [38]. Parameters x 1 E , x 2 E , C E , F E and B E for each RGB channel place three runs of the E x function on the grayscale image pixel amplitude value axis (horizontal axis), which allow pseudo-colorization of the analyzed image by transforming the pixel amplitude values’ input image to a color image. Since the problem considered in this article concerns the connection of pseudo-colorization with the filtration of graphic data contained in the image, a quadratic function was proposed as a function of transforming the amplitude values of image pixels in grayscale into the RGB color space. For this function, parameters must also be determined as for the exponential function, determining its shape and position on the axis of the image pixel amplitude values on the grayscale. Since the characteristic of the image after pseudo-colorization using the exponential function should be preserved (image coloring), the appropriate parameters of the quadratic function ( x 1 K and x 2 K ) should be related to the corresponding parameters of the exponential function ( x 1 E and x 2 E ,). Taking into account the shape of the quadratic function, the values of these parameters should not be equal (Figure 4), because the colors of the image will change significantly. The remaining parameters C K , F K and B K of the quadratic transformation function should be equal to the parameter values as for the exponential function, i.e., C K = C E , F K = F E and B K = B E . For the conditions adopted in this way, the next stage of the algorithm determines the value of the average deviation d E K A K m for m = 0 in accordance with relationship (13), i.e., for the case when x 1 K = x 1 E and x 2 K = x 2 E (Figure 4). This is the initial value to which the value of d E K A K m calculated for ( m + 1 ) is compared. Increasing the m parameter by “1” increment reduces the range of the function, i.e., x 1 K and x 2 K . Then, the formula
d E K A K m < d E K A K m + 1 ,
is checked. If Formula (16) is not met, the average deviation is iteratively calculated until condition (16) is met. The value of m for which Formula (16) is met clearly determines x 1 K and x 2 K and thus the width of the interval (the range of the quadratic function) A K . It should be noted that the process of determining the A K value must be carried out three times, i.e., for each R, G and B channel separately.
The selection of the values of the parameters of the exponential function, and therefore of the quadratic function, must be preceded by the analysis of the pixel amplitudes of the pseudo-colored image. The maxima of the function should correspond to the pixel amplitude values of graphic data (grayscale image), which are to be exposed in the pseudo-colorization process, i.e., filtered from the disturbance background. Since graphic data in its original form are not built from pixels with the same amplitude values (the influence of the information transfer channel and intra-channel disturbances), these data are filtered out by different positions of quadratic functions for individual RGB channels on the axis of pixel amplitude values of the pseudo-colored image. In this way, image filtering and coloring are achieved, which increases the readability of the reproduced graphic data.

2.2. Experimental Settings

2.2.1. Test Images and Test System Configuration

The electromagnetic compromising emanation signals were recorded in an anechoic chamber in the arrangement shown in Figure 6. The environment inside the chamber allowed for the separation from possible sources of disturbances not coming from the tested computer sets.
Measurements of the level of emission signals and their recordings were carried out with the measurement antenna positioned at a distance of approximately 2 m and 3 m from the first and second workstations, respectively. The measurement antenna and the mentioned computer sets were placed in one line, which made it impossible to point the antenna at one selected set (Figure 7).
The research system consisted of two computer sets whose displays worked in a digital or analog standard, depending on the measurement scenario. Both commercial desktop computers and laptops were used to conduct the experiments. Various hardware configurations were used, selecting pairs of displays equipped with digital and analog video interfaces. The interaction of signals coming from images representing both text and graphic data was studied. Finally, the combinations that best illustrated the problem of overlapping images were selected to be presented in this article.
The tests were carried out for six scenarios:
  • Scenario I: monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8a), monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8b), frequency of the measured compromising emanation signal f o = 1391   M H z , reception band B W = 50   M H z ;
  • Scenario II: monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8c), monitor operating mode 1280 × 1024, VGA graphic standard (Figure 8d), frequency of the measured compromising emanation signal f o = 235   M H z , reception band B W = 50   M H z ;
  • Scenario III: monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8e), monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8f), frequency of the measured compromising emanation signal f o = 1647   M H z , reception band B W = 50   M H z ;
  • Scenario IV: monitor operating mode 1280 × 1024, VGA graphic standard (Figure 8g), monitor operating mode 1280 × 1024, VGA graphic standard (Figure 8h), frequency of the measured compromising emanation signal f o = 415   M H z , reception band B W = 50   M H z ;
  • Scenario V: monitor operating mode 1280 × 1024, VGA graphic standard (Figure 8i), monitor operating mode 1280 × 1024, VGA graphic standard (Figure 8j), frequency of the measured compromising emanation signal f o = 286   M H z , reception band B W = 50   M H z ;
  • Scenario VI: monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8k), monitor operating mode 1280 × 1024, HDMI graphic standard (Figure 8l), frequency of the measured compromising emanation signal f o = 1647   M H z , reception band B W = 50   M H z .
The reception of electromagnetic compromising emanation signals was made at frequencies at which compromising emanation signals from two computer sets occurred simultaneously, which resulted in the mutual overlap of images reflecting the data processed by these computers. In each case, due to different configurations of the computer sets, the compromising emanation signal from one of the sets was more dominant. This phenomenon caused the reproduced image to contain graphic data processed on this set with clearer shapes compared to the data processed on the other computer set (Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14). Each figure contains two images. The image on the left is an image subject to filter analysis based on the pseudo-colorization method. This is an image reconstructed from the leaking emission signal generated during the simultaneous operation of two computer sets. The image on the right is an image reconstructed from the emission signal leaking where only one of the computer sets is operating. The purpose of the filtration process is to obtain reference images.
The process of the pseudo-colorization of images reproduced in the electromagnetic infiltration process on a gray color scale is carried out in accordance with the algorithm presented in Figure 4. The output data are the values of the color components for the three R G B color channels calculated on the basis of Formula (5). The evaluation of the image filtration efficiency is carried out using the Y channel of the Y U V color space model according to the following formula [25]:
Y x m , n = 0.299 0.587 0.114 R x m , n G x m , n B x m , n .
The luminance values Y x m , n of a pixel are created by mixing the primary colors of an image pixel stored in the R G B color space.

2.2.2. Measure and Criterion for Assessing Image Filtration

To assess the effectiveness of the pseudo-colorization method based on a quadratic function in the process of filtering graphic images, its effects were compared with other digital image processing methods. These methods were:
  • Histogram extension: Histogram equalization is a non-linear operation that changes the brightness of the image so that the histogram presents an even distribution. Each pixel of the image is modified depending on the layout of the cumulative histogram, not in the same way. Equalizing the histogram gives better results than expanding. More details can be seen; the “peaks” are expanded and the “valleys” are compressed through equalization.
  • Histogram equalization: This method increases the global contrast of images, especially when the signal used to describe the image is represented by values from a small range. By extending these values to a wider range, the intensities can be better distributed on the histogram. This allows for increased contrast in fragments with a low level of contrast. The method allows for a more accurate presentation of details in overexposed or underexposed images.
  • Median filtration 3 × 3: As mentioned in the introduction, the aim of this article is to present a method of filtering low-quality images, which results from the field of operation of electromagnetic infiltration. Reproduced images from leaking emission signals contain many interferences that make it difficult to read the sought data. In the case of interference in the form of single pixels, an effective method of improving quality may be median filtering with a 3 × 3 window. Using a larger window may result in too much smoothing of the edges of graphic symbols, leading to their blurring.
  • FFT transformation and high-pass filtering with window sizes of 20 × 20, 40 × 40, 80 × 80 and 100 × 100: FFT transformation and high-pass filtering allow for the simple filtering of low-frequency components that occupy the center of the image spectrum after FFT transformation. By adjusting the window size, appropriate frequency components can be eliminated. This approach allows for filtering image noise, leaving the components that determine the information content. For the image as a whole, the effect is usually to increase contrast by emphasizing the sharp edges of objects.
  • DCT transformation and high-pass filtering with window sizes of 10 × 10, 20 × 20, 40 × 40, 80 × 80 and 100 × 100: DCT transformation is based on the cosine function. Similarly to the FFT transformation, high-pass filtering can be performed by eliminating very low-frequency components. Five windows of different sizes are used in the filtration.
  • Image colorization with the exponential function: Pseudo-colorization of the image based on the exponential transformation function from the grayscale space to the RGB color space allows for image colorization, emphasizing certain areas of the analyzed image. The method also allows for a certain level of filtration of such an image. However, due to the shape of the function, filtration during its use is not fully effective, hence the proposal to use a quadratic function as a transformation function.
The above methods are used in the electromagnetic infiltration process to assess and classify electromagnetic compromising emanation sources. The reconstructed image was subjected each time to the above-mentioned transformations. The effect of processing was assessed using the measure proposed by the authors of this article, which was the modified S S I M . This measure is described by Formula (18):
S S I M = μ x α · σ x β · c o r r x y γ ,
μ x α = 1 M · N m , n = 0 M 1 , N 1 x m , n α ,
σ x β = m , n = 0 M 1 , N 1 x m , n μ x 2 M · N β ,
c o r r x γ = m , n = 0 M 1 , N 1 x m , n μ x · y m , n μ y m , n = 0 M 1 , N 1 x m , n μ x 2 · m , n = 0 M 1 , N 1 y m , n μ y 2 γ ,
μ y = 1 M · N m , n = 0 M 1 , N 1 y m , n ,
  • M —horizontal size of the analyzed (pattern) image;
  • N —vertical size of the analyzed (pattern) image;
  • x m , n —amplitude of the analyzed image pixel with coordinates n , m ;
  • y m , n —amplitude of the pattern image pixel with coordinates n , m .
The weights of the individual components of the proposed measure, described as α, β and γ, determine the contribution of luminance μ x α , contrast σ x β and cross-correlation c o r r x γ in the calculated S S I M value.
The specificity of the analysis of images reproduced in the process of electromagnetic infiltration, particularly related to the poor quality of these images, requires an appropriate balance of the participation of the three above-mentioned factors of S S I M . The authors proposed the following weight values:
α = 0.1 , β = 1.1 , γ = 3.0 ,
which were used in further image filtration analyses using the pseudo-colorization method. It should be noted that a higher modified S S I M value indicates a greater similarity of the filtered image to the image used as a pattern image in the analysis.
The pseudo-colorization method proposed by the authors is primarily used in the area of obtaining graphic data reconstructed on the basis of recorded electromagnetic compromising emanations. This is an area in which the reproduced data in the form of images are accompanied by various types of interference, causing difficulties in reading or searching for important data. Nevertheless, the method can be used in other areas of image analysis where it is necessary to sharpen graphical information from many data samples. This includes, among others, medical images, images of the Earth and others, which in their original form appear in shades of gray. The presented pseudo-colorization algorithm allows the full manipulation of RGB color values. This means that, depending on the needs, certain pixel amplitude values can be exposed and others suppressed, and the image is transformed into the RGB color space, increasing the perception of the data contained in it. Available image colorization methods are based on pre-defined RGB color palettes (e.g., Hot, Radar, Spring [38]), for which it is only possible to change the width of the range of individual colors in a given palette. The analysis results presented in [38] showed that this solution is not effective when trying to increase the level of perceptibility of graphic data or filtering it.

3. Results and Discussion

3.1. Input Data of Analyses

In the analyses of the effectiveness of the pseudo-colorization method in filtering graphic data, the images presented in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14 were used. The values of the R G B color channels were determined based on exponential and quadratic functions. According to the processing algorithm (Figure 4), in the pseudo-colorization process, the input data were the parameters of the exponential function for individual images. Based on this, also in accordance with the algorithm described in Section 2.1, the parameters of the quadratic function were determined. The modified S S I M was used as a measure for assessing filtration efficiency, and maximizing the value of this measure was adopted as a criterion.
Images reproduced from electromagnetic compromising emanation signals very often contain elements that are not useful in the process of their analysis (reading the content). These are most often accompanying elements related to the source software used on the computer and may cover a significant part of the playback area. These elements are:
  • Graphics program window (text editor);
  • Areas not used in the graphics (text editing) program that are outside the editing sheet;
  • Lines related to the synchronization signals of the eavesdropped monitor;
  • Other graphics affecting the size of the area occupied by useful data.
The above elements may significantly negatively affect the components of luminance μ x α , contrast σ x β and cross-correlation c o r r x γ of the measure determined by Formula (17). Hence, further analyses were performed for two cases:
According to the adopted algorithm (Figure 4), an important element of image pseudo-colorization is determining the parameters of the exponential function E x . Then, for the shape and position of the function determined in this way, the width A K of the quadratic function K x should be determined in accordance with Formula (10) and the criterion m i n σ E K A K m . The determined values of the parameters A E (i.e., x 1 E and x 2 E ), C E , F E and B E of the exponential function E x and the quadratic function K x are presented in Table 1, Table 2 and Table 3.
The parameters A K and therefore x 1 K and x 2 K were determined based on Formula (13) for the condition m i n d E K A K m . The variability in the value of the d E K A K m parameter is presented in Table 4, Table 5, Table 6, Table 7, Table 8 and Table 9 for the input data A E = 50 , 90 , 100 , 150 , 180 , 250 included in Table 1, Table 2 and Table 3. The minimum values of d E K indicated the A K values of the quadratic function, which was used to determine the pixel amplitudes of the pseudo-colored image.

3.2. Output Data of Analyses

The pseudo-colorization process and its effects primarily involve the analysis of images and the assessment of the effectiveness of the process in terms of the level (in these specific cases, increasing this level) of the perceptibility of the data contained in the analyzed images. In the area of digital image processing, the first assessment of the effectiveness of the methods used by humans is visual assessment. The next stage is to confirm or not the initial assessment with a quantitative assessment. This assessment is the value of the S S I M parameter.
Detailed analysis results regarding the form of the obtained images after transformations (Figure 21) were limited to the images from Figure 9, while the numerical data of the modified S S I M values for each analyzed image are presented in Table 10, Table 11, Table 12, Table 13, Table 14 and Table 15.
Figure 21 shows the effect of using digital image processing methods aimed at filtering them and increasing the level of perception. Additionally, examples of the DCT and FFT spectrum of the image and the DCT and FFT spectrum with a 40 × 40 filter window are presented. The methods used in the analyses are listed in Table 10, Table 11, Table 12, Table 13, Table 14 and Table 15.
Figure 22 shows images corresponding to the image in Figure 9a after pseudo-colorization based on exponential and quadratic functions. The values of the S S I M parameter for this image are included in Table 10 and on Figure 23. When performing visual analysis, it is difficult to assess which of the pseudo-coloring functions is more effective. Certainly, the use of each function results in obtaining an image with a higher level of perception and filtering out interference. The analyzed image is an example of an image in which the presence of graphics unrelated to information useful from the point of view of electromagnetic infiltration has a significant impact on the values of the S S I M parameter, determining the superiority of the quadratic function over the exponential one. However, the appropriate limitation of the area of the analyzed image (Figure 15) shows that the choice of the quadratic function is correct and the difference in the value of the S S I M parameter is greater than 16.
The next analyzed image was the one shown in Figure 10a. Similarly to the image in Figure 9a, it was subjected to the transformations listed in Table 11 and on Figure 24. As a result of pseudo-colorization, the images shown in Figure 25 were obtained. S S I M values calculated for both the entire image and its fragment are higher for the quadratic function than for the exponential function.
It should also be noted that for the image fragment, the values obtained (for both the quadratic and exponential functions) are more than twice as large. This proves the higher structural similarity of the image to the pattern.
Subsequent images transformed in accordance with the algorithm presented in Figure 4 confirm the approach proposed by the authors to the issue of image filtration in connection with their pseudo-coloring. In each case (the images differ in the graphic structure of the data contained), the SSIM values calculated for the quadratic function in relation to image fragments are higher than the values of this parameter calculated for the exponential function (Table 12, Table 13, Table 14 and Table 15, Figure 26, Figure 27, Figure 28, Figure 29, Figure 30, Figure 31, Figure 32 and Figure 33). Analysis of image fragments makes it possible to become independent from unwanted interference that does not carry any useful information (Figure 26, Figure 28, Figure 30 and Figure 32) and makes it difficult to perceive the data you are looking for. This is often caused by a much stronger electromagnetic disturbance, which, in the reproduced image, is presented in the form of high-brightness pixels (very often the amplitudes of such pixels reach values of 255). At the same time, S S I M values for image fragments refer to image areas that contain data fully correlated with the processed information on the monitored graphic display.
In the case of images that are obtained as a result of other human activity, the analysis of image fragments (the ability to focus on an important part increases the level of perception) and its filtration using the pseudo-colorization method can increase the level of detection of any threats related to human health and safety.
The analysis concerned the determination of the modified S S I M value for the image filtration methods listed in Table 10, Table 11, Table 12, Table 13, Table 14 and Table 15 including the pseudo-colorization method using the exponential function and the quadratic function. The obtained results indicate that the quadratic function has better filtering properties in terms of graphic data contained in images. At the same time, the values of the modified S S I M draw attention to a very important aspect of processing images containing interference in the form of various graphic forms unrelated to the processed data. Removing them by limiting the size of the analyzed image area significantly improves the numerical values of the modified S S I M measure. This, in turn, allows us to clearly indicate the proposed method based on a quadratic function as effective in filtering graphic data.
Table 16 shows the cases for which a quadratic function or an exponential function achieves better filtering properties. The “+” sign indicates the highest modified S S I M value obtained, calculated for the entire image and its fragment for the exponential function and quadratic function.

4. Conclusions

This article presents the possibility of using the pseudo-colorization method to improve the quality (level of visual perception) of images acquired in the electromagnetic infiltration process, both by using color and filtering important graphic data. The pseudo-colorization method involves the use of an exponential function in the transformation of the gray color space into the R G B color space. The effectiveness of this approach to the pseudo-colorization problem was demonstrated in [38]. The authors of this article proposed a modified solution based on the use of a quadratic function as a transformation function of the pixel amplitude values of the image reproduced in the R G B color space. Each of the functions, the exponential function E x and the quadratic function K x , is characterized by four basic parameters: the width of the shapes A E and A K , the maximum value, the minimum value and offset on the pixel amplitude value axis for a grayscale image. The determination of the shape width parameter of the quadratic function K x in relation to the width of the exponential function E x , while maintaining the remaining parameters, was based on the parameter of average deviation. The choice of a quadratic function as a better alternative to the exponential function was related to the properties of the shape of the function on the edges of the transition between the background and the graphic symbol contained in the image. The increase in the value of the K x function with an increase in the parameter n is faster than for the exponential function E x , so its filtering properties may be better. This means that a filter based on a quadratic function is a “sharper” filter. As a result, the pseudo-colorization process for the quadratic transformation function more clearly marks the boundaries between the image background and the graphic data contained in it. The exponential function introduces smooth transitions and the filtered graphic shapes become blurred at the above-mentioned background-graphic symbol boundaries.
Comparative analyses, in terms of the filtration efficiency of graphic data contained in images reproduced for two shapes of the transformation function of the gray color space into the R G B color space, were carried out for six images. The selected images differ in their data structure and information content. In addition, appropriate calculations were performed for entire images and their fragments containing the most important data from the point of view of obtaining information. In this way, image areas strongly disturbed by elements whose information content is very low were eliminated from the analysis. The modified S S I M was adopted as a measure for assessing the effectiveness of the proposed method, the maximum value of which for a given analyzed case (image) is a criterion for the acceptance of the method’s superiority over other data filtration methods. The modification of S S I M consisted in adopting different weights of α, β and γ for the product of the luminance, contrast and correlation coefficients between two images, respectively.
The weight values of the luminance, contrast and cross-correlation parameters were selected in a way that allows for a greater share of contrast and cross-correlation in the value of the S S I M parameter. The contrast is primarily related to the quadratic transformation function used. Cross-correlation allows you to avoid the significant impact of disturbing elements in the evaluation of images, which is primarily visible in the analysis of image fragments subject to the filtering process using pseudo-colorization.
The obtained values of the modified S S I M show that the proposed pseudo-colorization method based on the quadratic function and the values of the weights α, β and γ give better results than the exponential function. This applies in particular to analysis limited to image fragments.
As mentioned, the analyses carried out were based on six images with different graphic structures. Modified S S I M values were calculated for each analyzed image (the entire image and its fragment) subjected to the pseudo-colorization process based on exponential and quadratic functions. The obtained S S I M values clearly indicate the superiority of pseudo-colorization with a quadratic function over an exponential function (and thus the effectiveness of image filtration) for image fragments containing important data from the point of view of electromagnetic infiltration. The S S I M values are 74.1662 and 90.7066 (Figure 9a), 53.6008 and 53.6008 (Figure 10a), 107.3398 and 110.7675 (Figure 11a), 90.6850 and 93.4778 (Figure 12a), 57.5672 and 63.0758 (Figure 13a) and 31.2217 and 32.1216 (Figure 14a), for the exponential and quadratic functions, respectively. The results of the analysis of whole images depends on the graphic content, which does not constitute information about the processed data. Most often, these are interferences related to the operation of graphic channels, i.e., they are signals correlated with signals related to data display parameters on graphic displays.
Further work in the area presented in this article will focus on the development of an algorithm for automating the process of pseudo-colorization and filtering images. This will allow the development of an additional application module of the Software Raster Generator supporting the analysis of images reproduced from compromising emanation signals. Additionally, analyses of the effectiveness of using other functions of transforming the gray color space into the R G B space will be carried out. These functions can be, e.g., a triangular or rectangular function or the sum of these functions and functions already analyzed (exponential and quadratic functions). In such a case, for each R G B channel, it will be possible to expose several areas of the pixel amplitude values of the filtered image above the background.

Author Contributions

Conceptualization, I.K. and A.P.; methodology, I.K. and A.P.; software, I.K.; validation, A.P.; formal analysis, I.K. and A.P.; investigation, I.K.; resources, I.K. and A.P.; data curation, I.K. and A.P.; writing—original draft preparation, I.K.; writing—review and editing, I.K. and A.P.; visualization, I.K.; supervision, I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Maneki, S. Learning from the Enemy. In The GUNMAN Project, Series VI; NSA: Meade, MD, USA, 2009; Volume 13. [Google Scholar]
  2. Johnson, T.R. American Cryptology during the Cold War, 1945–1989, series VI, Book I. In The Struggle for Centralization; NSA: Washington, DC, USA, 1995; Volume 5, pp. 1945–1960. [Google Scholar]
  3. Johnson, T.R. American Cryptology during the Cold War, 1945–1989, series VI, Volume 5, Book III. In Retrenchment and Reform; NSA: Washington, DC, USA, 1998; pp. 1972–1980. [Google Scholar]
  4. Johnson, T.R. American Cryptology during the Cold War, 1945–1989, series VI, Volume 5, Book IV. In Cryptology Rebirth; NSA: Washington, DC, USA, 1999; pp. 1981–1989. [Google Scholar]
  5. Aydın, H. Tempest Attacks and Cybersecurity. Int. J. Eng. Technol. 2019, 5, 100–104. [Google Scholar]
  6. Zhang, N.; Lu, Y.; Cui, Q.; Wang, Y. Investigation of Unintentional Video Emanations from a VGA Connector in the Desktop Computers. IEEE Trans. Electromagn. Compat. 2017, 59, 1826–1834. [Google Scholar] [CrossRef]
  7. Chen, Y.; Huang, K.; Zhou, Y.; Ma, K.; Jin, H.; Xu, X. Physical Layer Key Generation Scheme through Scrambling the Correlated Eavesdropping Channel. IEEE Access 2020, 8, 48982–48990. [Google Scholar] [CrossRef]
  8. Song, T.L.; Jong-Gwan, Y. Study of jamming countermeasure for electromagnetically leaked digital video signals. In Proceedings of the IEEE International Symposium on Electromagnetic Compatibility, Gothenburg, Sweden, 1–4 September 2014. [Google Scholar] [CrossRef]
  9. Maxwell, M.; Funlade, S.; Lauder, D. Unintentional Compromising Electromagnetic Emanations from IT Equipment: A Concept Map of Domain Knowledge. Procedia Comput. Sci. 2022, 200, 1432–1441. [Google Scholar]
  10. Kuhn, M.G. Electromagnetic eavesdropping risks of at-panel displays. In Proceedings of the 4th Workshop on Privacy Enhancing Technologies, Toronto, ON, Canada, 26–28 May 2004; pp. 88–105. [Google Scholar]
  11. Kuhn, M.G. Compromising Emanations: Eavesdropping Risks of Computer Displays; University of Cambridge Computer Laboratory: Cambridge, UK, 2003. [Google Scholar]
  12. Guri, M.; Elovici, Y. Exfiltration of information from air-gapped machines using monitor’s LED indicator. In Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, Washington, DC, USA, 24–26 September 2014; pp. 264–267. [Google Scholar]
  13. Tanaka, H. Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. In Proceedings of the 3rd International Conference Information Systems Security, New Delhi, India, 16–20 December 2007; pp. 167–179. [Google Scholar]
  14. Boitan, A.; Kubiak, I.; Halunga, S.; Przybysz, A.; Stańczak, A. Method of colors and secure fonts in aspect of source shaping of valuable emissions from projector in electromagnetic eavesdropping process. Symmetry 2020, 12, 1908. [Google Scholar] [CrossRef]
  15. Kubiak, I.; Loughry, J. LED Arrays of Laser Printers as Valuable Sources of Electromagnetic Waves for Acquisition of Graphic Data. Electronics 2019, 8, 1078. [Google Scholar] [CrossRef]
  16. Kubiak, I. The Influence of the Structure of Useful Signal on the Efficacy of Sensitive Emission of Laser Printers. Measurement 2018, 119, 63–74. [Google Scholar] [CrossRef]
  17. Hayashi, Y.-I.; Homma, N.; Watanabe, T.; Price, W.O.; Radasky, W.A. Introduction to the special section on electromagnetic information security. IEEE Trans. Electromagn. Compat. 2013, 55, 539–546. [Google Scholar] [CrossRef]
  18. Kubiak, I.; Przybysz, A. Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays. Appl. Sci. 2022, 12, 5281. [Google Scholar] [CrossRef]
  19. Liu, N.; Zhang, N.; Shao, L.; Han, J. Learning Selective Mutual Attention and Contrast for RGB-D Saliency Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 44, 9026–9042. [Google Scholar] [CrossRef] [PubMed]
  20. Mahshid, Z.; Saeedeh, H.T.; Ayaz, G. Security limits for Electromagnetic Radiation from CRT Display. In Proceedings of the Second International Conference on Computer and Electrical Engineering, Dubai, United Arab Emirates, 28–30 January 2009; pp. 452–456. [Google Scholar]
  21. Kubiak, I.; Przybysz, A.; Musial, S. Possibilities of electromagnetic penetration of displays of multifunction devices. Computers 2020, 9, 62. [Google Scholar] [CrossRef]
  22. Liu, J.-J.; Hou, Q.; Liu, Z.-A.; Cheng, M.-M. PoolNet+: Exploring the Potential of Pooling for Salient Object Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 45, 887–904. [Google Scholar] [CrossRef] [PubMed]
  23. Czerwinski, R.N.; Jones, D.L.; O’Brien, W.D. Detection of Lines and Boundaries in Speckle Images—Application to Medical Ultrasound. IEEE Trans. Med. Imaging 1999, 18, 126–136. [Google Scholar] [CrossRef] [PubMed]
  24. Husien Amer, G.M.; Abushaala, A.M. Edge detection methods. In Proceedings of the 2nd World Symposium on Web Applications and Networking (WSWAN), Sousse, Tunisia, 21–23 March 2015. [Google Scholar] [CrossRef]
  25. Zohaib, H.; Chunyan, W. Edge detection using histogram equalization and multi-filtering process. In Proceedings of the IEEE International Symposium of Circuits and Systems (ISCAS), Rio de Janeiro, Brazil, 15–18 May 2011. [Google Scholar] [CrossRef]
  26. Zhongshui, Q.; Jianwei, W. A color YUV image edge detection method based on histogram equalization transformation. In Proceedings of the Sixth International Conference on Natural Computation, Yantai, China, 10–12 August 2010. [Google Scholar] [CrossRef]
  27. MacDonald, L.W. Using color effectively in computer graphics. IEEE Comput. Graph. Appl. 1999, 19, 20–35. [Google Scholar] [CrossRef]
  28. Murch, G.M. Physiological principles for the effective use of color. IEEE Comput. Graph. Appl. 1984, 4, 48–55. [Google Scholar] [CrossRef]
  29. Kubiak, I. Influence of the Method of Colors on Levels of Electromagnetic Emissions from Video Standards. IEEE Trans. Electromagn. Compat. 2019, 61, 1129–1137. [Google Scholar] [CrossRef]
  30. Mao, J.; Liu, P.; Liu, J.; Shi, S. Identification of Multi-Dimensional Electromagnetic Information Leakage Using CNN. IEEE Access 2019, 7, 145714–145724. [Google Scholar] [CrossRef]
  31. De Meulemeester, P.; Scheers, B.; Vandenbosch, G.A. Reconstructing Video Images in Color Exploiting Compromising Video Emanations. In Proceedings of the 2020 International Symposium on Electromagnetic Compatibility—EMC EUROPE, Rome, Italy, 23–25 September 2020. [Google Scholar] [CrossRef]
  32. Kitazawa, T.; Arai, K.; Kim, Y.; Fujimoto, D.; Hayashi, Y. A Novel Remote Visualization of Screen Images Against High-Resolution Display with Divided Screens Focusing on the Difference of Transfer Function of Multiple Emanations. IEEE Trans. Electromagn. Compat. 2022, 64, 1941–1948. [Google Scholar] [CrossRef]
  33. Faming, F.; Wang, T.; Wang, Y.; Zeng, T.; Zhang, G. Variational Single Image Dehazing for Enhanced Visualization. IEEE Trans. Multimed. 2020, 22, 2537–2550. [Google Scholar] [CrossRef]
  34. Zhang, L.; Zhang, L.; Mou, X.; Zhang, D. FSIM: A feature similarity index for image quality assessment. IEEE Trans. Image Process. 2011, 20, 2378–2386. [Google Scholar] [CrossRef] [PubMed]
  35. Panetta, K.; Gao, C.; Agaian, S. No Reference Color Image Contrast and Quality Measures. IEEE Trans. Consum. Electron. 2013, 59, 643–651. [Google Scholar] [CrossRef]
  36. Kim, M.; Song, K.S.; Kang, M.G. No-Reference Contrast Measurement for Color Images Based on Visual Stimulus. IEEE Access 2018, 6, 23678–23687. [Google Scholar] [CrossRef]
  37. Bal, A. Comparison of selected contrast evaluation methods of grey level images. PAK 2010, 56, 501–503. [Google Scholar]
  38. Kubiak, I.; Przybysz, A. Pseudo-Coloring as an Effective Tool to Improve the Readability of Images Obtained in an Electromagnetic Infiltration Process. Appl. Sci. 2023, 13, 9496. [Google Scholar] [CrossRef]
  39. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error measurement to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed]
  40. Morra, L.; Piano, L.; Lamberti, F.; Tommasi, T. Bridging the gap between Natural and Medical Images through Deep Colorization. In Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 835–842. [Google Scholar]
  41. Hong-An, L.; Fan, J.; Yu, K.; Qi, X.; Wen, Z.; Hua, Q.; Zhang, M.; Zheng, Q. Medical Image Coloring Based on Gabor Filtering for Internet of Medical Things. IEEE Access 2020, 8, 104016–104025. [Google Scholar] [CrossRef]
  42. Zeng, X.; Tong, S.; Lu, Y.; Xu, L.; Huang, Z. Adaptive Medical Image Deep Color Perception Algorithm, Special Section on Deep Learning Algorithms for Internet of Medical Thongs. IEEE Access 2020, 8, 56559–56571. [Google Scholar] [CrossRef]
  43. Kuo-Liang, C.; Tsu-Chun, H.; Chi-Chao, H. Joint Chroma Subsampling and Distortion-Minimization-Based Luma Modification for RGB Color Images with Application. IEEE Trans. Image Process. 2017, 26, 4626–4638. [Google Scholar] [CrossRef]
  44. Wenhui, W.; Wang, A.; Liu, C. Variational Single Nighttime Image Haze Removal with a Gray Haze-Line Prior. IEEE Trans. Image Process. 2022, 31, 1349–1363. [Google Scholar] [CrossRef]
  45. Yang, Y.; Zhu, M.; Wang, Y.; Yang, H.; Wu, Y.; Li, B. Super-Resolution Reconstruction of Cell Pseudo-Color Image Based on Raman Technology. Sensors 2019, 19, 4076. [Google Scholar] [CrossRef] [PubMed]
  46. Fang, R.; Zeng, L.; Yi, F. Analysis of Compound Stained Cervical Cell Images Using Multi-Spectral Imaging. Appl. Sci. 2021, 11, 5628. [Google Scholar] [CrossRef]
  47. Guo, H.; Wang, X.; Li, H. Density Estimation of Fog in Image Based on Dark Channel Prior. Atmosphere 2022, 13, 710. [Google Scholar] [CrossRef]
  48. Morales-Aguilar, S.; Kasmi, C.; Meriac, B.; Vega, F.; Alyafei, F. Digital Images Preprocessing for Optical Character Recognition in Video Frames Reconstructed from Compromising Electromagnetic Emanations from Video Cables. In Proceedings of the 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science, Rome, Italy, 29 August–5 September 2020. [Google Scholar] [CrossRef]
  49. Hu, Y.; Li, Y.; Pan, Z. A Dual-Polarimetric SAR Ship Detection Dataset and a Memory-Augmented Autoencoder-Based Detection Method. Sensors 2021, 21, 8478. [Google Scholar] [CrossRef] [PubMed]
  50. Abidi, B.; Zheng, Y.; Gribok, A.; Abidi, M. Screener Evaluation of Pseudo-Colored Single Energy X-ray Luggage Images. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), San Diego, CA, USA, 21–23 September 2005. [Google Scholar]
  51. Xiaodong, Z.; Chunhua, Z.; Song, L. A perceptive uniform pseudo-color coding method of SAR images. In Proceedings of the CIE International Conference on Radar, Shanghai, China, 16–19 October 2006. [Google Scholar]
  52. Al-khafaji, K.H.; Abd al Jaleel Al-Yasiri, L. Frontal Chest X-Ray Image Colorization Using Various Mathematical Experimental Equations. J. Kufa Phys. 2019, 11, 90–100. [Google Scholar] [CrossRef]
  53. Shi, X.Q.; Sallstrom, P.; Welander, U. A Color Coding Method for Radiographic Images. Image Vis. Comput. 2002, 20, 761–767. [Google Scholar] [CrossRef]
  54. Fan, J.; Aref, W.G.; Hacid, M. An improved automatic isotropic color edge detection technique. Pattern Recognit. Lett. 2001, 22, 1419–1429. [Google Scholar] [CrossRef]
  55. Viana, M.S.; Junior, O.M.; Contreras, R.C. An Improved Local Search Genetic Algorithm with a New Mapped Adaptive Operator Applied to Pseudo-Coloring Problem. Symmetry 2020, 12, 1684. [Google Scholar] [CrossRef]
  56. Guri, M. Leaking Data from Air-Gapped Computers Using Wi-Fi Frequencies. In Proceedings of the IEEE Transaction on Dependable and Secure Computing, Online, 27 June 2022. [Google Scholar] [CrossRef]
Figure 1. An example of an exponential function.
Figure 1. An example of an exponential function.
Electronics 12 04583 g001
Figure 2. An example shape of a quadratic function.
Figure 2. An example shape of a quadratic function.
Electronics 12 04583 g002
Figure 3. Comparison of the shapes of the exponential function E x (red color) and the quadratic function K x (black color) for equal parameters of both functions: A E = A K , x 1 E = x 1 K , x 2 E = x 2 K , C E = C K , F E = F K and B E = B K .
Figure 3. Comparison of the shapes of the exponential function E x (red color) and the quadratic function K x (black color) for equal parameters of both functions: A E = A K , x 1 E = x 1 K , x 2 E = x 2 K , C E = C K , F E = F K and B E = B K .
Electronics 12 04583 g003
Figure 4. Algorithm for determining the value of the width of the quadratic function of each R G B component for input data specified for the exponential function.
Figure 4. Algorithm for determining the value of the width of the quadratic function of each R G B component for input data specified for the exponential function.
Electronics 12 04583 g004
Figure 5. Comparison of the shapes of the exponential function E x (red color) and the quadratic function K x (black kolor) for the parameters of the exponential function equal to A E , x 1 E , x 2 E , C E , F E and B E and the quadratic function equal to A K M , x 1 K M , x 2 K M , C K = C E , F K = F E and B K = B E determined for the condition defined by Formula (13).
Figure 5. Comparison of the shapes of the exponential function E x (red color) and the quadratic function K x (black kolor) for the parameters of the exponential function equal to A E , x 1 E , x 2 E , C E , F E and B E and the quadratic function equal to A K M , x 1 K M , x 2 K M , C K = C E , F K = F E and B K = B E determined for the condition defined by Formula (13).
Electronics 12 04583 g005
Figure 6. Test setup.
Figure 6. Test setup.
Electronics 12 04583 g006
Figure 7. Location of computer sets relative to the measurement antenna.
Figure 7. Location of computer sets relative to the measurement antenna.
Electronics 12 04583 g007
Figure 8. Graphical data displayed on computer sets when compromising emanations were measured for six scenarios.
Figure 8. Graphical data displayed on computer sets when compromising emanations were measured for six scenarios.
Electronics 12 04583 g008
Figure 9. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 1391   M H z , bandwidth B W = 50   M H z .
Figure 9. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 1391   M H z , bandwidth B W = 50   M H z .
Electronics 12 04583 g009
Figure 10. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 235   M H z , bandwidth B W = 50   M H z .
Figure 10. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 235   M H z , bandwidth B W = 50   M H z .
Electronics 12 04583 g010
Figure 11. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 1647   M H z , bandwidth B W = 50   M H z .
Figure 11. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 1647   M H z , bandwidth B W = 50   M H z .
Electronics 12 04583 g011
Figure 12. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 415   M H z , bandwidth B W = 50   M H z .
Figure 12. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 415   M H z , bandwidth B W = 50   M H z .
Electronics 12 04583 g012
Figure 13. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 286   M H z , bandwidth B W = 50   M H z .
Figure 13. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 286   M H z , bandwidth B W = 50   M H z .
Electronics 12 04583 g013
Figure 14. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 1647   M H z , bandwidth B W = 50   M H z .
Figure 14. (a) An image subject to filtration analysis based on the pseudo-colorization method and (b) a pattern image, receiving frequency f o = 1647   M H z , bandwidth B W = 50   M H z .
Electronics 12 04583 g014
Figure 15. Fragments of the images presented in Figure 9: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Figure 15. Fragments of the images presented in Figure 9: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Electronics 12 04583 g015
Figure 16. Fragments of the images presented in Figure 10: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Figure 16. Fragments of the images presented in Figure 10: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Electronics 12 04583 g016
Figure 17. Fragments of the images presented in Figure 11: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Figure 17. Fragments of the images presented in Figure 11: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Electronics 12 04583 g017
Figure 18. Fragments of the images presented in Figure 12: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Figure 18. Fragments of the images presented in Figure 12: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Electronics 12 04583 g018
Figure 19. Fragments of the images presented in Figure 13: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Figure 19. Fragments of the images presented in Figure 13: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Electronics 12 04583 g019
Figure 20. Fragments of the images presented in Figure 14: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Figure 20. Fragments of the images presented in Figure 14: (a) subject to filtration analysis based on the pseudo-colorization method, (b) a pattern image.
Electronics 12 04583 g020
Figure 21. The image from Figure 9a after transformations: (a) histogram extension; (b) histogram equalization; (c) FFT spectrum of the image; (d) FFT spectrum of the image with a 40 × 40 filter window, FFT transform, high-pass filter window: (e) 20 × 20, (f) 40 × 40, (g) 80 × 80, (h) 100 × 100; (i) DCT spectrum of the image; (j) DCT spectrum of the image with a 40 × 40 filter window, DCT transform, high-pass filter window: (k) 10 × 10, (l) 20 × 20, (m) 80 × 80, (n) 100 × 100.
Figure 21. The image from Figure 9a after transformations: (a) histogram extension; (b) histogram equalization; (c) FFT spectrum of the image; (d) FFT spectrum of the image with a 40 × 40 filter window, FFT transform, high-pass filter window: (e) 20 × 20, (f) 40 × 40, (g) 80 × 80, (h) 100 × 100; (i) DCT spectrum of the image; (j) DCT spectrum of the image with a 40 × 40 filter window, DCT transform, high-pass filter window: (k) 10 × 10, (l) 20 × 20, (m) 80 × 80, (n) 100 × 100.
Electronics 12 04583 g021
Figure 22. The image from Figure 9a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Figure 22. The image from Figure 9a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Electronics 12 04583 g022
Figure 23. A chart showing the numerical values included in Table 10.
Figure 23. A chart showing the numerical values included in Table 10.
Electronics 12 04583 g023
Figure 24. A chart showing the numerical values included in Table 11.
Figure 24. A chart showing the numerical values included in Table 11.
Electronics 12 04583 g024
Figure 25. The image from Figure 10a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Figure 25. The image from Figure 10a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Electronics 12 04583 g025
Figure 26. The image from Figure 11a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Figure 26. The image from Figure 11a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Electronics 12 04583 g026
Figure 27. A chart showing the numerical values included in Table 12.
Figure 27. A chart showing the numerical values included in Table 12.
Electronics 12 04583 g027
Figure 28. The image from Figure 12a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Figure 28. The image from Figure 12a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Electronics 12 04583 g028
Figure 29. A chart showing the numerical values included in Table 13.
Figure 29. A chart showing the numerical values included in Table 13.
Electronics 12 04583 g029
Figure 30. The image from Figure 13a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Figure 30. The image from Figure 13a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Electronics 12 04583 g030
Figure 31. A chart showing the numerical values included in Table 14.
Figure 31. A chart showing the numerical values included in Table 14.
Electronics 12 04583 g031
Figure 32. The image from Figure 14a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Figure 32. The image from Figure 14a after application of the pseudo-colorization method for the transformation functions of (a) the exponential and (b) the quadratic values of the pixel amplitudes.
Electronics 12 04583 g032
Figure 33. A chart showing the numerical values included in Table 15.
Figure 33. A chart showing the numerical values included in Table 15.
Electronics 12 04583 g033
Table 1. Parameters of the exponential function E x and the quadratic function K x for the R channel, used to transform the pixel amplitude values of the grayscale color space into the R G B color space for the images in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14.
Table 1. Parameters of the exponential function E x and the quadratic function K x for the R channel, used to transform the pixel amplitude values of the grayscale color space into the R G B color space for the images in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14.
Function
Parameters
Figure 9Figure 10Figure 11Figure 12Figure 13Figure 14
E x K x E x K x E x K x E x K x E x K x E x K x
x 1 E ( x 1 K )801001141361101508012070110100122
x 2 E ( x 2 K )170150214192290250260220250210200172
A E ( A K )90501005618010018010018010010056
C E ( C K )255255255255255255255255255255255255
F E ( F K )0 *0 *0 *0 *0 *0 *0 *0 *0 *0 *0 *0 *
B E ( B K )125125164164200200170170160160150150
*—values F E and F K of functions E x and K x in ranges x 0 , x 1 E x 2 E , 255 or x 0 , x 1 K x 2 K , 255 .
Table 2. Parameters of the exponential function E x and the quadratic function K x for the G channel, used to transform the pixel amplitude values of the grayscale color space into the R G B color space for the images in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14.
Table 2. Parameters of the exponential function E x and the quadratic function K x for the G channel, used to transform the pixel amplitude values of the grayscale color space into the R G B color space for the images in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14.
Function
Parameters
Figure 9Figure 10Figure 11Figure 12Figure 13Figure 14
E x K x E x K x E x K x E x K x E x K x E x K x
x 1 E ( x 1 K )276059701570278223781573
x 2 E ( x 2 K )17714410998265210277222273218275277
A E ( A K )150845028250140250140250140260144
C E ( C K )255255255255255255255255255255255255
F E ( F K )0 *0 *0 *0 *0 *0 *0 *0 *0 *0 *0 *0 *
B E ( B K )1021028484140140152152148148145145
*—values F E and F K of functions E x and K x in ranges x 0 , x 1 E x 2 E , 255 or x 0 , x 1 K x 2 K , 255 .
Table 3. Parameters of the exponential function E x and the quadratic function K x for the B channel, used to transform the pixel amplitude values of the grayscale color space into the R G B color space for the images in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14.
Table 3. Parameters of the exponential function E x and the quadratic function K x for the B channel, used to transform the pixel amplitude values of the grayscale color space into the R G B color space for the images in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14.
Function
Parameters
Figure 9Figure 10Figure 11Figure 12Figure 13Figure 14
E x K x E x K x E x K x E x K x E x K x E x K x
x 1 E ( x 1 K )N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
x 2 E ( x 2 K )N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
A E ( A K )N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
C E ( C K )70 *70 *70 *70 *10 *10 *80 *80 *50 *50 *90 *90 *
F E ( F K )70 *70 *70 *70 *10 *10 *80 *80 *50 *50 *90 *90 *
B E ( B K )N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
*—values F E and F K of functions E x and K x in ranges x 0 , x 1 E x 2 E , 255 or x 0 , x 1 K x 2 K , 255 . N/A—for C E = F E and C K = F K . Functions E x and K x are constant and their values do not depend on parameters x 1 E , x 1 K , x 2 E , x 2 K , A E , A K , A E i C K .
Table 4. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 50 of the exponential function E x .
Table 4. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 50 of the exponential function E x .
m A K m d E K m A K m d E K m A K m d E K
05016.53805409.435710302.8783
14815.12506388.029711281.8706
24613.70307366.645912262.5316
34412.27708345.2961---
44210.85409324.0395---
Table 5. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 90 of the exponential function E x .
Table 5. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 90 of the exponential function E x .
m A K m d E K m A K m d E K m A K m d E K
09026.847087416.963016587.1681
18825.646097215.702017566.0688
28624.4310107014.442018545.0105
38423.2040116813.187019524.0446
48221.9670126611.946020503.4284
58020.7250136410.715021483.9717
67819.477014629.5000---
77618.222015608.3062---
Table 6. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 100 of the exponential function E x .
Table 6. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 100 of the exponential function E x .
m A K m d E K m A K m d E K m A K m d E K
010029.037088419.549016689.8781
19827.888098218.327017668.7406
29626.7250108017.102018647.6286
39425.5510117815.880019626.5485
49224.3660127614.662020605.5352
59023.1750137413.448021584.5753
68821.9740147212.240022563.7076
78620.7650157011.043023544.1892
Table 7. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 150 of the exponential function E x .
Table 7. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 150 of the exponential function E x .
m A K m d E K m A K m d E K m A K m d E K
015037.9261212626.2632410213.774
114837.0121312425.2352510012.760
214636.0881412224.200269811.759
314435.151512023.158279610.781
414234.2021611822.11128949.8285
514033.2461711621.06229928.8944
613832.2771811420.01530907.9915
713631.2991911218.96631887.1317
813430.3132011017.91832866.3051
913229.3162110816.87133845.5498
1013028.3072210615.83434825.8988
1112827.2902310414.801---
Table 8. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 180 of the exponential function E x .
Table 8. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 180 of the exponential function E x .
m A K m d E K m A K m d E K m A K m d E K
018041.6541415229.7882812416.552
117840.8761515028.8692912215.611
217640.0851614827.9433012014.674
317439.2821714627.0123111813.750
417238.4721814426.0743211612.840
517037.6481914225.1293311411.948
616836.8142014024.1793411211.070
716635.9702113823.2293511010.209
816435.1142213622.275361089.3766
916234.2462313421.318371068.5729
1016033.3722413220.360381047.7945
1115832.4892513019.406391027.0644
1215631.5992612818.451401006.7606
1315430.6992712617.49741987.0615
Table 9. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 250 of the exponential function E x .
Table 9. Values of the average deviation d E K A K m and width A K of quadratic function K for a given input width A E = 250 of the exponential function E x .
m A K m d E K m A K m d E K m A K m d E K
025046.1441921235.0783817421.185
124845.6542021034.4003917220.420
224645.1502120833.7164017019.660
324444.6332220633.0254116818.900
424244.112320432.3284216618.144
524043.5782420231.6214316417.390
623843.0332520030.9114416216.642
723642.4772619830.1924516015.899
823441.9132719629.4644615815.165
923241.3402819428.7324715614.442
1023040.7562919227.9944815413.731
1122840.1603019027.2504915213.030
1222639.5583118826.5025015012.341
1322438.9463218625.7515114811.674
1422238.3253318424.9945214611.025
1522037.6913418224.2355314410.394
1621837.0483518023.475541429.7947
1721636.4013617822.711551409.2366
1821435.7453717621.948561389.3501
Table 10. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 9 and Figure 15.
Table 10. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 9 and Figure 15.
A Type of Image TransformationAnalysis of Entire ImagesAnalysis of Image Fragments
1Image without transformation62.2143087644.41559036
2Histogram extension61.9649645144.39428523
3Histogram equalization110.5927163 *57.87137273 *
4Median filtering 3 × 366.4275706550.8331846
5FFT transformation and high-pass filtering20 × 20 window size1.3740613733.22144137
640 × 40 window size0.4394529081.137323642
780 × 80 window size0.2230305510.687738941
8100 × 100 window size0.1843769310.589140298
9DCT transformation and high-pass filtering10 × 10 window size5.58633380716.12400992
1020 × 20 window size1.2357242633.564110134
1140 × 40 window size0.4352273041.217007112
1280 × 80 window size0.2381544430.690460499
13100 × 100 window size0.1931861890.594737456
14Pseudo-colorization—exponential function110.8905649 **74.16620629
15Pseudo-colorization—quadratic function108.934376990.70664067 **
*—maximum value of modified S S I M for image transformations from 1 to 13 items. **—maximum value of modified S S I M for pseudo-colorization method (transformations for 14 and 15 items).
Table 11. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 10 and Figure 16.
Table 11. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 10 and Figure 16.
A Type of Image TransformationAnalysis of Entire ImagesAnalysis of Image Fragments
1Image without transformation2.56484259319.8162198
2Histogram extension2.56687008319.83121156
3Histogram equalization10.65714581 *24.07995041 *
4Median filtering 3 × 31.50755770815.3068329
5FFT transformation and high-pass filtering20 × 20 window size6.53347060217.70837157
640 × 40 window size7.17383253114.92272688
780 × 80 window size5.3320667269.864773506
8100 × 100 window size4.7176951068.862156332
9DCT transformation and high-pass filtering10 × 10 window size5.8016434618.20773913
1020 × 20 window size7.04067656521.43672255
1140 × 40 window size10.2059080922.35596197
1280 × 80 window size6.19127541514.01123133
13100 × 100 window size5.26162185310.84721382
14Pseudo-colorization—exponential function25.4828371353.6008577
15Pseudo-colorization—quadratic function25.8821422 **53.60838096 **
*—maximum value of modified S S I M for image transformations from 1 to 13 items. **—maximum value of modified S S I M for pseudo-colorization method (transformations for 14 and 15 items).
Table 12. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 11 and Figure 17.
Table 12. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 11 and Figure 17.
A Type of Image TransformationAnalysis of Entire ImagesAnalysis of Image Fragments
1Image without transformation59.99718996 *91.08796756
2Histogram extension59.915478291.14891281 *
3Histogram equalization37.5921714689.79987081
4Median filtering 3 × 355.9339253466.34285569
5FFT transformation and high-pass filtering20 × 20 window size14.1991142715.31094889
640 × 40 window size8.58233810410.8830412
780 × 80 window size5.2156325018.898050701
8100 × 100 window size3.9527541238.314354137
9DCT transformation and high-pass filtering10 × 10 window size26.3567808641.36257195
1020 × 20 window size14.9798291615.45372877
1140 × 40 window size8.27148553210.948628
1280 × 80 window size5.1487959348.760441325
13100 × 100 window size3.9244524818.481787531
14Pseudo-colorization—exponential function80.5659707107.3398241
15Pseudo-colorization—quadratic function82.8305449 **110.7675894 **
*—maximum value of modified S S I M for image transformations from 1 to 13 items. **—maximum value of modified S S I M for pseudo-colorization method (transformations for 14 and 15 items).
Table 13. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 12 and Figure 18.
Table 13. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 12 and Figure 18.
A Type of Image TransformationAnalysis of Entire ImagesAnalysis of Image Fragments
1Image without transformation42.625530659.28368261 *
2Histogram extension41.59900154 *56.48035173
3Histogram equalization24.5490083933.88031203
4Median filtering 3 × 336.8353832450.4188848
5FFT transformation and high-pass filtering20 × 20 window size30.1357321654.07756317
640 × 40 window size15.8950891524.52390787
780 × 80 window size10.7789363916.84266551
8100 × 100 window size9.36838943814.71888291
9DCT transformation and high-pass filtering10 × 10 window size31.3077349955.87887428
1020 × 20 window size30.4140868655.24359722
1140 × 40 window size16.1018192225.44827526
1280 × 80 window size10.8703535716.74417214
13100 × 100 window size9.33775232314.5609634
14Pseudo-colorization—exponential function60.8928515 **90.68509161
15Pseudo-colorization—quadratic function60.8232874893.47786244 **
*—maximum value of modified S S I M for image transformations from 1 to 13 items. **—maximum value of modified S S I M for pseudo-colorization method (transformations for 14 and 15 items).
Table 14. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 13 and Figure 19.
Table 14. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 13 and Figure 19.
A Type of Image TransformationAnalysis of Entire ImagesAnalysis of Image Fragments
1Image without transformation43.1864558948.64494326 *
2Histogram extension42.7480780848.24242467
3Histogram equalization46.84996288 *42.68665069
4Median filtering 3 × 341.9074325446.12603689
5FFT transformation and high-pass filtering20 × 20 window size−0.000354213−0.001611553
640 × 40 window size−0.001686477−0.003272034
780 × 80 window size-0.000545819−0.001420342
8100 × 100 window size−0.002727702−0.006738712
9DCT transformation and high-pass filtering10 × 00 window size35.1974435343.76048327
1020 × 20 window size34.0571365941.59246773
1140 × 40 window size29.2622715536.6702639
1280 × 80 window size23.0971420129.8464573
13100 × 100 window size21.3022889326.30868997
14Pseudo-colorization—exponential function48.4582257.56721151
15Pseudo-colorization—quadratic function52.49378323 **63.07583852 **
*—maximum value of modified S S I M for image transformations from 1 to 13 items. **—maximum value of modified S S I M for pseudo-colorization method (transformations for 14 and 15 items).
Table 15. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 14 and Figure 20.
Table 15. The modified S S I M values for the image subjected to quality improvement (filtering) transformations and the pattern image for the cases presented in Figure 14 and Figure 20.
A Type of Image TransformationAnalysis of Entire ImagesAnalysis of Image Fragments
1Image without transformation40.0007334918.26016129 *
2Histogram extension39.9428182618.22403402
3Histogram equalization35.8057340917.84075797
4Median filtering 3×350.25126503 *15.71348382
5FFT transformation and high-pass filtering20 × 20 window size8.38640909612.16370983
640 × 40 window size4.9908680797.247821637
780 × 80 window size3.2018595886.480875639
8100 × 100 window size2.656099776.455038649
9DCT transformation and high-pass filtering10 × 10 window size17.8113748413.35577024
1020 × 20 window size8.33237403911.94655579
1140 × 40 window size4.6920650067.407443368
1280 × 80 window size3.0121394336.53649631
13100 × 100 window size2.6193548026.455038649
14Pseudo-colorization—exponential function78.3729125731.22178904
15Pseudo-colorization—quadratic function80.38576308 **32.12163831 **
*—maximum value of modified S S I M for image transformations from 1 to 13 items. **—maximum value of modified S S I M for pseudo-colorization method (transformations for 14 and 15 items).
Table 16. Determining cases for which a quadratic or exponential function achieves better filtering properties by using pseudo-colorization method.
Table 16. Determining cases for which a quadratic or exponential function achieves better filtering properties by using pseudo-colorization method.
Area of
Analyzed Image
Figure 9Figure 10Figure 11Figure 12Figure 13Figure 14
E x K x E x K x E x K x E x K x E x K x E x K x
Entire image+ + ++ + +
Fragment of image + + + + + +
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kubiak, I.; Przybysz, A. An RGB Pseudo-Colorization Method for Filtering of Multi-Source Graphical Data. Electronics 2023, 12, 4583. https://doi.org/10.3390/electronics12224583

AMA Style

Kubiak I, Przybysz A. An RGB Pseudo-Colorization Method for Filtering of Multi-Source Graphical Data. Electronics. 2023; 12(22):4583. https://doi.org/10.3390/electronics12224583

Chicago/Turabian Style

Kubiak, Ireneusz, and Artur Przybysz. 2023. "An RGB Pseudo-Colorization Method for Filtering of Multi-Source Graphical Data" Electronics 12, no. 22: 4583. https://doi.org/10.3390/electronics12224583

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop