Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








589 Hits in 4.7 sec

A Review on Image Encryption Technique and to Extract Feature from Image

Samridhi Singh, H. L.
2017 International Journal of Computer Applications  
An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption: It is a new permutation technique based on the combination of image permutation and a well known encryption  ...  The original image was divided into 4×4 pixels blocks, which were repositioned into a permuted image using a permutation process, and then the generated image was encrypted using the RijnDael algorithm  ...  Confusion and Diffusion of Grayscale Images Using Multiple Chaotic Maps: Kotal presented multiple chaotic maps based on a new symmetric image encryption algorithm.  ... 
doi:10.5120/ijca2017913435 fatcat:n5fkrbyv5jd5nhsilbtsd5fn6u

Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images [article]

Musheer Ahmad, Akshay Chopra
2017 arXiv   pre-print
In this paper, we propose an image encryption algorithm based on the chaos, substitution boxes, nonlinear transformation in Galois field and Latin square.  ...  The chaotic behavior is achieved using Logistic map which is used to select one of thousand S boxes and also decides the row and column of selected S box.  ...  Wu et al. [9] , in 2013, depicted the drawbacks of the chaotic-based image encryption techniques and came up with an image encryption algorithm based on Latin Square.  ... 
arXiv:1709.07620v1 fatcat:pdw2yv4obbc3llccyp7o5cvmzy

Encryption Algorithms for Color Images: A Brief Review of Recent Trends

Anuja P, Wen-Zhan Song
2016 International Journal of Advanced Computer Science and Applications  
Chaotic cryptosystems, various transforms like wavelets, affine transforms etc. and visual cryptography systems are being discussed in detail.  ...  At the same time a broad classification of the said algorithms into: (1) full encryption algorithm and (2) partial encryption algorithm, each further sub-classified with respect to their domain orientations  ...  With Chen et al [14] deals with a new domain, viz., frequency domain. This paper made use of two transforms: affine transforms and the gyrator transforms.  ... 
doi:10.14569/ijacsa.2016.071001 fatcat:6eu7lejwkza5pe6zx36jog372q

Effect of Encryption Technique and Size of Image on Correlation Coefficient in Encrypted Image

Mohit Kumar, Anju Chahal
2014 International Journal of Computer Applications  
So, this work reveals the effect of image encryption method and the size of an image on correlation coefficient in the corresponding encrypted image.  ...  Images have a significant role in communication, entertainment and business etc. Images may convey confidential information, so various image encryption algorithms ensure security of secret images.  ...  Long Bao and Yicong Zhou have [9] recommended a new chaotic system that constitutes the three distinct onedimensional chaotic maps.  ... 
doi:10.5120/17059-7443 fatcat:ejgsdpdlhreerpe5iyvkrelb7q

Image Encryption Techniques:A Selected Review

Rajinder Kaur Rajinder Kaur
2013 IOSR Journal of Computer Engineering  
Encryption is one of the ways to ensure high security images are used in many fields such as medical science, military.Modern cryptography provides essential techniques for securing information and protecting  ...  In recent years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from unauthorized access .In this paper survey of different  ...  Zhang Yun-peng , Zhai Zheng-jun " Digital Image Encryption Algorithm Based on Chaos and Improved DES" 2009 [3] This paper is based on the chaotic encryption and Improved DES encryption and a combination  ... 
doi:10.9790/0661-0968083 fatcat:qxdiujgrufh6bbbmflyrpnsqy4

Double-image encryption scheme based on the phase-truncated multiple-parameter Fresnel transform

Ling Zhou, Hang Zhou, Yan Ma, Nan-Run Zhou
2022 Optica Applicata  
based on logistic map, logistic-sine system and 2D logistic-adjusted-sine map.  ...  A double-image encryption algorithm is proposed with the phase-truncated multiple-parameter Fresnel transform.  ...  Acknowledgement This work is supported by the National Natural Science Foundation of China (Grant no. 61861029), the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant no. 20162BCB22011  ... 
doi:10.37190/oa220202 fatcat:fo4brruj3bav7ghcyxddxpcgky

big S-Boxes for Deeply Improved Hill Image Coding

Abid Abdellah, Hicham Rrghout, Mourad Kattass, Abdellatif Jarjar, Abdellhamid Benazzi
2023 International Journal of Advanced Science and Computer Applications  
This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks.  ...  These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random  ...  sine map, two chaotic maps, to develop a new, more successful map.  ... 
doi:10.47679/ijasca.v3i1.42 fatcat:333lit6fyzc7hnikcggjjd3vxm

Application of S -box and chaotic map for image encryption

Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal
2013 Mathematical and computer modelling  
In this work we propose a method for image encryption based on chaotic skew tentmap and substitution box transformation. This method provides confusion and diffusion at the same time.  ...  It is well known from literature that simple image encryption based on a total shuffling scheme is not secure against different types of attacks.  ...  For security betterment, an original image encryption method based on a skew tent map was brought forward by Zhang and Liu in [6] .  ... 
doi:10.1016/j.mcm.2013.01.009 fatcat:4qcjsrw62zgddjy2dh6fhpm5ua

Quantum color image encryption based on multiple discrete chaotic systems

Li Li, Bassem Abd-El-Atty, Ahmed Abd El-Latif, Ahmed Ghoneim
2017 Proceedings of the 2017 Federated Conference on Computer Science and Information Systems  
In this paper, a novel quantum encryption algorithm for color image is proposed based on multiple discrete chaotic systems.  ...  The proposed quantum image encryption algorithm utilize the quantum controlled-NOT image generated by chaotic logistic map, asymmetric tent map and logistic Chebyshev map to control the XOR operation in  ...  [7] proposed a quantum image encryption algorithm based on generalized affine transform and image XOR operations controlled by logistic map.  ... 
doi:10.15439/2017f163 dblp:conf/fedcsis/0015AEG17 fatcat:pxocpo4ahnb45ob2ywc3nbp5fe

A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process

Adélaïde Nicole Kengnou Telem, Cyrille Feudjio, Balamurali Ramakrishnan, Hilaire Bertrand Fotsin, Karthikeyan Rajagopal, Padmapriya Praveenkumar
2022 Complexity  
In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key.  ...  The zigzag process is firstly applied on each binary image. Using an external key, every zigzag binary image is reflected or rotated and a new gray-scale image is reconstructed.  ...  Chaotic encryption methods are combined with the two-dimensional FWT of images. Liu and Miao in [15] proposed an image encryption method based on a logistic chaotic map and dynamical algorithm.  ... 
doi:10.1155/2022/3865820 fatcat:ttkv2jvqmfhndoherkxpqjkuoe

Secure encrypted image parsing over server

Shefali Madan, Mahima Magon, Suman Chandila
2022 International Journal of Health Sciences  
Transferring of data from one source point to a destination point is referred as data transfer.  ...  Survey has been performed taking into consideration various image encryption techniques and algorithms as well as procedures in this paper and reference ideas about various cryptography techniques and  ...  Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher This effective method is proposed by Peter De Jong and mainly based on chaotic map and RC4 stream cipher and the initial  ... 
doi:10.53730/ijhs.v6ns3.9449 fatcat:j6f7qdafmzaarf5xkpyah6rxpi

Approaches of Chaotic Image Encryption models in Enlightening Image Storage and Security systems

2021 International Journal of Advanced Trends in Computer Science and Engineering  
Choosing a chaotic encryption domain has several compelling explanations as described here.  ...  This has been highly inspired to pursue research in a different direction to a greater degree and to develop the measurements of current cryptography protocols and procedures.  ...  Encryption is performed based on the significance obtained based on block comparison. 2D cross chaotic map and different order discrete fractional cosine transform were used for the purpose of encryption  ... 
doi:10.30534/ijatcse/2021/731022021 fatcat:j6gr55pt2fg5peh2gq6dlwg6ma

A Novel Cryptographic Substitution Box Design Using Gaussian Distribution

Muhammad Fahad Khan, Adeel Ahmed, Khalid Saleem
2019 IEEE Access  
The substitution box is constructed by employing a linear fractional transform based on Box-Muller transform, polarization decision, and central limit algorithm.  ...  In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform.  ...  Cryptographic strength of the chaotic cipher depends upon the chaotic system and encryption scheme. Chaotic systems are divided into two classes; one dimensional and multi-dimensional.  ... 
doi:10.1109/access.2019.2893176 fatcat:z5q45zbw2zd4fgd5wdv2o2jiki

Image Encryption using Block Shuffling and Affine Transform: A Review

Harshit Somani, Namita Tiwari, Meenu Chawla, Madhu Shandilya
2014 International Journal of Computer Applications  
Researchers have proposed incompatible methods to encrypt images. So, here we go through a new way of image encryption and decryption using block based image encryption using affine transform.  ...  Encryption technology is studied in this paper, and a new image encryption algorithm based on correlation of pixels is proposed. The main goal of this paper is security management.  ...  Image Encryption Using Random Pixel Permutation by Chaotic Mapping In 2012 G.A.Sathishkumar, Srinivas Ramachandran and Dr.K.Bhoopathy Bagan [9] proposed a new image encryption algorithm using random  ... 
doi:10.5120/16702-6839 fatcat:3o3ucdgaebgdhi5kyc7qu7b74y

Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications

Osama S. Faragallah, Ashraf Afifi, Walid El-Shafai, Hala S. El-sayed, Ensherah A. Naeem, Mohammed A. AlZain, Jehad F. Al-Amri, Ben Soh, Fathi E. Abd El-Samie
2020 IEEE Access  
This paper presents an investigation of the encryption efficiency of the chaotic-based image block ciphering in the spatial and Fractional Fourier Transform (FrFT) domains.  ...  Simulation results prove that the chaotic-based image encryption in the FrFT domain increases the efficiency of the confusion process and achieves a high nonlinear relation between the plainimage and the  ...  In [17] , a double autonomous encryption method was suggested for the ciphering of color images based on a hybrid structure of a chaotic map and compressive sensing.  ... 
doi:10.1109/access.2020.2974226 fatcat:dbtwww5l4neubfx2ixzrgfbfee
« Previous Showing results 1 — 15 out of 589 results