A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review on Image Encryption Technique and to Extract Feature from Image
2017
International Journal of Computer Applications
An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption: It is a new permutation technique based on the combination of image permutation and a well known encryption ...
The original image was divided into 4×4 pixels blocks, which were repositioned into a permuted image using a permutation process, and then the generated image was encrypted using the RijnDael algorithm ...
Confusion and Diffusion of Grayscale Images Using Multiple Chaotic Maps: Kotal presented multiple chaotic maps based on a new symmetric image encryption algorithm. ...
doi:10.5120/ijca2017913435
fatcat:n5fkrbyv5jd5nhsilbtsd5fn6u
Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images
[article]
2017
arXiv
pre-print
In this paper, we propose an image encryption algorithm based on the chaos, substitution boxes, nonlinear transformation in Galois field and Latin square. ...
The chaotic behavior is achieved using Logistic map which is used to select one of thousand S boxes and also decides the row and column of selected S box. ...
Wu et al. [9] , in 2013, depicted the drawbacks of the chaotic-based image encryption techniques and came up with an image encryption algorithm based on Latin Square. ...
arXiv:1709.07620v1
fatcat:pdw2yv4obbc3llccyp7o5cvmzy
Encryption Algorithms for Color Images: A Brief Review of Recent Trends
2016
International Journal of Advanced Computer Science and Applications
Chaotic cryptosystems, various transforms like wavelets, affine transforms etc. and visual cryptography systems are being discussed in detail. ...
At the same time a broad classification of the said algorithms into: (1) full encryption algorithm and (2) partial encryption algorithm, each further sub-classified with respect to their domain orientations ...
With Chen et al [14] deals with a new domain, viz., frequency domain. This paper made use of two transforms: affine transforms and the gyrator transforms. ...
doi:10.14569/ijacsa.2016.071001
fatcat:6eu7lejwkza5pe6zx36jog372q
Effect of Encryption Technique and Size of Image on Correlation Coefficient in Encrypted Image
2014
International Journal of Computer Applications
So, this work reveals the effect of image encryption method and the size of an image on correlation coefficient in the corresponding encrypted image. ...
Images have a significant role in communication, entertainment and business etc. Images may convey confidential information, so various image encryption algorithms ensure security of secret images. ...
Long Bao and Yicong Zhou have [9] recommended a new chaotic system that constitutes the three distinct onedimensional chaotic maps. ...
doi:10.5120/17059-7443
fatcat:ejgsdpdlhreerpe5iyvkrelb7q
Image Encryption Techniques:A Selected Review
2013
IOSR Journal of Computer Engineering
Encryption is one of the ways to ensure high security images are used in many fields such as medical science, military.Modern cryptography provides essential techniques for securing information and protecting ...
In recent years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from unauthorized access .In this paper survey of different ...
Zhang Yun-peng , Zhai Zheng-jun " Digital Image Encryption Algorithm Based on Chaos and Improved DES" 2009 [3] This paper is based on the chaotic encryption and Improved DES encryption and a combination ...
doi:10.9790/0661-0968083
fatcat:qxdiujgrufh6bbbmflyrpnsqy4
Double-image encryption scheme based on the phase-truncated multiple-parameter Fresnel transform
2022
Optica Applicata
based on logistic map, logistic-sine system and 2D logistic-adjusted-sine map. ...
A double-image encryption algorithm is proposed with the phase-truncated multiple-parameter Fresnel transform. ...
Acknowledgement This work is supported by the National Natural Science Foundation of China (Grant no. 61861029), the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant no. 20162BCB22011 ...
doi:10.37190/oa220202
fatcat:fo4brruj3bav7ghcyxddxpcgky
big S-Boxes for Deeply Improved Hill Image Coding
2023
International Journal of Advanced Science and Computer Applications
This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. ...
These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random ...
sine map, two chaotic maps, to develop a new, more successful map. ...
doi:10.47679/ijasca.v3i1.42
fatcat:333lit6fyzc7hnikcggjjd3vxm
Application of S -box and chaotic map for image encryption
2013
Mathematical and computer modelling
In this work we propose a method for image encryption based on chaotic skew tentmap and substitution box transformation. This method provides confusion and diffusion at the same time. ...
It is well known from literature that simple image encryption based on a total shuffling scheme is not secure against different types of attacks. ...
For security betterment, an original image encryption method based on a skew tent map was brought forward by Zhang and Liu in [6] . ...
doi:10.1016/j.mcm.2013.01.009
fatcat:4qcjsrw62zgddjy2dh6fhpm5ua
Quantum color image encryption based on multiple discrete chaotic systems
2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems
In this paper, a novel quantum encryption algorithm for color image is proposed based on multiple discrete chaotic systems. ...
The proposed quantum image encryption algorithm utilize the quantum controlled-NOT image generated by chaotic logistic map, asymmetric tent map and logistic Chebyshev map to control the XOR operation in ...
[7] proposed a quantum image encryption algorithm based on generalized affine transform and image XOR operations controlled by logistic map. ...
doi:10.15439/2017f163
dblp:conf/fedcsis/0015AEG17
fatcat:pxocpo4ahnb45ob2ywc3nbp5fe
A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process
2022
Complexity
In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. ...
The zigzag process is firstly applied on each binary image. Using an external key, every zigzag binary image is reflected or rotated and a new gray-scale image is reconstructed. ...
Chaotic encryption methods are combined with the two-dimensional FWT of images. Liu and Miao in [15] proposed an image encryption method based on a logistic chaotic map and dynamical algorithm. ...
doi:10.1155/2022/3865820
fatcat:ttkv2jvqmfhndoherkxpqjkuoe
Secure encrypted image parsing over server
2022
International Journal of Health Sciences
Transferring of data from one source point to a destination point is referred as data transfer. ...
Survey has been performed taking into consideration various image encryption techniques and algorithms as well as procedures in this paper and reference ideas about various cryptography techniques and ...
Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher This effective method is proposed by Peter De Jong and mainly based on chaotic map and RC4 stream cipher and the initial ...
doi:10.53730/ijhs.v6ns3.9449
fatcat:j6f7qdafmzaarf5xkpyah6rxpi
Approaches of Chaotic Image Encryption models in Enlightening Image Storage and Security systems
2021
International Journal of Advanced Trends in Computer Science and Engineering
Choosing a chaotic encryption domain has several compelling explanations as described here. ...
This has been highly inspired to pursue research in a different direction to a greater degree and to develop the measurements of current cryptography protocols and procedures. ...
Encryption is performed based on the significance obtained based on block comparison. 2D cross chaotic map and different order discrete fractional cosine transform were used for the purpose of encryption ...
doi:10.30534/ijatcse/2021/731022021
fatcat:j6gr55pt2fg5peh2gq6dlwg6ma
A Novel Cryptographic Substitution Box Design Using Gaussian Distribution
2019
IEEE Access
The substitution box is constructed by employing a linear fractional transform based on Box-Muller transform, polarization decision, and central limit algorithm. ...
In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform. ...
Cryptographic strength of the chaotic cipher depends upon the chaotic system and encryption scheme. Chaotic systems are divided into two classes; one dimensional and multi-dimensional. ...
doi:10.1109/access.2019.2893176
fatcat:z5q45zbw2zd4fgd5wdv2o2jiki
Image Encryption using Block Shuffling and Affine Transform: A Review
2014
International Journal of Computer Applications
Researchers have proposed incompatible methods to encrypt images. So, here we go through a new way of image encryption and decryption using block based image encryption using affine transform. ...
Encryption technology is studied in this paper, and a new image encryption algorithm based on correlation of pixels is proposed. The main goal of this paper is security management. ...
Image Encryption Using Random Pixel Permutation by Chaotic Mapping In 2012 G.A.Sathishkumar, Srinivas Ramachandran and Dr.K.Bhoopathy Bagan [9] proposed a new image encryption algorithm using random ...
doi:10.5120/16702-6839
fatcat:3o3ucdgaebgdhi5kyc7qu7b74y
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications
2020
IEEE Access
This paper presents an investigation of the encryption efficiency of the chaotic-based image block ciphering in the spatial and Fractional Fourier Transform (FrFT) domains. ...
Simulation results prove that the chaotic-based image encryption in the FrFT domain increases the efficiency of the confusion process and achieves a high nonlinear relation between the plainimage and the ...
In [17] , a double autonomous encryption method was suggested for the ciphering of color images based on a hybrid structure of a chaotic map and compressive sensing. ...
doi:10.1109/access.2020.2974226
fatcat:dbtwww5l4neubfx2ixzrgfbfee
« Previous
Showing results 1 — 15 out of 589 results