An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption

Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textu...

متن کامل

An Image Encryption Approach using Pixel and Position Manipulation Technique

Information security is very important task in the field of information and communication technology. Encryption is one way to secure information. In this paper we present combined concept of pixel and position manipulation technique for image encryption. The proposed technique involves three stages. In first stage pixel position manipulation is done by using pixel shuffling block where index v...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

New Watermarking Technique Using Data Matrix and Encryption Keys

Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unin...

متن کامل

An Optimized Multikeying Chaotic Encryption for Real Time Applications

In recent years, the availability of wireless technologies has become prominent solution for next generation wireless networks (NGWN). Hence the demand for secure communication is an important research issue. Cryptography is recognized as the best method of data protection against active and passive attacks. Therefore a novel chaotic cryptographic scheme is proposed for real time communication....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2015

ISSN: 1877-0509

DOI: 10.1016/j.procs.2015.07.422