An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption
نویسندگان
چکیده
منابع مشابه
An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption
Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textu...
متن کاملAn Image Encryption Approach using Pixel and Position Manipulation Technique
Information security is very important task in the field of information and communication technology. Encryption is one way to secure information. In this paper we present combined concept of pixel and position manipulation technique for image encryption. The proposed technique involves three stages. In first stage pixel position manipulation is done by using pixel shuffling block where index v...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملNew Watermarking Technique Using Data Matrix and Encryption Keys
Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unin...
متن کاملAn Optimized Multikeying Chaotic Encryption for Real Time Applications
In recent years, the availability of wireless technologies has become prominent solution for next generation wireless networks (NGWN). Hence the demand for secure communication is an important research issue. Cryptography is recognized as the best method of data protection against active and passive attacks. Therefore a novel chaotic cryptographic scheme is proposed for real time communication....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2015
ISSN: 1877-0509
DOI: 10.1016/j.procs.2015.07.422