Cipher image damage and decisions in real time
نویسندگان
چکیده
منابع مشابه
Cipher Image Damage: An Application of Filters
In this paper, color images are encrypted and subsequently damage occlusion is made to the encrypted figures, with different sizes; the intention is to simulate an attack. In this research, two aspects are discussed, namely: the first is to encrypt images with quality; that is, the figures encrypted pass randomness tests proposed in this paper. The second aspect deals with the problem of recove...
متن کاملReal-time damage detection of bridges using adaptive time-frequency analysis and ANN
Although traditional signal-based structural health monitoring algorithms have been successfully employed for small structures, their application for large and complex bridges has been challenging due to non-stationary signal characteristics with a high level of noise. In this paper, a promising damage detection algorithm is proposed by incorporation of adaptive signal processing and Artificial...
متن کاملA Chaotic Block Cipher for Real - Time
Problem statement: The widespread use of image, audio and video data makes media content protection increasingly necessary and important. We propose a naive approach which treats the multimedia signal to be protected as a text and use proposed encryption design to encrypt the whole data stream. Upon reception, the entire cipher text data stream would be decrypted and playback can be performed a...
متن کاملReal-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher
In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator...
متن کاملBreaking the F-FCSR-H Stream Cipher in Real Time
The F-FCSR stream cipher family has been presented a few years ago. Apart from some aws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. The hardware oriented version, called FCSR-H, is one of the ciphers selected for the eSTREAM portfolio. In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Electronic Imaging
سال: 2015
ISSN: 1017-9909
DOI: 10.1117/1.jei.24.1.013012