Cipher image damage and decisions in real time

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cipher Image Damage: An Application of Filters

In this paper, color images are encrypted and subsequently damage occlusion is made to the encrypted figures, with different sizes; the intention is to simulate an attack. In this research, two aspects are discussed, namely: the first is to encrypt images with quality; that is, the figures encrypted pass randomness tests proposed in this paper. The second aspect deals with the problem of recove...

متن کامل

Real-time damage detection of bridges using adaptive time-frequency analysis and ANN

Although traditional signal-based structural health monitoring algorithms have been successfully employed for small structures, their application for large and complex bridges has been challenging due to non-stationary signal characteristics with a high level of noise. In this paper, a promising damage detection algorithm is proposed by incorporation of adaptive signal processing and Artificial...

متن کامل

A Chaotic Block Cipher for Real - Time

Problem statement: The widespread use of image, audio and video data makes media content protection increasingly necessary and important. We propose a naive approach which treats the multimedia signal to be protected as a text and use proposed encryption design to encrypt the whole data stream. Upon reception, the entire cipher text data stream would be decrypted and playback can be performed a...

متن کامل

Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator...

متن کامل

Breaking the F-FCSR-H Stream Cipher in Real Time

The F-FCSR stream cipher family has been presented a few years ago. Apart from some aws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. The hardware oriented version, called FCSR-H, is one of the ciphers selected for the eSTREAM portfolio. In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Electronic Imaging

سال: 2015

ISSN: 1017-9909

DOI: 10.1117/1.jei.24.1.013012