Image Encryption Performance Evaluation Based on Poker Test

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Mental Poker Without a TTP Based on Homomorphic Encryption

A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-gambling to reach standards of fairness, security an auditability similar to those common in physical gambling. Although our solution is detailed here for the particular case of games with reversed cards (e.g. poker), i...

متن کامل

Performance Analysis of Threshold based Image Encryption

Security of wireless transmission becomes considerable issue in present scenario. To overcome the issue, several algorithms were used. Among them cryptography remains as the efficient technique that converts the user provided information into unintelligible format. The cryptographic algorithms plays important role in providing security and confidentiality to the data. In this proposed work, the...

متن کامل

Performance Study on Image Encryption Schemes

Image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. In this paper, we classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness, format compliance, encryption ratio, speed, and cryptographic security.

متن کامل

Performance Evaluation of Image Quality Based on Fractal Image Compression

Fractal techniques for image compression have recently attracted a great deal of attention. Fractal image compression is a relatively recent technique based on the representation of an image by a contractive transform, on the space of images, for which the fixed point is close to the original image. This broad principle encompasses a very wide variety of coding schemes, many of which have been ...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Multimedia

سال: 2016

ISSN: 1687-5680,1687-5699

DOI: 10.1155/2016/6714164