Image Encryption Performance Evaluation Based on Poker Test
نویسندگان
چکیده
منابع مشابه
Practical Mental Poker Without a TTP Based on Homomorphic Encryption
A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-gambling to reach standards of fairness, security an auditability similar to those common in physical gambling. Although our solution is detailed here for the particular case of games with reversed cards (e.g. poker), i...
متن کاملPerformance Analysis of Threshold based Image Encryption
Security of wireless transmission becomes considerable issue in present scenario. To overcome the issue, several algorithms were used. Among them cryptography remains as the efficient technique that converts the user provided information into unintelligible format. The cryptographic algorithms plays important role in providing security and confidentiality to the data. In this proposed work, the...
متن کاملPerformance Study on Image Encryption Schemes
Image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. In this paper, we classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness, format compliance, encryption ratio, speed, and cryptographic security.
متن کاملPerformance Evaluation of Image Quality Based on Fractal Image Compression
Fractal techniques for image compression have recently attracted a great deal of attention. Fractal image compression is a relatively recent technique based on the representation of an image by a contractive transform, on the space of images, for which the fixed point is close to the original image. This broad principle encompasses a very wide variety of coding schemes, many of which have been ...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Multimedia
سال: 2016
ISSN: 1687-5680,1687-5699
DOI: 10.1155/2016/6714164