Image Encryption System based on Length Three Moduli Set
نویسندگان
چکیده
منابع مشابه
Modeling a Secured Digital Image Encryption Scheme Using a Three Moduli Set
This paper proposes a new digital image coding scheme that uses a three moduli set with a common factor. The proposed scheme is specific to a particular three moduli set {2n+2, 2n+1,2n}. The design of the scheme is based on the residue to binary converter which achieves in terms of area and critical path delay as compared to the state of the art. This scheme offers high-speed processing because...
متن کاملAn Improved RNS Reverse Converter in Three-Moduli Set
Residue Number System (RNS) is a carry-free and non-weighed integer system. In this paper an improved three-moduli set in reverse converter based on CRT algorithm is proposed. CRT algorithm can perform a better delay and hardware implementation in modules via other algorithms. This moduli is based on p that covers a wide range on modules and supports the whole range of its modules in dynamic r...
متن کاملan improved rns reverse converter in three-moduli set
residue number system (rns) is a carry-free and non-weighed integer system. in this paper an improved three-moduli set in reverse converter based on crt algorithm is proposed. crt algorithm can perform a better delay and hardware implementation in modules via other algorithms. this moduli is based on p that covers a wide range on modules and supports the whole range of its modules in dynamic r...
متن کاملAn Improved Image Encryption Algorithm based on Chaotic System
The security of stream cipher, which is known as one of the main cipher techniques, is dependents completely on the quality of generated pseudo-stochastic sequences. Chaotic systems can produce the pseudo-random sequences with good randomness , therefore, these systems are suitable to the stream cipher. In this paper, a new encryption algorithm is proposed by analyzing the principle of the chao...
متن کاملEncryption of Digital Image Based on Chaos System
In this paper, four kinds of chaos mapping equations such as Logistic, Henon, Quadratic and MacKeyGlass were discussed, and the numerical characteristics of those chaos mapping equations were analyzed and compared by histogram and correlation coefficient. Then the better chaos encryption system was selected according to analyzing result, and the encryption method of poor chaos encryption system...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2018
ISSN: 0975-8887
DOI: 10.5120/ijca2018916989