Preserving the confidentiality of digital images using a chaotic encryption scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

A New Image Encryption Scheme for Secure Digital Images Based on Combination of Polynomial Chaotic Maps

In recent times, research on image encryption using chaotic systems has emerged. However, some of the proposed schemes still hinder the system performance and security. In this study, we introduce an efficient image encryption scheme based on pixel bit and combination of polynomial chaotic maps with variable initial parameters. The algorithm takes advantage of the best features of chaotic maps ...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level

Certificateless public key cryptography with bilinear pairing needs costly operations, which is not appropriate for a practical application. In this paper, we present a certificateless public key encryption scheme without bilinear pairing. This encryption scheme achieves Girault’s trust Level 3 as in traditional public key infrastructure based cryptography, and which is proved to be secure in t...

متن کامل

Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption

Confidentiality and privacy of outsourced data has become one of the pressing challenges in Cloud computing. Outsourced data often includes sensitive personally identifiable information. When data is outsourced, sensitive information will not be under the control of its owners, but under the control of an external service provider. In this paper, we define an approach allowing the protection of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronic Security and Digital Forensics

سال: 2015

ISSN: 1751-911X,1751-9128

DOI: 10.1504/ijesdf.2015.070389