Secure Image Encryption based on a Cube

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Image Encryption Based On a Chua Chaotic Noise Generator

This paper presents a secure image cryptography telecom system based on a Chua's circuit chaotic noise generator. A chaotic system based on synchronised Master–Slave Chua's circuits has been used as a chaotic true random number generator (CTRNG). Chaotic systems present unpredictable and complex behaviour. This characteristic, together with the dependence on the initial conditions as well as th...

متن کامل

A Secure Symmetric Image Encryption Based on Bit-wise Operation

This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides addition...

متن کامل

Secure Image Encryption Using Aes

Security in transmission of digital images has its importance in today’s image communications, due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been investigat...

متن کامل

Secure Image Encryption Algorithms: A Review

Image encryption plays an important role in the field of information security. Most of the image encryption techniques have some security and performance issues. So there is a need to compare them to determine which method is suitable for the application. Chaos based encryption algorithms are employed nowadays because of their better security and performance aspects. Chaotic behavior of a syste...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Signal Processing, Image Processing and Pattern Recognition

سال: 2016

ISSN: 2005-4254,2005-4254

DOI: 10.14257/ijsip.2016.9.4.37