SYMMETRIC KEY DESIGN FOR IMAGE ENCRYPTION USING FUNCTION

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Symmetric key image encryption using chaotic Rossler system

In this article, an algorithm for encryption of digital image based on chaos theory is proposed. This encryption algorithm includes two main operations of image element shuffling and pixel replacement. The analysis of cryptographic strength (resistance attack) has been performed to confirm the fact. The results of several experimental tests, such as key space analysis, key sensitivity analysis,...

متن کامل

Big-Key Symmetric Encryption: Resisting Key Exfiltration

This paper aims to move research in the bounded retrieval model (BRM) from theory to practice by considering symmetric (rather than public-key) encryption, giving efficient schemes, and providing security analyses with sharp, concrete bounds. The threat addressed is malware that aims to exfiltrate a user’s key. Our schemes aim to thwart this by using an enormously long key, yet paying for this ...

متن کامل

Novel Design of Symmetric Photonic Bandgap Based Image Encryption System

Abstract—A novel approach for the design of image encryption system based on one stage of 3D photonic bandgap structure is proposed. Using the Finite Integration Time Domain (FITD) method, the performance of the proposed design is optimized through the utilization of the reflection properties from 3D photonic bandgap structure while maintaining constant phase encoding. To demonstrate the robust...

متن کامل

Symmetric Key Generation Method using Digital Image

In this paper, the authors propose a new key generation algorithm based on using a binary image. The proposed algorithm converts 16×16 binary array representing the digital image into 4×4 array, then it converts the new generated array into 4×4 decimal array. The decimal array and the left diagonal of the original array are then used to generate the public key that is used to encrypt the data t...

متن کامل

Securing Medical Images by Image Encryption using Key Image

This paper presents two methods for encryption and decryption of images using XOR operation. In the first method the original image is encrypted by the key image using XOR operation and decryption process also uses the same key image with XOR operation. In the second method one of the bit planes of the key image is used for encrypting the bit planes of the original image and shuffling is done f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology

سال: 2020

ISSN: 2455-2143

DOI: 10.33564/ijeast.2020.v04i11.066