SYMMETRIC KEY DESIGN FOR IMAGE ENCRYPTION USING FUNCTION
نویسندگان
چکیده
منابع مشابه
Symmetric key image encryption using chaotic Rossler system
In this article, an algorithm for encryption of digital image based on chaos theory is proposed. This encryption algorithm includes two main operations of image element shuffling and pixel replacement. The analysis of cryptographic strength (resistance attack) has been performed to confirm the fact. The results of several experimental tests, such as key space analysis, key sensitivity analysis,...
متن کاملBig-Key Symmetric Encryption: Resisting Key Exfiltration
This paper aims to move research in the bounded retrieval model (BRM) from theory to practice by considering symmetric (rather than public-key) encryption, giving efficient schemes, and providing security analyses with sharp, concrete bounds. The threat addressed is malware that aims to exfiltrate a user’s key. Our schemes aim to thwart this by using an enormously long key, yet paying for this ...
متن کاملNovel Design of Symmetric Photonic Bandgap Based Image Encryption System
Abstract—A novel approach for the design of image encryption system based on one stage of 3D photonic bandgap structure is proposed. Using the Finite Integration Time Domain (FITD) method, the performance of the proposed design is optimized through the utilization of the reflection properties from 3D photonic bandgap structure while maintaining constant phase encoding. To demonstrate the robust...
متن کاملSymmetric Key Generation Method using Digital Image
In this paper, the authors propose a new key generation algorithm based on using a binary image. The proposed algorithm converts 16×16 binary array representing the digital image into 4×4 array, then it converts the new generated array into 4×4 decimal array. The decimal array and the left diagonal of the original array are then used to generate the public key that is used to encrypt the data t...
متن کاملSecuring Medical Images by Image Encryption using Key Image
This paper presents two methods for encryption and decryption of images using XOR operation. In the first method the original image is encrypted by the key image using XOR operation and decryption process also uses the same key image with XOR operation. In the second method one of the bit planes of the key image is used for encrypting the bit planes of the original image and shuffling is done f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology
سال: 2020
ISSN: 2455-2143
DOI: 10.33564/ijeast.2020.v04i11.066