Why Information Security Demands Transform Domain, Compression and Encryption?
نویسندگان
چکیده
منابع مشابه
Hybrid coding: Encryption-watermarking-compression For security in medical information
Nowadays, more and more digital images are being sent over computer networks. The works presented in this chapter show how encryption and watermarking algorithms give security in medical imagery. In order to do this, the images can be encrypted in their source codes in order to apply this functionality at the application level. In this way, the functionalities of encryption and watermarking ima...
متن کاملImage Compression and Encryption Using Discrete Fractional Cosine Transform
,PDJH SURFHVVLQJ PRVW IUHTXHQWO\ XVHV WKH WUDQVIRUPV OLNH 'LVFUHWH &RVLQH 7UDQVIRUP RU )RXULHU WUDQVIRUP IRU LPDJH FRPSUHVVLRQ 7KLV LQYROYHV WKH FRQYHUVLRQ RI WKH VRXUFH VLJQDO WR IUHTXHQF\ FRPSRQHQW 7KH DSSOLFDWLRQ RI )UDFWLRQDO YHUVLRQ RI FRVLQH WUDQVIRUP FDOOHG 'LVFUHWH )UDFWLRQDO &RVLQH 7UDQVIRUP WR LPDJH FRPSUHVVLRQ LV IDLUO\ QHZ ')5&7 VKDUHV PDQ\ XVHIXO SURSHUWLHV RI UHJXODU '&7 LW KDV IU...
متن کاملEncryption-then-Compression System using Haar and Symlet Wavelet Transform
Image compression is the important task for the medical images. Economic and effective image compression techniques are hardly required to minimize the storage volume of medical database in hospitals as well as maintaining the image quality. But the transmission and storage of such a large data could be a tedious job. There are various methods to encrypt the images while transmission. In this r...
متن کاملImage Compression using Haar Wavelet Transform and Chaos-Based Encryption
With the increasing growth of technology and the world has entered into the digital image, we have to handle a vast amount of information every time which often presents difficulties. So, the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. Wavelets provide a mathematical way of encoding information in such a way ...
متن کاملGambling, Computational Information and Encryption Security
We revisit the question, originally posed by Yao (1982), of whether encryption security may be characterized using computational information. Yao provided an affirmative answer, using a compression-based notion of computational information to give a characterization equivalent to the standard computational notion of semantic security. We give two other equivalent characterizations. The first us...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Artificial Intelligence
سال: 2014
ISSN: 1994-5450
DOI: 10.3923/jai.2014.136.144