Segmentation and Encryption of Satellite Images Using Stream Cipher Algorithm
نویسنده
چکیده
Information security plays one of the very important roles in the field of emergent information and communication technology. The applications such as medical images and satellite images needs the security only in the required portion, which contains the useful information .To improve the perception of surroundings and to monitor the earth’s surface, remote sensing is used and it led the way for progress in information technologies. This paper explains the concept of enhancing the resolution of an image to improve the number of pixels, which is used to represent the details of an image and then segmenting the input image by using canny edge detector and encrypting the segmented image by using RC4 stream cipher algorithm. This encryption algorithm provides the security by XOR the plaintext and key. Moreover, RC4 algorithm (stream cipher) is considered to be providing a best result in terms of security, accuracy, noise, distortion less images by the varying features like variable key size and packet size.
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملObject-Oriented Method for Automatic Extraction of Road from High Resolution Satellite Images
As the information carried in a high spatial resolution image is not represented by single pixels but by meaningful image objects, which include the association of multiple pixels and their mutual relations, the object based method has become one of the most commonly used strategies for the processing of high resolution imagery. This processing comprises two fundamental and critical steps towar...
متن کاملCryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملSegmentation Improvement of High Resolution Remote Sensing Images based on superpixels using Edge-based SLIC algorithm (E-SLIC)
The segmentation of high resolution remote sensing images is one of the most important analyses that play a significant role in the maximal and exact extraction of information. There are different types of segmentation methods among which using superpixels is one of the most important ones. Several methods have been proposed for extracting superpixels. Among the most successful ones, we can r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016