Encrypting and Decrypting Images by using Genetic Algorithm
نویسندگان
چکیده
The most important factors in e-applications are security, integrity, non-repudiation, confidentiality and authentication services. Nowadays, confidentiality and security of the digital images attract more the attention more, especially when these digital images are transmitted over the internet or stored in some types of memory. Many different image encryption algorithms and techniques have been proposed to protect digital images from attacks. The encryption image tries to switch an image to another image that is difficult to know. In this proposed study, a new approach for security image using the concept of genetic algorithms (GA) is used to output new encryption method by exploitation the feature of the crossover and mutation operation of genetic algorithm. The proposed encryption method in this study has been tested on some images differ in size and type, and it has shown a positive result.
منابع مشابه
Safe Behaviors by Security Status Table (SST) in Urban Life
Urban Computing (UrC) which is based on interaction involves all relations of users/space as computing target. That is, UrC can support better results by using user/space information than ubiquitous computing. However, user can't to be safety using without security processing. Although there are many security skills, it is difficult to adapt in dynamic changing of UrC. The most important factor...
متن کاملMinimizing Interference due to Genetic Manipulation
Synthetic gene networks are the functional genetic 'programs' that will form the basis of increasingly sophisticated engineered organisms, cells and tissues. Important factors to consider in biologically engineering circuits are modularity and orthogonality of the components. We explore these factors experimentally by using TALEs as a synthetic transcription factor. We also designed an algorith...
متن کاملFastCrypto: parallel AES pipelines extension for general-purpose processors
In cryptography, the advanced encryption standard (AES) is an encryption standard issued as FIPS by NIST as a successor to data encryption standard (DES) algorithm. The applications of the AES are wide including any sensitive data that requires cryptographic protection before communication or storage. This paper proposes extending generalpurpose processors with crypto coprocessor based on decou...
متن کاملTuning Shape Parameter of Radial Basis Functions in Zooming Images using Genetic Algorithm
Image zooming is one of the current issues of image processing where maintaining the quality and structure of the zoomed image is important. To zoom an image, it is necessary that the extra pixels be placed in the data of the image. Adding the data to the image must be consistent with the texture in the image and not to create artificial blocks. In this study, the required pixels are estimated ...
متن کاملA New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata
Many cryptosystems have been released to secure electronic data on internet. Some data are very critical to be transmitted as plaintext. Thus, to ensure the data confidentiality and integrity, a list of cryptosystems have been elaborated. The most important ones are divided into two categories: symmetric algorithms encrypting and decrypting data in blocks using a single secret key; and asymmetr...
متن کامل