How Good Is The DES Algorithm In Image Ciphering?
نویسنده
چکیده
Said F. El-Zoghdy Computer Science Dep. College of Computers & Information Technology, Taif University, Kingdom of Saudi Arabia (KSA). Email: [email protected] Yasser A. Nada Computer Science Dep. College of Computers & Information Technology, Taif University, Kingdom of Saudi Arabia (KSA). Email: [email protected] A. A. Abdo Department of Mathematics & Computer Science, Faculty of Science, Menoufia University, Egypt Email: [email protected]
منابع مشابه
Implementation of VlSI Based Image Compression Approach on Reconfigurable Computing System - A Survey
Image data require huge amounts of disk space and large bandwidths for transmission. Hence, imagecompression is necessary to reduce the amount of data required to represent a digital image. Thereforean efficient technique for image compression is highly pushed to demand. Although, lots of compressiontechniques are available, but the technique which is faster, memory efficient and simple, surely...
متن کاملDesign and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms
In this paper, we present two symmetric evolutionist-based ciphering algorithms (SEC and SEC-EX) where the second is an extension of the first. Our evolutionist approach is modeled as a combinatorial optimization problem. The paper addresses the coding of the chromosomes, the identification of a fitness function, and the choice of the adapted genetic operators. In SEC we treat directly the char...
متن کاملA Novel Secure Image Ciphering Technique Based On Chaos
The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper presents a new scheme for image encryption technique, based on a residue number system (RNS) sequence and non-traditional random number generators, which are grouped as a chaotic system. An image is deteriorated according to the proposed new algorithm. This system provid...
متن کاملNew Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata
Today, computer networks are complex and illegal wiretapping is possible. This poses a real problem for the security during transmission of data. For ethical reasons, the transfer of sensitive data cannot be done with such a danger and must protect themselves. Protection best suited for this type of communication is the cryptography. However, despite all its developments, it is still hampered b...
متن کاملA Performance Comparison of Ciphering Algorithms with the sWIFI Algorithm
Ciphering algorithms play a main role in WLAN security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the WLAN security issue, a novel method has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. This paper also provides evaluation of five ...
متن کامل