How Good Is The DES Algorithm In Image Ciphering?

نویسنده

  • Said F. El-Zoghdy
چکیده

Said F. El-Zoghdy Computer Science Dep. College of Computers & Information Technology, Taif University, Kingdom of Saudi Arabia (KSA). Email: [email protected] Yasser A. Nada Computer Science Dep. College of Computers & Information Technology, Taif University, Kingdom of Saudi Arabia (KSA). Email: [email protected] A. A. Abdo Department of Mathematics & Computer Science, Faculty of Science, Menoufia University, Egypt Email: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of VlSI Based Image Compression Approach on Reconfigurable Computing System - A Survey

Image data require huge amounts of disk space and large bandwidths for transmission. Hence, imagecompression is necessary to reduce the amount of data required to represent a digital image. Thereforean efficient technique for image compression is highly pushed to demand. Although, lots of compressiontechniques are available, but the technique which is faster, memory efficient and simple, surely...

متن کامل

Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms

In this paper, we present two symmetric evolutionist-based ciphering algorithms (SEC and SEC-EX) where the second is an extension of the first. Our evolutionist approach is modeled as a combinatorial optimization problem. The paper addresses the coding of the chromosomes, the identification of a fitness function, and the choice of the adapted genetic operators. In SEC we treat directly the char...

متن کامل

A Novel Secure Image Ciphering Technique Based On Chaos

The recent secure of digital images attracts much attention, and many image encryption methods have been proposed. This paper presents a new scheme for image encryption technique, based on a residue number system (RNS) sequence and non-traditional random number generators, which are grouped as a chaotic system. An image is deteriorated according to the proposed new algorithm. This system provid...

متن کامل

New Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata

Today, computer networks are complex and illegal wiretapping is possible. This poses a real problem for the security during transmission of data. For ethical reasons, the transfer of sensitive data cannot be done with such a danger and must protect themselves. Protection best suited for this type of communication is the cryptography. However, despite all its developments, it is still hampered b...

متن کامل

A Performance Comparison of Ciphering Algorithms with the sWIFI Algorithm

Ciphering algorithms play a main role in WLAN security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the WLAN security issue, a novel method has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. This paper also provides evaluation of five ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011