Stream Cipher for Image Encryption Using Ant Colony Optimization Based Key Generation

ثبت نشده
چکیده

This chapter deals with a stream cipher method for encrypting images. As digital devices such as scanners and digital cameras become more and more available and mass storage media for digital data become more affordable, the use of digital images in practical applications are becoming more widespread. The wired and wireless IP networks are vulnerable to eavesdropping making essential the data traffic to be encrypted.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stream cipher for binary image encryption using Ant Colony Optimization based key generation

Encryption of binary images is essential since it is vulnerable to eavesdropping in wired and wireless networks. The security of data becomes important since the communications over open network occur frequently. This paper focuses on encryption of binary image using a stream cipher method. In this paper we propose an Ant Colony Optimization (ACO) based approach of generating keys for encryptio...

متن کامل

Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation

Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. Thus the data transferred in a network is encrypted. Encryption can be done using stream cipher method such as Vernam Cipher which is considered to be the perfect cipher. However this method suffers from the drawback of storing and distributing a large number of keys. In this paper we propose a Particl...

متن کامل

Using Ants to Attack a Classical Cipher

Transposition ciphers are a class of historical encryption algorithms based on rearranging units of plaintext according to some fixed permutation which acts as the secret key. Transpositions form a building block of modern ciphers, and applications of metaheuristic optimisation techniques to classical ciphers have preceded successful results on modern-day cryptological problems. In this paper w...

متن کامل

Stream Cipher for Text Encryption Using Swarm Intelligence Based Key Generation

The third important aspect of security is encryption to transfer messages among the users in a secure manner. Group key management discussed in the earlier chapter is applicable for transferring messages securely to the members in a group. Apart from transferring messages to the members in a group, messages can be transferred securely to an individual user. Encryption plays a major role in such...

متن کامل

An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption

The chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. Towards this direction, this paper presents an efficient chaosbased feedback stream cipher (ECBFSC) for image cryptosystems. The proposed stream cipher is based on the use of a chaotic logistic map and an external secret key of 256-bit. The initial conditions for th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014