نتایج جستجو برای: encryption of colored images

تعداد نتایج: 21183193  

Journal: :Engineering Science and Technology, an International Journal 2020

2014
Ali Shakir Mahmood Mohd Shafry Mohd Rahim

The different methods for encryption and decryption in digital images have received growing attention recently. This is due to the availability of new editing software, sophisticated digital cameras, and in addition to tremendous development in communication networks including the Internet, which used by many people to send and receive various types of data including digital images, Although th...

Journal: :Signal Processing 2014
Weiming Zhang Kede Ma Nenghai Yu

A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that additional data can be embedded in the estimating errors. A benchmark encryption algorithm (e.g. AES) is applied to the rest pixels of the image and a special encryption scheme is designed to encrypt ...

پایان نامه :0 1374

to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

2017
Smitha Jacob

Preserving the privacy of digital biometric data (e.g., fingerprint) stored in a central database has become of paramount importance. It demands high speed decryption/encryption process with restricted computational powers. This work explores the possibility of using visual cryptography with chaotic encryption suitable for imparting security to biometric data such as fingerprint images. By usin...

Journal: :هنرهای سنتی اسلامی 0
امیر نظری ایمان زکریایی کرمانی مهرنوش شفیعی سرارودی

abstract today, pottery in shahreza of isfahan is a valuable arts with its up and downs which has stabilized  its place among iranian pottery centers. the investigation of contemporary pottery in the course of  history shows that iranian potters have used predecessors' experiences, as well as remained  professions of pottery art such as soheili, bahari and fakhar, and tried to promote qual...

2016
Med Amine Touil Noureddine Ellouze

In this paper, a tone mapping algorithm is proposed to produce LDR (Limited Dynamic Range) images from HDR (High Dynamic Range) images. In the approach, nonlinear functions are applied to compress the dynamic range of HDR images. Security tools will be then applied to the resulting LDR images and their effectiveness will be tested on the reconstructed HDR images. Three specific examples of secu...

2016
Manju Devi Uma Mehta

Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images. As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various algorithm which are discovered from...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید