نتایج جستجو برای: encryption of colored images
تعداد نتایج: 21183193 فیلتر نتایج به سال:
Using data hiding technique one can send the information to the accurate user without noticing to third person. Data can be hidden using different cover Medias, like video, audio, images or text. As an Internet based communications of images have increased, encryption of images has become very important way to protect images especially on the Internet. This work proposes a new scheme for hiding...
In this study, the images of wrist vein taken from individuals were subjected to various preprocessings
 and then encrypted with random numbers obtained chaotic system. Before encryption,
 generated using a The produced have successfully
 passed NIST 800-22 tests. Images security analysis
 such as correlation, NPCR, UACI histogram analysis. With study carried out, it has bee...
Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the qu...
امروزه تخمین حرکت بلوک در تصاویر بر اساس روش هایی که تمام جزئیات را شامل می شوند، تبدیل به یک مبحث فراگیر در شاخه ی پردازش تصویر گشته است. چرا که از جمله ی روش هایی به حساب می آید که باعث فشردگی و کاهش حجم داده های تصویری می گردد. جهت تحقّق این هدف، الگوریتم های متفاوتی ارائه شده اند. الگوریتم های جستجوی محلی، جستجوی پیشگویانه و... که با توجه به نیاز مسأله انتخاب و مورد استفاده قرار می گیرند، از...
Email: [email protected] Abstract: This new algorithm employs shuffling procedures combined with variable-length key-dependent XOR and S-box substitutions to perform lossless image encryption. This algorithm was implemented and tested by performing different permutations of shuffling, XOR encryption and S-box substitution. Empirical analysis using different types of test images of different s...
Omnipresence of security in every application in Internet application is a clear motivation to contribute in the field of Information Security. Security is one of the most challenging aspects in the internet and network applications. Encryption is a process which is used to secure the data and the Encryption algorithms play a crucial role in efficient information security systems. Full encrypti...
In present days safeguarding information, in form of images is very important, and it is done by various ways. Certain security analysis tests are done to find out the quality of image encryption algorithms to produce encrypted image from original image. Keywords— Differential analysis, Encryption quality performance, Features of image encryption, Information entropy analysis, Key space analysi...
How are color preferences formed, and can they be changed by affective experiences with correspondingly colored objects? We examined these questions by testing whether affectively polarized experiences with images of colored objects would cause changes in color preferences. Such changes are implied by the ecological valence theory (EVT), which posits that color preferences are determined by peo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید