نتایج جستجو برای: encryption of colored images

تعداد نتایج: 21183193  

2017
Hong Di Yanmei Kang Yueqin Liu Xin Zhang

Multiple image encryption (MIE) was proposed to increase the efficiency of encrypting images by processing several images simultaneously. Because of the advantage of optical technology in processing twodimensional images at high throughput, MIE has been significantly improved by use of methods originating from optics. Phase retrieval was the process of algorithmically finding solutions to the p...

2013
Prabhudev Jagadeesh P. Nagabhushan R. Pradeep Kumar

The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos, pay-TV and video on demand, one of the required features is that the quality ...

Journal: :IEEE Trans. Signal Processing 2000
Howard Cheng Xiaobo Li

The increased popularity of multimedia applications places a great demand on eecient data storage and transmission techniques. Network communication, especially over a wireless network , can easily be intercepted and must be protected from eavesdroppers. Unfortunately, en-cryption and decryption are slow and it is often diicult, if not impossible, to carry out real-time secure image and video c...

2016
Rekha Raj Salim Paul

Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiali...

Journal: :IACR Cryptology ePrint Archive 2012
Rajeswari Mukesh

Image compression and image encryption are pivotal to proper storage and transmission of images over MANET. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The Number Theory based Image Compression and Quasigroup Encryption (NTICQE) algorithm employs number theoretic paradigm Chinese Remainder Theorem and Quasigroup E...

2014
Swati Gupta Nishu Bansal Ajay Kumar Garg

Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fracta...

Journal: :CoRR 2012
Ahmed Bashir Abugharsa Abd Samad Bin Hasan Basari Hamida Almangush

In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme based on the rotation of the faces of a Magic Cube. The o...

LPWANs are a class of technologies that have very low power consumption and high range of communication. Along with its various advantages, these technologies also have many limitations, such as low bandwidth, connectionless transmission and low processing power, which has challenged encryption methods in this technologies. One of the most important of these challenges is encryption. The very s...

2012
Yong Zhang Jiali Xia Peng Cai Bin Chen

Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-le...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید