نتایج جستجو برای: image encryption

تعداد نتایج: 400416  

2004
Aloka Sinha

With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like i...

2013
Sachin K. Patel

The encryption of image is difficult compare to the encryption of the text due to the high capacity. Recent methods are difficult to handle the image encryption . Recently, the use of chaotic signals for secure data transmission has shown significant growth in developing chaotic encryption algorithm. The application of the Brahmagupta–Bhaskara (BB) equation for encryption is reported in a very ...

Journal: :J. Signal and Information Processing 2011
Qais H. Alsafasfeh Aouda A. Arfoa

In the recent years, researchers developed image encryption methods based on chaotic systems. This paper proposed new image encryption technique based on new chaotic system by adding two chaotic systems: the Lorenz chaotic system and the Rössler chaotic system. The main advantage of this technique is stronger security, as is shown in the encryption tests.

2012
Tapas Bandyopadhyay

To provide security of the images in the multimedia environment encryption plays an important role. The traditional cryptographic algorithm such as AES, DES, TDES, RSA, IDEA, etc. are not so effective for image encryption because of their slow processing speed, inherent features of image data like bulk data capacity, high redundancy and ineffectiveness in removing the correlations of the adjace...

Journal: :Electronics 2022

Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encryption algorithms, e.g., textual data, are now rarely considered. This article studies how image-encryption algorithms can be used to encrypt text. The proposed approach this problem consists of two stages: in the first stage, text message intended for encryption into an image; second step, selec...

2015

Speech encoding and encryption in VLSI, Published by ACM.Abstract In this paper, an image encryptiondecryption algorithm and its VLSI architecture are proposed. Fourier-Transform Based Speech Encryption.AbstractThis paper proposes a hardware-based speech. Public-key cryptography, the two keys are called the private key and. The VLSI implementation is.International journal of VLSI design Communi...

Journal: :IEEE Transactions on Information Forensics and Security 2019

Journal: :JSW 2014
Shucong Liu Yanxing Song Jingsong Yang

In view of characteristics of digital image,such as bulk data capacity,high redundancy and poor security, a new image encryption algorithm was put forward by combining chaotic maps with wavelet transform. Mallat algorithm in wavelet transform firstly was used to decompose the original image, leaving only the lowfrequency information, and then oversampled Chebyshev chaotic maps were used to achi...

2015
Junming Ma

This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryptio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید