نتایج جستجو برای: encryption of color images
تعداد نتایج: 21193363 فیلتر نتایج به سال:
Recently, a novel image encryption scheme based on improved hyperchaotic sequences was proposed. A pseudorandom number sequence, generated by a hyper-chaos system, is used to determine two involved encryption functions, bitwise exclusive or (XOR) operation and modulo addition. It was reported that the scheme can be broken with some pairs of chosen plain-images and the corresponding cipher-image...
Conventional encryption techniques are usually applicable for text data and often unsuited for encrypting multimedia objects for two reasons. Firstly, the huge sizes associated with multimedia objects make conventional encryption computationally costly. Secondly, multimedia objects come with massive redundancies which are useful in avoiding encryption of the objects in their entirety. Hence a c...
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the origin...
acute myelogenous leukemia (aml) is a subtype of acute leukemia, which is characterized by the accumulation of myeloid blastsin the bone marrow. careful microscopic examination of stained blood smear or bone marrow aspirate is still the most significantdiagnostic methodology for initial aml screening and considered as the first step toward diagnosis. it is time-consuming and dueto the elusive n...
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-thencompression (ETC) system, where both lossless and lossy comp...
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design highly efficient image encryption-then-compression (ETC) system, where both the lossy and lossless compr...
The most important factors in e-applications are security, integrity, non-repudiation, confidentiality and authentication services. Nowadays, confidentiality and security of the digital images attract more the attention more, especially when these digital images are transmitted over the internet or stored in some types of memory. Many different image encryption algorithms and techniques have be...
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید