نتایج جستجو برای: encryption of color images

تعداد نتایج: 21193363  

Journal: :CoRR 2012
Chengqing Li Yuansheng Liu Tao Xie

Recently, a novel image encryption scheme based on improved hyperchaotic sequences was proposed. A pseudorandom number sequence, generated by a hyper-chaos system, is used to determine two involved encryption functions, bitwise exclusive or (XOR) operation and modulo addition. It was reported that the scheme can be broken with some pairs of chosen plain-images and the corresponding cipher-image...

2012
Giuseppe Peano

Conventional encryption techniques are usually applicable for text data and often unsuited for encrypting multimedia objects for two reasons. Firstly, the huge sizes associated with multimedia objects make conventional encryption computationally costly. Secondly, multimedia objects come with massive redundancies which are useful in avoiding encryption of the objects in their entirety. Hence a c...

2015
Mohamad M. AL-Laham

An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the origin...

Journal: :journal of medical signals and sensors 0
fatemeh kazemi tooraj abbasian najafabadi babak nadjar araabi

acute myelogenous leukemia (aml) is a subtype of acute leukemia, which is characterized by the accumulation of myeloid blastsin the bone marrow. careful microscopic examination of stained blood smear or bone marrow aspirate is still the most significantdiagnostic methodology for initial aml screening and considered as the first step toward diagnosis. it is time-consuming and dueto the elusive n...

2015
B. Suneetha

In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-thencompression (ETC) system, where both lossless and lossy comp...

2015

In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design highly efficient image encryption-then-compression (ETC) system, where both the lossy and lossless compr...

2013
Gamil R. S. Qaid Sanjay N. Talbar

The most important factors in e-applications are security, integrity, non-repudiation, confidentiality and authentication services. Nowadays, confidentiality and security of the digital images attract more the attention more, especially when these digital images are transmitted over the internet or stored in some types of memory. Many different image encryption algorithms and techniques have be...

2009
Musheer Ahmad Shamsher Alam

The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryp...

Journal: :IOP Conference Series: Materials Science and Engineering 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید