نتایج جستجو برای: encryption of color images

تعداد نتایج: 21193363  

Journal: :Malaysian Journal of Fundamental and Applied Sciences 2023

This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images an algorithm for chaotic encryption, secure image storage, transmission. The that controls the operation of encryption algorithm: arrangement pixel positions, use AES to achieve creation algorithms, by dynamically updating control parameters numbers increase gener...

2013
Jianjiang CUI Siyuan LI Dingyu Xue

With the advancement of multimedia and real-time networks, a vast number of digital images are now stored and transmitted over public networks. A lot of researches of chaos-based image encryption technologies have been done. However, the performance of conventional encryption algorithm is not satisfying when used to color image. In this paper, we propose an improved chaos-based color image cryp...

Journal: :Pattern Recognition 2005
Karl Martin Rastislav Lukac Konstantinos N. Plataniotis

An efficient, secure color image coder incorporating Color-SPIHT (C-SPIHT) compression and partial encryption is presented. Confidentiality of the image data is achieved by encrypting only the significance bits of individual wavelet coefficients for K iterations of the C-SPIHT algorithm. By varying K, the level of confidentiality vs. processing overhead can be controlled. For K=2, adequate secu...

2008
Federica Battisti Michela Cancellaro Marco Carli Giulia Boato Alessandro Neri

In this paper a novel method for watermarking and ciphering color images is presented. The aim of the system is to allow the watermarking of encrypted data without requiring the knowledge of the original data. By using this method, it is also possible to cipher watermarked data without damaging the embedded signal. Furthermore, the extraction of the hidden information can be performed without d...

2005
Rastislav Lukac Konstantinos N. Plataniotis

This paper presents a cost-effective private-key cryptosystem for color images. The scheme allows for secret sharing of the color image by generating two color shares with dimensions identical to those of the original. Encryption is performed via simple binary operations realized at the image bit-levels altering both the spectral correlation among the RGB color components and the spatial correl...

2017
S. Gowri

RGB Color Visual Cryptography is a type that allows the image to be divided into 2*2 (n*n) multiple numbers of shares knows transparent shares. In existing methods works for color images with 8 colors and even few of them without halftone techniques. Today as per the growth of digital media in world, it is becoming more prevalent to find a method to protect the security of that digital media. W...

2013
Rajesh Kumar Rai Swati Yadav

Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). This is the benefit of the visual secret sharing scheme. The encryption technique requires a cryptographic computati...

2012
Savita Patil

Visual cryptography is a special image encryption technique. It is different from traditional cryptography, because it does not need complex computation to decrypt. The benefit of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique proposed here...

2013
Rajinder Kaur

Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images. Image security has found a great need in many applications where the information (in the form of image) is to be protected from unauthorized access. Encryption is one of the ways to ensure high security. In recent years, encryption technology h...

Journal: :Int. Arab J. Inf. Technol. 2016
Osama M. Abu Zaid Nawal F. El Fishawy Elsayed Nigm

In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. The proposed cryptosystem algorithm is designated as PCACH. A recently developed encryption algorithm which is designated here, as HuXia is reviewed. These two algorithms are applied to three images of different color frequencies, i.e., different types of colored-images are encrypted with each ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید