A proposed model for text and image encryption using different techniques
نویسندگان
چکیده
Data security and protection is one of the most common technologies used in field computer science. This because its great importance all fields related to daily life, whether political, economic, other aspects change. In this research paper, a new intelligent system that concentrates on image text encryption decryption proposed. Furthermore, recognition rate increased. Rivest Shamir Adleman 3 key (RSA3k) algorithm but technique encrypt decrypt text. The proposed relies using square root public as private key. XOR operation for colored images performed. By calculating signal noise ratio (PSNR), mean error (MSE), bit (BER), important things we address how provide data large based techniques increase multimedia texture date problem time accuracy matching. results show quality after good.
منابع مشابه
investigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
Different Image Encryption and Decryption Techniques and Ka Image Cryptography
In addition focuses on image encryption techniques, As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. This paper focuses mainly on the different kinds of image encryption and decryption techniques and a new technique to encrypt image so that image can beco...
متن کاملProposed Model of Dynamic Encryption using Steganography
Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. So Information hiding techniques are received increasing attention due to: the availability of multimedia and digital form objects. And the need to present solutions to criminal copying and copyright problems. In this paper, a new encry...
متن کاملProposed Hyperchaotic System for Image Encryption
This paper presents a new hyper chaos system based on Hénon and Logistic maps which provides characteristics of high capacity, security and efficiency. The Proposed hyper chaos system is employed to generate the key for diffusion in an image encryption algorithm. The simulation experiments to the image encryption algorithm which based on the proposed hyper chaos system show that the algorithm s...
متن کاملA survey report on Different Techniques of Image Encryption
In the present world when whole web is now coming on from text data to multimedia data, one of the major security concerns is the protection of this multimedia data. Image, which covers the highest percentage of the multimedia data, its protection is very important. This can be achieved by Image encryption. There are so many different techniques should be used to protect confidential image data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TELKOMNIKA Telecommunication Computing Electronics and Control
سال: 2022
ISSN: ['1693-6930', '2302-9293']
DOI: https://doi.org/10.12928/telkomnika.v20i4.23367