Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

This paper presents a cost-effective private-key cryptosystem for color images. The scheme allows for secret sharing of the color image by generating two color shares with dimensions identical to those of the original. Encryption is performed via simple binary operations realized at the image bit-levels altering both the spectral correlation among the RGB color components and the spatial correl...

متن کامل

Building Key-Private Public-Key Encryption Schemes

In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA master public-keys. This security property has applications in the prevention of traffic analysis in coalition networking environments. In this pap...

متن کامل

Dynamic Key Exchange Method for Image Encryption

In recent years, a variety of image encryption scheme has been proposed. A new color image encryption method based on dynamic key exchange is proposed in this paper. For real time image encryption and lesser amount of time. The algorithm lacks of the characteristic of diffusion because each pixel is operated individually and a chosen/known-plaintext attack can break the scheme. The 192-bit-long...

متن کامل

Private-key Symbolic Encryption Schemes

Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security analysis aiming at the automated verification of network protocols. The näıve use of symbolic encryption, however, may unnecessarily require an expensive construction: an arbitrary-length encryption scheme that is private and non-malleable in an adaptive CCACPA setting. Most of the time, such assumptions rem...

متن کامل

Key-Private Proxy Re-encryption

Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys of the participants or the content of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Kirkuk University Journal-Scientific Studies

سال: 2018

ISSN: 2616-6801

DOI: 10.32894/kujss.2018.142398