Efficient Method to Message-Image Cryptography Using Reordered Image-Key

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography using an Image

An information is a message which is received and understood. Information can be sent one person to another over a long range but the process of sending information must be done in a secure way especially in case of a private message. Mathematicians and E ngineers have historically relied on different algorithmic techniques to secure messages and signals. Cryptography, to most people, is concer...

متن کامل

Symmetric Key Generation Method using Digital Image

In this paper, the authors propose a new key generation algorithm based on using a binary image. The proposed algorithm converts 16×16 binary array representing the digital image into 4×4 array, then it converts the new generated array into 4×4 decimal array. The decimal array and the left diagonal of the original array are then used to generate the public key that is used to encrypt the data t...

متن کامل

Image Authentication using Visual Cryptography

This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a...

متن کامل

New Method for Analysis of image sensor to produce and evaluate the image

In this paper, a new method for evaluating CMOS image sensors based on computer modeling and analysis is introduced. Image sensors are composed of different parts, each of which has a specific effect on image quality. Circuits of image sensors can be evaluated and analyzed using circuit simulators or theoretically, but these methods cannot help to produce the final image. In order to produce th...

متن کامل

Secure Image Steganography using Cryptography and Image Transposition

Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Traitement Du Signal

سال: 2023

ISSN: ['0765-0019', '1958-5608']

DOI: https://doi.org/10.18280/ts.400122