Taguchi Optimization Method for Testing Best Image Encryption Algorithm

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Parametric optimization of cylindrical grinding process through hybrid Taguchi method and RSM approach using genetic algorithm

The present investigation proposes a hybrid technique: Taguchi method, response surface methodology (RSM) and genetic algorithm (GA), to analyze, model and predict vibration and surface roughness in traverse cut cylindrical grinding of aluminum alloy. Experiments have been conducted as per L9 orthogonal array of Taguchi methodology using several levels of the grinding parameters. Analysis of va...

متن کامل

Optimization of Genetic Algorithm Parameters for Multi-channel Manufacturing Systems by Taguchi Method

An important issue in multi-channel manufacturing (MCM) design is the channel formation process. In this study, the control parameters that affect the performance of genetic algorithms (GAs) developed to solve channel formation problem, are examined and the optimum values of such parameters are explored using Taguchi method. Two types of problems were taken into account in terms of machines, pa...

متن کامل

A new encryption algorithm for image cryptosystems

There are two major di€erences of the characteristics of the text data and image data. One di€erence is that the size of image data is usually much larger than that of text data. The other is that plain data rarely permit loss when a compression technique is used, but image data do. In this paper, we design an ecient cryptosystem for images. Our method is based on vector quantization, which is...

متن کامل

Dynamic Key Exchange Method for Image Encryption

In recent years, a variety of image encryption scheme has been proposed. A new color image encryption method based on dynamic key exchange is proposed in this paper. For real time image encryption and lesser amount of time. The algorithm lacks of the characteristic of diffusion because each pixel is operated individually and a chosen/known-plaintext attack can break the scheme. The 192-bit-long...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing and Digital Systems

سال: 2020

ISSN: 2210-142X

DOI: 10.12785/ijcds/090520