Taguchi Optimization Method for Testing Best Image Encryption Algorithm
نویسندگان
چکیده
منابع مشابه
optimization of wet type milling process parameters for nano particles using taguchi method and genetic algorithm
0
متن کاملParametric optimization of cylindrical grinding process through hybrid Taguchi method and RSM approach using genetic algorithm
The present investigation proposes a hybrid technique: Taguchi method, response surface methodology (RSM) and genetic algorithm (GA), to analyze, model and predict vibration and surface roughness in traverse cut cylindrical grinding of aluminum alloy. Experiments have been conducted as per L9 orthogonal array of Taguchi methodology using several levels of the grinding parameters. Analysis of va...
متن کاملOptimization of Genetic Algorithm Parameters for Multi-channel Manufacturing Systems by Taguchi Method
An important issue in multi-channel manufacturing (MCM) design is the channel formation process. In this study, the control parameters that affect the performance of genetic algorithms (GAs) developed to solve channel formation problem, are examined and the optimum values of such parameters are explored using Taguchi method. Two types of problems were taken into account in terms of machines, pa...
متن کاملA new encryption algorithm for image cryptosystems
There are two major dierences of the characteristics of the text data and image data. One dierence is that the size of image data is usually much larger than that of text data. The other is that plain data rarely permit loss when a compression technique is used, but image data do. In this paper, we design an ecient cryptosystem for images. Our method is based on vector quantization, which is...
متن کاملDynamic Key Exchange Method for Image Encryption
In recent years, a variety of image encryption scheme has been proposed. A new color image encryption method based on dynamic key exchange is proposed in this paper. For real time image encryption and lesser amount of time. The algorithm lacks of the characteristic of diffusion because each pixel is operated individually and a chosen/known-plaintext attack can break the scheme. The 192-bit-long...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing and Digital Systems
سال: 2020
ISSN: 2210-142X
DOI: 10.12785/ijcds/090520