Secure Image Encryption and Decryption in Full Motion Video

نویسنده

  • S Raghunath Reddy
چکیده

Encryption and Decryption is mainly used to transfer the data between the two communication channels. This paper explains the normal approach of the encryption as well as decryption by using chaotic algorithm and also tried to implement this in video frames. Here the basic chaotic encryption algorithm used to encrypt the images by using the three dynamic chaotic systems (Lu or Chen or Lorenz) to shuffle the pixel positions (permutation) and changing the pixel values (scrambling) to confuse the relationship between the plain image frame and cipher image frame by changing this it automatically increase the resistance to attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Image Encryption Technique Based on Permutation and Combination

“Combination of Encryption and Decryption for secure communication is an application”. Here I am using Permutation and substitution technique to make our data more secure. It is concerned in hiding the information in secure and robust manner so that the confidentiality of the data remains. This paper also attempts to identify the requirement of good key generation algorithm and its decryption. ...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Partial encryption of compressed images and videos

The increased popularity of multimedia applications places a great demand on eecient data storage and transmission techniques. Network communication, especially over a wireless network , can easily be intercepted and must be protected from eavesdroppers. Unfortunately, en-cryption and decryption are slow and it is often diicult, if not impossible, to carry out real-time secure image and video c...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014