نتایج جستجو برای: encryption of colored images

تعداد نتایج: 21183193  

2012
Amnesh Goel Nidhi Chandra Subariah Ibrahim Jinping Fan Yonglin Zhang

The image encryption methods have become very important in the today’s scenario because images are widely used for various purposes and transmission of digital image over network has increased drastically. Handling of images demand more security as they contain confidential information in it and the concept of encryption has been used for years. Here we proposing a new enhancement to the algori...

Journal: :Appl. Soft Comput. 2012
N. K. Sreelaja G. A. Vijayalakshmi Pai

Encryption of binary images is essential since it is vulnerable to eavesdropping in wired and wireless networks. The security of data becomes important since the communications over open network occur frequently. This paper focuses on encryption of binary image using a stream cipher method. In this paper we propose an Ant Colony Optimization (ACO) based approach of generating keys for encryptio...

2016

In secret communication, images are widely used and the major issues are how to protect the image and also reduce size of the image in order to maximize the network utilization. Various techniques are there in order to secure the image and to reduce the size of the image. In many practical scenarios, encryption of an image has to be conducted before the image compression. In proposed scheme, bo...

2017
Garima Pal Vijay Kumar Verma

Cryptosystems have always had tremendous applications in the fields of data security. With ever growing applications of digital images, encryption of images has emerged as a highly sought after area of research. In this present paper, a novel adaptive pixel masking scheme has been introduced for image encryption. Since images undergo degradations while transmission as well as storage, an image ...

2013
Bala Suyambu Jeyaram Rama Raghavan Krishna Shankara Narayanan Jun Jin S. Nandi B. K. Kar P. P. Chaudhuri F. Maleki A. Mohades S. Mehdi Hashemi M. E. Shiri F. Seredynski P. Bouvry A. Y. Zomaya

In the past few years, study of securing the digital images has increased tremendously and several encryption algorithms based on Cellular Automata have been proposed to protect the digital images against different cryptographic attacks. This paper proposes a novel pixel based encryption scheme based on Cellular Automata and Galois Field. Here the random key image has been generated using 1D Ce...

2014
Mona F. M. Mursi Hossam Eldin H. Ahmed Fathi E. Abd El-samie Ayman H. Abd El-aziem

Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel, where apart from preventing illegal data access, images are used in many fields such as medical science and military. The protection of images can be done with image encryption. The majority ...

Journal: :J. Information Security 2010
Vacharee Prashyanusorn Yusaku Fujii Somkuan Kaviya Somsak Mitatha Preecha P. Yupapin

For sustainable tourism, a novel method of security camera operation is proposed. In the method, security cameras, which encrypt the taken images and store them into the memory card inside, are used. Only when crimes occur, the memory cards are taken out from the cameras and the images are decrypted with the key and viewed by the city government and/or the police. When no crimes occur, images a...

Alimoradi, Reza, Gholami, Ahmad, Noorallahzadeh, Mohammad Hossein,

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

2015
Tanuja Sarode Pallavi N Halarnkar

Image encryption is one of most useful way of securing image data. Traditional data security algorithms are also used over images but due to the bulkiness of image data they are not useful. Chaotic sequences play a very good role in image cryptographic system, due to their high sensitivity to initial condition and other properties. In this paper, B-spline functions of first three orders are stu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید