نتایج جستجو برای: image encryption

تعداد نتایج: 400416  

2013
Prabhudev Jagadeesh P. Nagabhushan R. Pradeep Kumar

The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos, pay-TV and video on demand, one of the required features is that the quality ...

2014
Weichuang Guo Junqin Zhao Ruisong Ye

A great many chaos-based image encryption schemes have been proposed in the past decades. Most of them use the permutation-diffusion architecture in pixel level, which has been proved insecure enough as they are not dependent on plain-images and so cannot resist chosen/known plain-image attack usually. In this paper, we propose a novel image encryption scheme comprising of one permutation proce...

2016
Lavisha Sharma Anuj Gupta

An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography fo...

2013
Gamil R. S. Qaid Sanjay N. Talbar

The most important factors in e-applications are security, integrity, non-repudiation, confidentiality and authentication services. Nowadays, confidentiality and security of the digital images attract more the attention more, especially when these digital images are transmitted over the internet or stored in some types of memory. Many different image encryption algorithms and techniques have be...

2013
Osama M. Abu Zaid Nawal A. El-Fishawy E. M. Nigm Osama S. Faragallah

In this paper, a proposed encryption scheme based on Henon chaotic system (PESH) is presented in order to meet the requirements of secure image transfer. Scheme based on Henon chaotic system by Chen Wei-bin et al., will be designated here as (SHCH). SHCH and a proposed encryption scheme (PESH) are applied for encrypting by changing the values of the image pixels. Combination of shuffling the po...

2012
Amnesh Goel Nidhi Chandra Subariah Ibrahim Jinping Fan Yonglin Zhang

The image encryption methods have become very important in the today’s scenario because images are widely used for various purposes and transmission of digital image over network has increased drastically. Handling of images demand more security as they contain confidential information in it and the concept of encryption has been used for years. Here we proposing a new enhancement to the algori...

Journal: :Signal Processing 2014
Weiming Zhang Kede Ma Nenghai Yu

A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that additional data can be embedded in the estimating errors. A benchmark encryption algorithm (e.g. AES) is applied to the rest pixels of the image and a special encryption scheme is designed to encrypt ...

2014
Bhavya Ahuja Deepika Aggarwal

Abstract: In [4], we had proposed a new technique for secret communication of a digital image through a network exposed to attackers by combining two popular information security techniques: Cryptography and Steganography. We used a modified version of AES for encryption which uses a key stream generator (W7) and four techniques for steganography (one in spatial and three in frequency domain) w...

Journal: :Scientia Iranica 2022

This paper proposes a new symmetric cryptographic system using chaotic systems. The basic idea is that random strand generated from functions. developed merged with the obtained original image. researcher used tables called multiple encryption in composition of these strands. These are produced according to specific pattern. combination algorithm randomly selects table set and performs operatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید