نتایج جستجو برای: encryption of colored images

تعداد نتایج: 21183193  

2006
S. R. M. Prasanna A. Mitra

We describe an effective method for image encryption which employs magnitude and phase manipulation using carrier images. Although it involves traditional methods like magnitude and phase encryptions, the novelty of this work lies in deploying the concept of carrier images for encryption purpose. To this end, a carrier image is randomly chosen from a set of stored images. One dimensional (1-D) ...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

Security concerns have taken front stage in the rapidly expanding digital exchange of data storage and transmission. Since use images is quickly across a wide range industries, it crucial to safeguard sensitive image from hackers. The need for protection has become critical. It now essential secure someone's privacy. preservation personal information been studied developed using variety ways. I...

Journal: :Optics letters 2010
A Alfalou C Brosseau

We report on an algorithm to compress and encrypt simultaneously multiple images (target images). This method, which is based upon a specific spectral multiplexing (fusion without overlapping) of the multiple images, aims to achieve a single encrypted image, at the output plane of our system, that contains all information needed to reconstruct the target images. For that purpose, we divide the ...

Journal: :International journal of online and biomedical engineering 2022

In this work, lossless compression is considered and an efficient Encryption–then-compression (ETC) scheme proposed for medical images. A considerably good level of security achieved by the where image encryption operated in prediction error domain. addition, reasonably encrypted images achieved. Comparison done between Gradient adjusted (GAP) & Median Edge Detector (MED) techniques GAP fou...

Journal: :Journal of Sensor and Actuator Networks 2022

Privacy-preserving of medical information (such as records and images) is an essential right for patients to ensure security against undesired access parties. This typically protected by law through firm regulations set healthcare authorities. However, sensitive-private data usually requires the application further privacy mechanisms such encipherment (encryption) techniques. ’Medical images’ o...

2003
Young-Ho Seo Dong-Wook Kim

Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be either private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-int...

2004
Marc Van Droogenbroeck

Multimedia systems mostly base security on a restricted access to services. In the context of real-time imaging applications, this model suffers several drawbacks. Applications become vulnerable to password attacks and once exposed attackers have access to all the data. An alternative consists of the systematic encryption of all data. When dealing with images, this approach is inconvenient beca...

Journal: :Bulletin of Electrical Engineering and Informatics 2022

Medical images are one of the most significant and sensitive data types in computer systems. Sending medical over internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality critical part three security objectives for information systems security, namely confidentiality, integrity, availability. aspect secure storage transfer images. In thi...

Journal: :Shanghai Ligong Daxue xuebao 2021

The security of medical images is very important to maintain the confidentiality and privacy patient information. Medical practitioners are required adopt policies for access patient’s electronic This paper provides analysis Images based on Elliptic curve cryptography. cryptography (ECC) a complex method involves intense computation which makes it robust intruder attack. In this paper, ECC Imag...

Journal: :Malaysian Journal of Fundamental and Applied Sciences 2023

This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images an algorithm for chaotic encryption, secure image storage, transmission. The that controls the operation of encryption algorithm: arrangement pixel positions, use AES to achieve creation algorithms, by dynamically updating control parameters numbers increase gener...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید