نتایج جستجو برای: encryption of colored images
تعداد نتایج: 21183193 فیلتر نتایج به سال:
We describe an effective method for image encryption which employs magnitude and phase manipulation using carrier images. Although it involves traditional methods like magnitude and phase encryptions, the novelty of this work lies in deploying the concept of carrier images for encryption purpose. To this end, a carrier image is randomly chosen from a set of stored images. One dimensional (1-D) ...
Security concerns have taken front stage in the rapidly expanding digital exchange of data storage and transmission. Since use images is quickly across a wide range industries, it crucial to safeguard sensitive image from hackers. The need for protection has become critical. It now essential secure someone's privacy. preservation personal information been studied developed using variety ways. I...
We report on an algorithm to compress and encrypt simultaneously multiple images (target images). This method, which is based upon a specific spectral multiplexing (fusion without overlapping) of the multiple images, aims to achieve a single encrypted image, at the output plane of our system, that contains all information needed to reconstruct the target images. For that purpose, we divide the ...
In this work, lossless compression is considered and an efficient Encryption–then-compression (ETC) scheme proposed for medical images. A considerably good level of security achieved by the where image encryption operated in prediction error domain. addition, reasonably encrypted images achieved. Comparison done between Gradient adjusted (GAP) & Median Edge Detector (MED) techniques GAP fou...
Privacy-preserving of medical information (such as records and images) is an essential right for patients to ensure security against undesired access parties. This typically protected by law through firm regulations set healthcare authorities. However, sensitive-private data usually requires the application further privacy mechanisms such encipherment (encryption) techniques. ’Medical images’ o...
Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be either private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-int...
Multimedia systems mostly base security on a restricted access to services. In the context of real-time imaging applications, this model suffers several drawbacks. Applications become vulnerable to password attacks and once exposed attackers have access to all the data. An alternative consists of the systematic encryption of all data. When dealing with images, this approach is inconvenient beca...
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical over internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality critical part three security objectives for information systems security, namely confidentiality, integrity, availability. aspect secure storage transfer images. In thi...
The security of medical images is very important to maintain the confidentiality and privacy patient information. Medical practitioners are required adopt policies for access patient’s electronic This paper provides analysis Images based on Elliptic curve cryptography. cryptography (ECC) a complex method involves intense computation which makes it robust intruder attack. In this paper, ECC Imag...
This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images an algorithm for chaotic encryption, secure image storage, transmission. The that controls the operation of encryption algorithm: arrangement pixel positions, use AES to achieve creation algorithms, by dynamically updating control parameters numbers increase gener...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید