نتایج جستجو برای: image encryption
تعداد نتایج: 400416 فیلتر نتایج به سال:
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images. Image security has found a great need in many applications where the information (in the form of image) is to be protected from unauthorized access. Encryption is one of the ways to ensure high security. In recent years, encryption technology h...
In addition focuses on image encryption techniques, As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. This paper focuses mainly on the different kinds of image encryption and decryption techniques and a new technique to encrypt image so that image can beco...
An image is a pertinent data because of its visual characteristics. Image should be encrypted appropriately due to sensitivity to changes as well as security perspective. But as of inherent characteristics of image, standard encryption algorithms are not appropriate for image encryption. Recently, research on image encryption using chaos theory has been emerged. In this research, work chaos bas...
Image encryption is one of the most common and important method of image data encryption. Image encryption deals with applying image encryption algorithms to the sending image and convert it into cipherimage, and only authorized person can decrypt the cipher-image to gent the original image, this done using secret key(s). There are big numbers of encryption techniques including chaos-based sche...
Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...
Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to genera...
Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to genera...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید