نتایج جستجو برای: encryption of colored images

تعداد نتایج: 21183193  

Journal: :International Journal of Computing and Digital Systems 2020

2013
Ali Soleymani Zulkarnain Md Ali Md Jan Nordin

This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned. Keywords—Image, cryptography, encryption, security, an...

2017
Semir Zeki Samuel Cheadle Joshua Pepper Dimitris Mylonas

We undertook psychophysical experiments to determine whether the color of the after-image produced by viewing a colored patch which is part of a complex multi-colored scene depends on the wavelength-energy composition of the light reflected from that patch. Our results show that it does not. The after-image, just like the color itself, depends on the ratio of light of different wavebands reflec...

Journal: :CoRR 2013
Quist-Aphetsi Kester

The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary...

2013
KRISHAN GUPTA

In addition focuses on image encryption techniques, As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. This paper focuses mainly on the different kinds of image encryption and decryption techniques and a new technique to encrypt image so that image can beco...

Journal: :Journal of experimental psychology. Learning, memory, and cognition 2002
Felix A Wichmann Lindsay T Sharpe Karl R Gegenfurtner

The authors used a recognition memory paradigm to assess the influence of color information on visual memory for images of natural scenes. Subjects performed 5%-10% better for colored than for black-and-white images independent of exposure duration. Experiment 2 indicated little influence of contrast once the images were suprathreshold, and Experiment 3 revealed that performance worsened when i...

Journal: :Applied optics 2012
Hong Di Kangfeng Zheng Xin Zhang Edmund Y Lam Taegeun Kim You Seok Kim Ting-Chung Poon Changhe Zhou

We present multiple-image encryption (MIE) based on compressive holography. In the encryption, a holographic technique is employed to record multiple images simultaneously to form a hologram. The two-dimensional Fourier data of the hologram are then compressed by nonuniform sampling, which gives rise to compressive encryption. Decryption of individual images is cast into a minimization problem....

Journal: :Journal of Multimedia 2011
Zhenjun Tang Xianquan Zhang

Encryption is an efficient way to protect the contents of digital media. Arnold transform is a significant technique of image encryption, but has weaknesses in security and applications to images of any size. To solve these problems, we propose an image encryption scheme using Arnold transform and random strategies. It is achieved by dividing the image into random overlapping square blocks, gen...

2014
Mohit Kumar Akshat Aggarwal Ankit Garg

Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise des...

Journal: :CoRR 2012
Chengqing Li Yuansheng Liu Tao Xie

Recently, a novel image encryption scheme based on improved hyperchaotic sequences was proposed. A pseudorandom number sequence, generated by a hyper-chaos system, is used to determine two involved encryption functions, bitwise exclusive or (XOR) operation and modulo addition. It was reported that the scheme can be broken with some pairs of chosen plain-images and the corresponding cipher-image...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید