نتایج جستجو برای: encryption of color images

تعداد نتایج: 21193363  

Journal: :Cryptography 2023

This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes composite key r x of 128-bits to create small in-dimension private (a chaotic map), which is then resized match the matrix dimension. uncomplicated can be applied any without modification. Image quality, sensitivity anal...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

this thesis seeks to present a critical reading of virginia woolf’s mrs. dalloway and michael cunningham’s the hours in terms of an intertextual approach, concentrating on dialogic imagination, negativity, transposition and allusion. this study attempts to evaluate cunninghams perception of woolfs life and work by adopting kristevas conception of intertextuality and her consideration of the hou...

Journal: :Ain Shams Engineering Journal 2020

Journal: :Bulletin of Electrical Engineering and Informatics 2022

In order to prevent unwanted access sensitive data by unauthorized individuals, color images are encoded. Because chaotic-deoxyribonucleic acid (chaotic-DNA) encoding can make information highly secure, it is often employed in image encryption. this study, a new encryption technique has been proposed based on 4D-chaotic system and DNA computing. The algorithm consists of two phases: the first p...

Journal: :I. J. Network Security 2016
Warakorn Srichavengsup Wimol San-Um

Cryptography has recently played a significant role in secure data transmissions and storages. Most conventional data encryption schemes are relatively complicated and complexity in encrypted keys is insufficient, resulting in long computational time and low degree of security against all types of attacks. Consequently, a highlysecured and robust data encryption scheme is necessary. This paper ...

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

the images of muslims in media, literature and politics have been mostly black and white portrayals of a people alien to modernity, civilization, rationality and pluralism. since the end of the cold war and the onset of deadly terrorist attacks in different areas of the world, especially in the united states, these representations show a palpable difference: muslims are represented not only as ...

Journal: :Journal of ICT Research and Applications 2022

In this work, three sub-processes are serially integrated into just one process in order to construct a robust new image encryption scheme for all types of images, especially color images. This integration architecture aims create avalanche effect property while respecting the constraints confusion and diffusion that have been identified by Claude Shannon as properties required secure scheme. T...

Journal: :iranian journal of fuzzy systems 2014
p. moallem n. razmjooy b. s. mousavi

potato image segmentation is an important part of image-based potato defect detection. this paper presents a robust potato color image segmentation through a combination of a fuzzy rule based system, an image thresholding based on genetic algorithm (ga) optimization and morphological operators. the proposed potato color image segmentation is robust against variation of background, distance and ...

Journal: :journal of tethys 0

the kalut-e-ashrafa area is located in the north-east of ardakan area in central iran, yazd province. this area promises copper mineralization. the most of the minerals in this study area are silica-rich veins and veinlets. therefore, in order to identify geological formations with silica zones and to determine potential mineralization areas, aster images and remote sensing methods were used. a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید