4,033 Hits in 5.5 sec

A Selective Video Encryption Scheme Based on Coding Characteristics

Shuli Cheng, Liejun Wang, Naixiang Ao, Qingqing Han
2020 Symmetry  
The H.264/AVC encoding algorithm encodes the video into multiple slices, and the slices are independent of each other.  ...  The key is generated by the pseudo-random number generator (PRNG) and updated in real time.  ...  Conflicts of Interest: The authors have declared that no competing interests exist.  ... 
doi:10.3390/sym12030332 fatcat:nxuweycbo5avhdv6kbgjqmf3my

A new color image encryption algorithm based on iterative mixing of color channels and chaos

Mohamed Essaid, Ismail Akharraz, Abderrahim Saaidi, Ali Mouhib
2017 Advances in Science, Technology and Engineering Systems  
The simulation results show that our algorithm is better for color images in terms  ...  In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic  ...  We have also improved the pseudo-randomness of the sequences generated by the Sine map, by a simple multiplication by 10 6 and an application of the modular arithmetic (mod 1).  ... 
doi:10.25046/aj020515 fatcat:dkdn5jmcujfg7m6hvcsl4krrye

Multi-Image Encryption Algorithm for 2D and 3D Images Based on Chaotic System

Xinyu Gao, Miao Miao, Xiaoyang Chen
2022 Frontiers in Physics  
In order to accommodate multiple types of image encryption, a multi-image encryption algorithm for 2D and 3D images is designed in this paper.  ...  After recording the type and number of images, the pixels/coordinates of multiple images are stored in a cube block and are subjected to confusion and diffusion operations.  ...  In order to follow the development of 3D printing technology and the progress of communication technology, an algorithm based on chaotic system, which is applicable to both 2D multi-image encryption and  ... 
doi:10.3389/fphy.2022.901800 doaj:ec74c1b270c648ecac4558c14b3ffd9e fatcat:5zt2676dunh4hgznadhrcssore

Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing

Mingfang Jiang, Hengfu Yang
2020 IEEE Access  
computation applications in cloud computing.  ...  The privacy-preserving image encryption process consists of block permutation, pixel diffusion, and a bit-plane random shift.  ...  APPLICATION IN IMAGE RETRIEVAL In this section, we will evaluate the effectiveness of secure feature extraction over encrypted images by applying the proposed PPBTC scheme to image retrieval.  ... 
doi:10.1109/access.2020.3000683 fatcat:kcqwyfs4bnh3rharj4g43uvix4

A remote-sensing image encryption scheme using DNA bases probability and twodimensional logistic map

Hui Liu, Bo Zhao, Linquan Huang
2019 IEEE Access  
The secure storage and transmission of remote-sensing images are of great significance.  ...  The experimental results show that the proposed algorithm can resist various existing attack schemes against remote-sensing images.  ...  The permutation-diffusion structure (PDS) [24] , [25] has been widely accepted in the field of chaos-based cryptography. In [24] , PDS was built for multiple-image encryption.  ... 
doi:10.1109/access.2019.2917498 fatcat:aed5rhg4gnb2bigdnanidxrbt4

PiouCrypt: Decentralized Lattice-based Method for Visual Symmetric Cryptography [article]

Navid Abapour, Mohsen Ebadpour
2022 arXiv   pre-print
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers.  ...  However, only limited novel solutions are provided for image encryption, and limiting the visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum  ...  Fig.16Ref.[26]'s Encrypted Image table to change it into the pseudo-random Algorithm 1 Encrypting Image Require: Plain Image Ensure: Cipher Image 1: Decomposition of input picture into red, green, and  ... 
arXiv:2204.08017v1 fatcat:hq27npnfazeujhjtz22lodyztm


Mohab Mostafa, Mohamed Waleed Fakhr
2018 The International Journal of Multimedia & Its Applications  
in terms of image watermarking, compression and encryption. 15 different images usually used in image processing benchmarking were used for testing the algorithm capabilities and experiments show that  ...  The algorithm capitalizes on the CS to compress and encrypt images jointly with Entropy Coding, Arnold Cat Map, Pseudo-random numbers and Advanced Encryption Standard (AES).  ...  Encryption strength is calculated by the complexity of finding the right Pseudo-random number SK 1 , Pseudo-random number SK 2 and the AES key as-well.  ... 
doi:10.5121/ijma.2018.10617 fatcat:4ewkifr4jjdafdktmeerljrola

Selective Cancellable Multi-Biometric Template Generation Scheme Based on Multi-Exposure Feature Fusion

Ahmed M. Ayoup, Ashraf A. M. Khalaf, Fahad Alraddady, Fathi E. Abd El-Samie, Walid El-Safai, Salwa M. Serag Eldin
2022 Intelligent Automation and Soft Computing  
The biometric face image is treated with an automatic face segmentation algorithm (Viola-Jones), and the image of the selected eye is XORed with a PRNG (Pseudo Random Number Generator) matrix.  ...  Arnold's cat map deformed eyes are encrypted using the Advanced Encryption Standard (AES) to encrypt the biometric data stored in the database.  ...  Acknowledgement: The authors thank the researchers of Taif University for their support. They support Project Number (TURSP-2020/214), Taif University, Taif, Saudi Arabia.  ... 
doi:10.32604/iasc.2022.024379 fatcat:kn5pf2o4zrdbnkal5rvonrm3su

New CA based Key Generation for a Robust RGB Color Image Encryption Scheme

Bala SuyambuJeyaram, Rama Raghavan, Krishna Shankara Narayanan
2013 International Journal of Computer Applications  
In the past few years, study of securing the digital images has increased tremendously and several encryption algorithms based on Cellular Automata have been proposed to protect the digital images against  ...  Here the random key image has been generated using 1D Cellular Automata and for the encryption purpose GF (2 8 ) is used. The encryption is done on pixel values of the RGB components separately.  ...  IMAGE ENCRYPTION SCHEME The proposed image encryption algorithm is based on GF(2 8 ) operations and it generates a high quality pseudo random key image of same size as plain image using CA.  ... 
doi:10.5120/13877-1760 fatcat:gkft4rp4l5fmfbvlmdcnpao4by

Tutorial Review on Image Hiding
IJARCCE - Computer and Communication Engineering

2014 IJARCCE  
In the world of digitalization, security of image documents is bigger challenge particularly in era of image processing and analysing.  ...  And one of the ways to get higher security is encryption.  ...  In encryption phase: vector quantization is applied for compressing the original image into a set of indices. 2.  ... 
doi:10.17148/ijarcce.2014.31102 fatcat:lp6yrzfdengm7io26prosv44ee

Communication in Network using Wavelet Transform

C. Parthasarathy, C.S. Ramanathan, S.K. Srivatsa
2011 International Journal of Computer Applications  
Huge amounts of digital visual data are stored on different media and exchanged over various sorts of networks nowadays. We propose new measures and techniques for encryption of image.  ...  Besides watermarking, steganography, and techniques for assessing data integrity and authenticity, providing confidentiality and privacy for visual data is among the most important topics in the area of  ...  In the embedding of CUN it uses asymmetric watermarking algorithm. Distributor PIN is also embedded into the image using private key Asymmetric encryption algorithm.  ... 
doi:10.5120/2035-2733 fatcat:nqyuezpcufdqvcryj27kcxpbke

Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform

Magdy Ibrahim ElSharkawy
2017 International Journal of Communication Networks and Information Security  
Accordingly, this led to an upsurge in research in the discipline of information security. cryptography plays a significant role in securing and verification of information exchanged via public communication  ...  The idea behind this approach depends on embedding the color components of each pixel of the video signal in a quaternion number.  ...  The pseudo code of the proposed encryption algorithm is shown in List.1.  ... 
dblp:journals/ijcnis/ElSharkawy17a fatcat:wkk4doqshjdnbloysrsf2a5nzq

Fundamentals of Multimedia Encryption Techniques [chapter]

Borko Furht, Daniel Socek, Ahmet Eskicioglu
2006 Multimedia Encryption and Authentication Techniques and Applications  
For example, the partial encryption is applicable to the videos that are based on the Set Partitioning In Hierarchical Trees (SPIHT) image compression algorithm, which is an application of zerotree wavelet  ...  Figure 2 . 2 Pseudo code of the key schedule stage of the AES algorithm.  ... 
doi:10.1201/9781420013450.ch3 fatcat:nsorx5x2w5fmregu2cblj6jb5a

Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key

Magdy Ibrahim ElSharkawy
2017 International Journal of Communication Networks and Information Security  
The current paper introduces a novel method for encrypting/decrypting audio signal using a selected digital image as a complicated key and cover for audio signal.  ...  Each sample of the audio signal is combined with the values of the three color components of a pixel fetched from the cover image yielding a quaternion number.  ...  The ciphered samples (m1, m2, …, mn) are sequentially transmitted. The pseudo codes of the encryption algorithm at the transmitter side is shown in List-1.  ... 
dblp:journals/ijcnis/ElSharkawy17 fatcat:6ytj5yznfbbkvi3xcuocjztpy4

Fpga Implementation of Image Encryption and Decryption Using Aes Algorithm Along With Key Encryption

Parul Rajoriya, Nilesh Mohota (Professor)
2017 IOSR Journal of Electronics and Communication Engineering  
A proposed FPGA-based implementation of the Advanced Encryption Standard(AES) algorithm along with key encryption for images is presented in this paper.  ...  The encrypted key is decrypted using RC4 decryption algorithm so as to give it as input to the AES decryption algorithm. The encrypted and decrypted image can be analysed in Matlab.  ...  Fig 4 presents the complete working of RC4 encryption algorithm. KSA generates the 256 byte initial state vector S, by scrambling input state vector with a random key K.  ... 
doi:10.9790/2834-1203024050 fatcat:6jq6saj4cvb2bfxsjwn2gg6kpq
« Previous Showing results 1 — 15 out of 4,033 results