Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "image encryption" wg kryterium: Temat


Wyświetlanie 1-25 z 25
Tytuł:
A known-plaintext attack on iterative random phase encoding in fractional Fourier domains
Autorzy:
Yin, F.
He, Q.
Liu, Z.
Tematy:
image encryption
phase encoding
known-plaintext attack
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/174043.pdf  Link otwiera się w nowym oknie
Opis:
Known-plaintext attack is considered for decrypting the image generated by iterative random phase encoding in fractional Fourier transform domains. The double random phase encoding in Fourier domains is introduced to design the known-plaintext attack procedure. The decryption test is explored without both fractional order and these random phase masks. Some numerical simulations are made to demonstrate the validity of the known-plaintext attack.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression-encryption algorithm combining compressive sensing with log operation
Autorzy:
Chen, R.-L.
Zhou, Y.
Luo, M.
Zhang, A.-D.
Gong, L.-H.
Tematy:
image encryption
image compression
compressive sensing
log operation
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/174009.pdf  Link otwiera się w nowym oknie
Opis:
Based on compressive sensing and log operation, a new image compression-encryption algorithm is proposed, which accomplishes encryption and compression simultaneously. The proposed image compression-encryption algorithm takes advantage of not only the physical realizability of partial Hadamard matrix, but also the resistance of the chosen-plaintext attack since all the elements in the partial Hadamard matrix are 1, –1 or log 1 = 0. The proposed algorithm is sensitive to the key and it can resist various common attacks. The simulation results verify the validity and reliability of the proposed image compression-encryption algorithm.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption based on permutation polynomials over finite fields
Autorzy:
Wu, Jianhua
Liu, Hai
Zhu, Xishun
Tematy:
finite field
permutation polynomials
scrambling
diffusion
image encryption
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/1835797.pdf  Link otwiera się w nowym oknie
Opis:
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists of four stages: i) a mapping from pixel gray-levels into finite field, ii) a pre-scrambling of pixels’ positions based on the parameterized permutation polynomial, iii) a symmetric matrix transform over finite fields which completes the operation of diffusion and, iv) a post-scrambling based on the permutation polynomial with different parameters. The parameters used for the polynomial parameterization and for constructing the symmetric matrix are used as cipher keys. Theoretical analysis and simulation demonstrate that the proposed image encryption scheme is feasible with a high efficiency and a strong ability of resisting various common attacks. In addition, there are not any round-off errors in computation over finite fields, thus guaranteeing a strictly lossless image encryption. Due to the intrinsic nonlinearity of permutation polynomials in finite fields, the proposed image encryption system is nonlinear and can resist known-plaintext and chosen-plaintext attacks.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption algorithm by using the logistic map and discrete fractional angular transform
Autorzy:
Yu, J.
Li, Y.
Xie, X.
Zhou, N.
Zhou, Z.
Tematy:
image encryption
logistic map
discrete fractional angular transform
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173813.pdf  Link otwiera się w nowym oknie
Opis:
A new image encryption scheme based on logistic map and discrete fractional angular transform has been proposed. In the proposed scheme, the original image is encrypted with the random sequence generated by the logistic map, and the encrypted image is subsequently processed by the discrete fractional angular transform, which produces the ciphertext after double encryptions. The parameters of the logistic map and the order of the discrete fractional angular transform serve as the main keys of the image encryption algorithm. Simulation results show that the proposed image encryption algorithm can effectively resist the attacks of statistical analysis, and has acceptable encryption effect and security.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system
Autorzy:
Nie, Zhe
Liu, Zheng-Xin
He, Xiang-Tao
Gong, Li-Hua
Tematy:
hyper-chaotic system
advanced encryption standard
discrete cosine transform
image encryption
image compression
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/174108.pdf  Link otwiera się w nowym oknie
Opis:
An image compression and encryption algorithm by combining the advanced encryption standard (AES) with the hyper-chaotic system is designed, in which Arnold map is employed to eliminate part of the block effect in the image compression process. The original image is compressed with the assistance of a discrete cosine transform and then its transform coefficients are encrypted with the AES algorithm. Besides, the hyper-chaotic system is adopted to introduce the nonlinear processfor image encryption. Numerical simulations and theoretical analyses demonstrate that the proposed image compression and encryption algorithm is of high security and good compression performance.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression and encryption algorithm with wavelet-transform-based 2D compressive sensing
Autorzy:
Fan, Jing-Hui
Liu, Xian-Bao
Chen, Yan-Bin
Tematy:
wavelet transform
compressive sensing
chaos scrambling
image encryption
image compression
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/175122.pdf  Link otwiera się w nowym oknie
Opis:
By combining a wavelet transform with chaos scrambling, an image compression and encryption algorithm based on 2D compressive sensing is designed. The wavelet transform is employed to obtain the sparse representation of a plaintext image. The sparse image is measured in two orthogonal directions by compressive sensing. Then, the result of 2D compressive sensing is confused by the Arnold transform and the random pixel scrambling. The combination of four-dimensional chaos and logistic map is exploited to generate the first row of the key-controlled circulant matrix. The proposed algorithm not only carries out image compression and encryption simultaneously, but also reduces the consumption of the key by controlling the generation of measurement matrix. Experimental results reveal that the proposed image compression and encryption algorithm is resistant to noise attacks with good compression performance and high key sensitivity.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reversible data-hiding-through-encryption scheme using rotated stream cipher
Autorzy:
Manikandan, V. M.
Tematy:
reversible data-hiding
image encryption
image decryption
secure message transmission
Pokaż więcej
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Powiązania:
https://bibliotekanauki.pl/articles/2097957.pdf  Link otwiera się w nowym oknie
Opis:
Research into the domain of reversible data-hiding has received a great deal of attention in recent years due to its wide applications in medical image transmission and cloud computing. Reversible data-hiding during image encryption is a recently emerged framework for hiding secret data in an image during the image-encryption process. In this manuscript, we propose a new reversible data-hiding-through-encryption scheme that will ensure a high embedding rate without bringing any additional overhead of key handling. The proposed algorithm can use any secure symmetric encryption scheme, and the encryption and/or decryption key should be shared with the receiver for data extraction and image recovery. As per the proposed scheme, the data hider can hide threebits of a secret message in an image block of a size of B × B pixels. The data extraction and image recovery will be carried out by analyzing the closeness between adjacent pixels. The simulation of the new scheme carried out on the USC-SIPI dataset shows that the proposed scheme outperforms the well-known existing schemes in terms of embedding rates and bit error rates.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption based on Chebyshev chaotic map and S8 S-boxes
Autorzy:
Hussain, Iqtadar
Anees, Amir
Alkhaldi, Ali Hussain
Aslam, Muhammad
Siddiqui, Nasir
Ahmed, Rehan
Tematy:
image encryption
chaos
noise-resistant
statistical analysis
key sensitivity
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173918.pdf  Link otwiera się w nowym oknie
Opis:
The encryption of image data is artful as compare to others due to some special characteristics such as entropy, contrast, the correlation between the pixels, intensity, and homogeneity. During encryption process, it is conventionally not easy to manage these characteristics with non-chaotic cryptosystems. Therefore for the sake of strong encryption algorithms, in last decades many cryptographers have presented invulnerable schemes for image encryption based on the chaotic maps. This manuscript aims to propose a strong encryption scheme based on a symmetric group of permutation advanced encryption standard (AES) substitution boxes and modified Chebyshev map. Principally, the secret key depends upon the parameters of Chebyshev map to create confusion in the main image and is encrypted by the scheme made from the S8 AES S-boxes and chaotic map. By this procedure, one can obtain an encrypted image that is entirely twisted. The results of analyses showed that the presented image encryption is strong and invulnerable.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A simple and practical color image encryption with the help of QR code
Autorzy:
Deng, X
Zhu, X.
Tematy:
color image encryption
quick response (QR) code
joint transform correlator (JTC)
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173289.pdf  Link otwiera się w nowym oknie
Opis:
A simple and practical color image encryption is proposed with the help of quick response (QR) code. The original color image to be encoded is firstly transformed into the corresponding QR code, and then a joint transform correlator encrypting architecture is used to encode the corresponding QR code into a positive ciphertext. In the decryption, the corresponding QR code can be restored with the correct decryption key, and hence the original color image can be retrieved without any quality loss by scanning the restored QR code with a smartphone. Compared with the reported color image encryption techniques, the proposed technique does not need to convert color image (RGB) into indexed image formats or segregate into three color components prior to encryption and hence the corresponding reverse processes also are not required after decryption. Moreover, with the help of the QR code, the proposed method has strong tolerance to speckle noise and other noises resulting from optical system. In addition, the proposed method is practical because its ciphertext is a positive image and can be printed directly or manufactured as a card. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption combining discrete fractional angular transform with Arnold transform in image bit planes
Autorzy:
Zhou, Z.
Yu, J.
Liao, Q.
Gong, L.
Tematy:
Arnold transform
bit plane
discrete fractional angular transform
image encryption algorithm
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173704.pdf  Link otwiera się w nowym oknie
Opis:
A new image encryption algorithm by using a discrete fractional angular transform and Arnold transform in image bit planes is investigated. In the image encryption algorithm, the original image is encrypted by the Arnold transform in image bit planes firstly, and then the resulting image is encrypted by the discrete fractional angular transform further. The key of the image encryption algorithm includes the parameters of the Arnold transform and the order of the discrete fractional angular transform. It is shown that the proposed image encryption algorithm is of high security and strong enough to counteract some conventional image attack manners.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation
Autorzy:
Jiang, Hao
Nie, Zhe
Zhou, Nanrun
Zhang, Wenquan
Tematy:
image encryption
compressive sensing
double random phase encoding
Josephus traversing
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173461.pdf  Link otwiera się w nowym oknie
Opis:
A double-image encryption scheme based on compressive sensing is designed by combining a double random phase encoding technique with Josephus traversing operation. Two original images are first compressed and encrypted by compressive sensing in the discrete wavelet domain and then connected into a complex image according to the order of the alternate rows. Moreover, the resulting image is re-encrypted into stationary white noise by a double random phase encoding technique. Lastly, Josephus traversing method is utilized to scramble the transformed image. The initial states of the Henon chaotic map are the secret keys of this double-image encryption algorithm, which can be used to control the construction of the measurement matrix in compressive sensing and generation of the random-phase mask in double random phase encoding. Simulation results show that the proposed double-image encryption algorithm is effective and secure.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Asymmetric double-image encryption using twin decomposition in fractional Hartley domain
Autorzy:
Kumar, Jaideep
Singh, Phool
Yadav, Ak
Tematy:
double image encryption
twin decomposition
asymmetric cryptosystem
fractional Hartley transform
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/2060684.pdf  Link otwiera się w nowym oknie
Opis:
Twin decomposition, consisting of equal and random modulus decompositions, not only makes a cryptosystem asymmetric but also resists special attack. A new double-image asymmetric crypto-system using twin decomposition in fractional Hartley domain is proposed. An input grayscale image, bonded with another grayscale image as its phase mask, is transformed via fractional Hartley transform. Equal modulus decomposition is applied on the resulting image, giving us two intermediate images. One of them is subjected to another fractional Hartley transform followed by random modulus decomposition, whereas the other serves as the first private key. The application of random modulus decomposition also results in two images: encrypted image and the second private key. During the process of decryption, firstly the encrypted image is combined with second private key and thereafter it is subjected to inverse fractional Hartley transform. The resulting image is then combined with the first private key, and followed by another inverse fractional Hartley transform, thus recovering the two original images. The proposed cryptosystem is validated for pairs of grayscale images.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Double-image encryption scheme based on the phase-truncated multiple-parameter Fresnel transform
Autorzy:
Zhou, Ling
Zhou, Hang
Ma, Yan
Zhou, Nan-Run
Tematy:
chaotic system
phase-truncated multiple-parameter Fresnel transform
scrambling
diffusion
image encryption
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/2086756.pdf  Link otwiera się w nowym oknie
Opis:
A double-image encryption algorithm is proposed with the phase-truncated multiple-parameter Fresnel transform. Firstly, the pixel positions of two plaintext images are scrambled and then the results are merged into one image with the scrambling operation. Subsequently, the resulting image is encrypted by phase truncation and phase reservation in the multiple-parameter Fresnel transform domain. The phase information is scrambled by the affine transform and then recombined with the amplitude information. The final encryption image is obtained with the pixel scrambling and diffusion methods to further enhance the security of the image encryption system, where the scrambling and diffusion operations are based on logistic map, logistic-sine system and 2D logistic-adjusted-sine map. The image encryption scheme is robust against the common attacks due to the nonlinear properties of diffusion and phase truncation. Numerical simulation results verify the performance and the security of the proposed double-image algorithm based on the phase-truncated multiple-parameter Fresnel transform.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Double-image encryption algorithm based on discrete fractional angular transform and fractional Fourier transform
Autorzy:
Qiu, Tian
Dai, Wei-Hua
Chen, Su-Hua
Zhou, Hang
Gong, Li-Hua
Tematy:
chaotic system
fractional transform
discrete fractional angular transform
double-image encryption
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/2172857.pdf  Link otwiera się w nowym oknie
Opis:
By combining fractional Fourier transform with discrete fractional angular transform, a double-image encryption algorithm is designed. The discrete cosine transform is performed on two grayscale images to generate a spectrum image, and then the generated spectrum image is compressed into an image with Zigzag scanning. The compressed image is processed with the discrete fractional angular transform, and then fractional Fourier transform and double random phase coding are executed on the image. The DNA operation controlled by chaotic system is introduced to change the pixel values. Finally, the ciphertext image is obtained through bit-level permutation and pixel adaptive diffusion. The statistical information of the plaintext images is employed as the input of the SHA-256 to calculate the initial conditions of the chaotic map. Simulation experiments demonstrate that the double-image encryption algorithm can effectively reduce the correlation among adjacent pixels of the plaintext images.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane zagadnienia implementacyjne zaawansowanych algorytmów kryptografii wizualnej
Selected aspects of implementation of advanced visual cryptography algorithms
Autorzy:
Wiśniewski, P.
Ogiela, M. R.
Tematy:
podział sekretu
kryptografia wizualna
szyfrowanie informacji obrazowej
secret sharing
visual cryptography
image encryption
Pokaż więcej
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Powiązania:
https://bibliotekanauki.pl/articles/155838.pdf  Link otwiera się w nowym oknie
Opis:
W publikacji scharakteryzowano dwa zaawansowane algorytmy kryptografii wizualnej: tzw. rozszerzoną kryptografię wizualną, w której istnieje możliwość umieszczenia fałszywych danych w sekretnych częściach obrazu, oraz skuteczną technikę szyfrowania obrazów kolorowych. Zaprezentowano także przykładową aplikację umożliwiającą użycie jednej z czterech metod oraz odczyt utajnionej informacji. Otrzymane wyniki działania opisywanych algorytmów potwierdzają wysoką skuteczność tego rodzaju technik kryptograficznych oraz zasadność ich praktycznego zastosowania.
The paper presents two advanced visual cryptography algorithms: extended visual cryptography (EVCS) [2], where it is possible to place false information in shares of an image, and an effective encryption method for color images. This publication also presents an example application, which allows its user to execute one of four visual cryptography algorithms and to decrypt the secret information by joining shares. The first section shows the purpose of encrypting image data and main advantages of visual cryptography. In the second section an idea of secret sharing is presented. The third section describes visual cryptography techniques, where it is possible to create meaningful shares by encoding false information into shadow images. An example of (2,4)-threshold EVCS scheme is presented for a secret binary image. The fourth section presents a visual cryptography algorithm suitable for color images, which was analysed using a sample image. In the fifth section a visual cryptography system is proposed and its main features are presented, including procedure descriptions and obtained execution times of encryption algorithms. The summary presents the advantages of advanced visual cryptography algorithms and the utility of the application created for research. The obtained results of executing the described algorithms confirm the efficiency of these cryptographic techniques and the validity of its practical applications.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption scheme based on a Gaussian apertured reality-preserving fractional Mellin transform
Autorzy:
Wang, Mengmeng
Pousset, Yannis
Carré, Phillippe
Perrine, Clency
Zhou, Nanrun
Wu, Jianhua
Tematy:
image encryption
Gaussian apertured reality-preserving FrMT
Collins diffraction
Arnold transform
bitwise XOR
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/1835799.pdf  Link otwiera się w nowym oknie
Opis:
An image encryption scheme based on a Gaussian apertured reality-preserving fractional Mellintrans form (GARPFrMT) is proposed. The GARPFrMT was realized in the diffraction domain.The Gaussian aperture, like a soft aperture, improved the amount of light that passed through the lens compared to a hard aperture and reduced the light leakage at the edge of the lens, assisting to some extent in resisting direct attacks. In the proposed scheme, the reality-preserving transform was constructed in the diffraction domain to ensure that the cipher-text is real. The GARPFrMT is a nonlinear transformation used for eliminating potential insecurity existing in the linear image encryption system. In order to further enhance the security of the encryption system, an Arnold transform, and a bitwise XOR operation were employed for permutation and scrambling in the encryption process. Simulation results and theoretical analysis show that the proposed algorithm is feasible and capable of with standing several common attacks.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain
Autorzy:
Singh, H.
Tematy:
fractional Hartley transform
FrHT
image encryption
mean squared error
noise attacks
entropy
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173502.pdf  Link otwiera się w nowym oknie
Opis:
This paper proposed an enhanced asymmetric cryptosystem scheme for optical image encryption in the fractional Hartley transform domain. Grayscale and binary images have been encrypted separately using double random phase encoding. Phase masks based on optical vortex and random phase masks have been jointly used in spatial as well as in the Fourier planes. The images to be encrypted are first multiplied by optical vortex and random phase mask and then transformed with direct and inverse fractional Hartley transform for obtaining the encrypted images. The images are recovered from their corresponding encrypted images by using the correct parameters of the fractional Hartley transform and optical vortex, whose digital implementation has been performed using MATLAB 7.6.0 (R2008a). The random phase masks, optical vortex and transform orders associated with the fractional Hartley transform are extra keys that cause difficulty to an unauthorized user. Thus, the proposed asymmetric scheme is more secure as compared to conventional techniques. The efficacy of the proposed asymmetric scheme is verified by computing the mean squared error between recovered and the original images. The sensitivity of the asymmetric scheme is also verified with encryption parameters, noise and occlusion attacks. Numerical simulation results demonstrate the effectiveness and security performance of the proposed system.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Color image encryption using affine transform in fractional Hartley domain
Autorzy:
Singh, P.
Yadav, A. K.
Singh, K.
Tematy:
color image encryption
affine transform
fractional Hartley transform
occlusion and noise attacks
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173825.pdf  Link otwiera się w nowym oknie
Opis:
A novel scheme for color image encryption using the fractional Hartley and affine transforms is proposed. An input color image is first decomposed in its RGB (red, green and blue) components. Each component is bonded with a random phase mask and then subjected to a fractional Hartley transform followed by affine transform. Thereafter, a second random phase mask is applied to each component before the final transformation by fractional Hartley transform resulting in a component-wise encrypted image. Finally, all three components are combined to give a single channel encrypted image. The scheme is validated with numerical simulations performed on a color image of size 256 × 256 × 3 pixels using MATLAB 7.14. The use of affine transform along with fractional Hartley transform adds to the security. The scheme is evaluated for its sensitivity to the parameters of the fractional Hartley and affine transforms. On analysing the plots of correlation coefficient and mean-squared-error, the scheme is found to be highly sensitive to the encryption parameters. Also, it is evaluated for its robustness against the usual noise and occlusion attacks. The proposed scheme is secure and robust owing to multiplicity of encryption parameters introduced through the type of transforms used.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Color image encryption scheme based on quaternion discrete multi-fractional random transform and compressive sensing
Autorzy:
Ye, Huo-Sheng
Dai, Jing-Yi
Wen, Shun-Xi
Gong, Li-Hua
Zhang, Wen-Quan
Tematy:
color image encryption
quaternion discrete multi-fractional random transform
compressive sensing
confusion-diffusion strategy
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/2033985.pdf  Link otwiera się w nowym oknie
Opis:
A color image compression-encryption algorithm by combining quaternion discrete multi-fractional random transform with compressive sensing is investigated, in which the chaos-based fractional orders greatly improve key sensitivity. The original color image is compressed and encrypted with the assistance of compressive sensing, in which the partial Hadamard matrix adopted as a measurement matrix is constructed by iterating Chebyshev map instead of utilizing the entire Guassian matrix as a key. The sparse images are divided into 12 sub-images and then represented as three quaternion signals, which are modulated by the quaternion discrete multi-fractional random transform. The image blocking and the quaternion representation make the proposed cryptosystem avoid additional data extension existing in many transform-based methods. To further improve the level of security, the plaintext-related key streams generated by the 2D logistic-sine-coupling map are adopted to diffuse and confuse the intermediate results simultaneously. Consequently, the final ciphertext image is attained. Simulation results reveal that the proposed cryptosystem is feasible with high security and has strong robustness against various attacks.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cellular automata and their application in image encryption
Automaty komórkowe i ich zastosowania w kodowaniu obrazów
Autorzy:
Służalec, Tomasz
Opis:
In the thesis cellular automata and their use in encryption are discussed. The first section contains fundamentals of linear cellular automata. Next parts focus on reversing cellular automata and their cyclic behavior. Sample programs based on the mentioned theorems are presented. The final chapter presents the image encryption algorithm based on cellular automata.
W pracy zostały umówione automaty komórkowe oraz ich zastosowanie w szyfrowaniu. W pierwszym rozdziale zawarte są podstawowe wiadomości dotyczące liniowych automatów komórkowych. Następne rozdziały skupiają się na odwracaniu automatów komórkowych orazich cyklicznym zachowaniu. W pracy zawarte są przykładowe programy wykorzystujące zaprezentowane twierdzenia. W końcowym rozdziale przedstawiono algorytm szyfrowania obrazów w oparciu o automaty komórkowe.
Dostawca treści:
Repozytorium Uniwersytetu Jagiellońskiego
Inne
Tytuł:
Color image encryption using singular value decomposition in discrete cosine Stockwell transform domain
Autorzy:
Vaish, A.
Kumar, M.
Tematy:
discrete cosine Stockwell transform
image encryption
singular value decomposition
mean square error
structural similarity index measurement
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/173700.pdf  Link otwiera się w nowym oknie
Opis:
In this paper, an image encryption technique using singular value decomposition (SVD) and discrete cosine Stockwell transform (DCST) is proposed. The original source image is encrypted using bands of DCST along with the SVD decomposed images. The number of bands in DCST, parameters used to mask the singular values, the way of permutation used to shuffle the values of SVD transformed images and the way of arrangement of SVD matrices are used as encryption keys. It is necessary to have correct knowledge of all the keys along with their respective values, for correct decryption of encrypted images. The robustness and the quality measurement of proposed work are analyzed by comparing it with some existing works.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved reference image encryption methods based on 2k correction in the integer wavelet domain
Autorzy:
Tuncer, Turker
Dogan, Sengul
Tadeusiewicz, Ryszard
Pławiak, Paweł
Tematy:
visually meaningful image encryption
2k correction
discrete wavelet transform
least significant bits embedding
szyfrowanie obrazu
dyskretna transforma falkowa
metoda szyfrowania
Pokaż więcej
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Powiązania:
https://bibliotekanauki.pl/articles/330196.pdf  Link otwiera się w nowym oknie
Opis:
Many visually meaningful image encryption (VMIE) methods have been proposed in the literature using reference encryption. However, the most important problems of these methods are low visual quality and blindness. Owing to the low visual quality, the pre-encrypted image can be analyzed simply from the reference image and, in order to decrypt nonblind methods, users should use original reference images. In this paper, two novel reference image encryption methods based on the integer DWT (discrete wavelet transform) using 2k correction are proposed. These methods are blind and have high visual quality, as well as short execution times. The main aim of the proposed methods is to solve the problem of the three VMIE methods existing in the literature. The proposed methods mainly consist of the integer DWT, pre-encrypted image embedding by kLSBs (k least significant bits) and 2k correction. In the decryption phase, the integer DWT and preencrypted image extraction with the mod operator are used. Peak signal-to-noise ratio (PSNR) measures the performances of the proposed methods. Experimental results clearly illustrate that the proposed methods improve the visual quality of the reference image encryption methods. Overall, 2k correction and kLSBs provide high visual quality and blindness.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multi-color-image compression-encryption scheme in the quaternion discrete Fresnel domain
Autorzy:
Hu, Ze-Ting
Zeng, Ping-Ping
Ding, Hong-Xing
Gong, Li-Hua
Chen, Su-Hua
Tematy:
compressive sensing
quaternion discrete Fresnel transform
2D-LSCM chaotic system
image compression-encryption algorithm
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/58970442.pdf  Link otwiera się w nowym oknie
Opis:
A multiple color images compression-encryption scheme is designed with compressive sensing in the quaternion discrete Fresnel transform. To tackle multiple color images in a holistic manner, the discrete Fresnel transform is extended into the quaternion domain and the images are encrypted with the quaternion discrete Fresnel transform. In this scheme, the RGB color components of plaintext images are simultaneously compressed and encrypted in three mutually independent channels. Then the red, green and blue components are scrambled respectively by a chaos sequence generated by the 2D logistic-sine-coupling map. Each color component matrix is compressed with sparse representation and matrix measurement. Subsequently, the compressed matrices are integrated into the quaternion algebras and re-encrypted by the defined quaternion discrete Fresnel transform. The devised nonlinear cryptosystem originates from the asymmetric phase truncation operation. In decryption, the original color images are reconstructed by the gradient descent with a sparsification algorithm. The proposed multiple color images compression-encryption algorithm is feasible, effective, secure and robust.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optical asymmetric double-image encryption and authentication in an interference-based scheme using sparse representation
Autorzy:
Luan, Guangyu
Huang, Caojun
Tematy:
optical encryption
asymmetry
interference
double-image
authentication
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/2172860.pdf  Link otwiera się w nowym oknie
Opis:
We report an optical asymmetric scheme for double-image encryption and authentication based on interference using sparse representation. We employ sparse representation and interference to process the Fresnel spectra related with the two original images, and then respectively acquire two ciphertexts and two pairs of private keys. Each original image possesses its corresponding two private keys. Furthermore, the decrypted image is compared with its corresponding plaintext with the aid of a nonlinear correlation for authentication. In the proposed scheme, any information concerning each primary image and comprising its silhouette cannot be recognized even though one, two, or even three masks of the two ciphertexts and two private keys are utilized for decryption. The Fresnel spectrum functions which have different diffraction distances enhance the security of the proposal significantly. Moreover, the proposal also avoids the crosstalk problem. The effectiveness and security of this proposed method are demonstrated via numerical simulations.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Robust dual color images watermarking scheme with hyperchaotic encryption based on quaternion DFrAT and genetic algorithm
Autorzy:
Luo, Hui-Xin
Gong, Li-Hua
Chen, Su-Hua
Tematy:
color image watermarking
hyperchaotic encryption
quaternion discrete fractional angular transform
quaternion singular value decomposition
genetic algorithm
Pokaż więcej
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Powiązania:
https://bibliotekanauki.pl/articles/27310094.pdf  Link otwiera się w nowym oknie
Opis:
A robust dual color images watermarking algorithm is designed based on quaternion discrete fractional angular transform (QDFrAT) and genetic algorithm. To guarantee the watermark security, the original color watermark image is encrypted with a 4D hyperchaotic system. A pure quaternion matrix is acquired by performing the discrete wavelet transform (DWT), the block division and the discrete cosine transform on the original color cover image. The quaternion matrix is operated by the QDFrAT to improve the robustness and the security of the watermarking scheme with the optimal transform angle and the fractional order. Then the singular value matrix is obtained by the quaternion singular value decomposition (QSVD) to further enhance the scheme’s stability. The encryption watermark is also processed by DWT and QSVD. Afterward, the singular value matrix of the encryption watermark is embedded into the singular value matrix of the host image by the optimal scaling factor. Moreover, the values to balance imperceptibility and robustness are optimized with a genetic algorithm. It is shown that the proposed color image watermarking scheme performs well in imperceptibility, security, robustness and embedding capacity.
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-25 z 25

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies