The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality,...
With digital multimedia distribution, intellectual property rights (IPR) are at a more risk than ever, due to the possibility of unlimited copying without fidelity loss. Encryption and copy protection mechanisms do not fully efficiently deal with the issue. Encryption usually protects the data only on the transport channel, and as soon as the data are decrypted for exhibit or playback, they can be...
According to the particular properties of discrete chaotic sequences, and combining the structure characters of digital images, obeying the common encryption principles of digital images, a discrete chaotic exclusive OR encryption scheme of digital images is carefully studied and proposed. In the light of the size of a digital image which needs to be encrypted, and producing a corresponding binary...
Side match vector quantization (SMVQ) is an image compression scheme that reduces the redundancy of a digital image. Some data hiding methods utilize SMVQ to embed secret data in an SMVQ-decompressed image, and reconstruct the original SMVQ code after the secret data have been extracted. This work proposes a data hiding scheme that embeds secret data in an SMVQ-decompressed image. A modulus function...
In the past few years, a number of image cryptosystems have been proposed. However, many of them have been shown to be insecure. In this paper we present a robust and efficient cryptosystem based on the synchronization of a chaotic time delay system to transmit a digital image in a secure way. It consists of two steps: the first one assures the transmitter/receiver synchronization, the second step...
Logistic map is a simple non-linear model, but it has complex dynamics. The chaotic sequence produced by logistic map is extremely sensitive to the change of its initial value. This paper analyzes traditional Logistic chaotic image encryption method, and proposes an improved encryption algorithm. The algorithm produces nine chaotic sequences, six are used to scramble the position of image pixels in...
According to the characteristics of discrete chaotic sequences and basic encrypting principles of information, and organically combining some inherent characteristics of digital images, with a view of high efficiency and perfect effect for encryption and decryption of digital images, meanwhile, and considering the high security of the encrypting algorithm, a discrete chaotic encrypting algorithm of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.