The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter and Facebook. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces for protecting brute-force attacks, each block in encrypted...
This paper is among the first to adapt automatic jigsaw puzzle solvers, which are methods of assembling jigsaw puzzles, to the field of information security. Block-based scrambling encryption schemes, which have been mainly proposed for Encryption-then-Compression (ETC) systems, have enough key spaces for protecting brute-force attacks. However, each block in encrypted images has almost the same correlation...
In this paper, a novel encryption and decryption method for color images based on the Hadamard transform (HT) and logical modulation has been proposed. Firstly, considering security and efficiency, together, our cryptosystem combined with image compression can reduce encryption time and promote real-time secure image transmission and storage. Then the compressed image is encrypted by logical modulation...
In this paper, a new algorithm combined compression and image encryption is presented. The proposed algorithm can be used in the field of high-speed confidential data transmission where security is required. The compression is based on a hierarchical structure called SPIHT(Set Partitioning in Hierarchical Trees). This compression is followed by an encryption scheme PSCS (Parametric Switching Chaotic...
Gyrator transform is a new tool for image encryption. In this paper, the security of image encryption based on random phase encoding in gyrator transform domains was analyzed. For image encryption with single random phase encoding and gyrator transform, the operation of random phase encoding only changes the phase angle of the original secret image instead of the amplitude of the image. So, the encryption...
This paper introduces a new image encryption algorithm based on the parametric discrete cosine transform (PDCT). It combines the PDCT with the phase encoding technique to form a double-level encryption and provides high security protection to images with a low computation cost. Simulations and analysis are provided to show the excellent encryption performance of the proposed algorithm in protecting...
As digital chaos is affected by the limited precision of computer, chaotic sequence properties present short periodicity. For the phenomenon of digital chaos, the paper analyzes similar-short periodicity of digital chaos and puts forward a novel generator of digital chaos key sequence. Meanwhile, we detail the DCT (Discrete Cosine Transformation) compression and Wavelet compression method, and then...
In this paper we have proposed an image crypto-compression system that guarantees a secure storage and transfer while preserving the performance of the used compression method. Regarding compression, we have chosen to use the discrete cosine transformation (DCT), Huffman coding and RLE because of their efficiency and their use in most current cryptocompression systems. As for encryption, we have made...
In this paper, encryption/decryption of color image is proposed by using Linear Canonical Transform (LCT). The color image is to be encrypted, firstly separated into its three primary channels: red, green, and blue and then each channel are encrypted independently using double random phase encoding technique. The parameters which generate the LCT domain during encryption / decryption are considered...
This paper proposes a compression-combined digital image encryption method which is robust against consecutive packet loss and malicious shear attack. We utilize the characteristics of compressive sensing, dimensional reduction and random projection, to compress and encrypt a digital image simultaneously. On this basis, block Arnold scrambling is used to permutate the position of measurements. Bit...
With the recent advances in internet and multimedia technologies by which the exchange and the transmission of information became easy, encryption methods have been proposed to protect confidential and secure digital data from illegal access. In this paper, we propose a new image encryption model that uses the Frei-Chen bases. The projections of the Frei-Chen bases on the image are used to represent...
With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality,...
This paper proposes a novel confusion and diffusion algorithm for image encryption based on logistic map and cheat image. We choose the initial condition and control parameter of logistic map as the secret key. The cheat image selected from the most common images in public network, together with the chaotic matrices generated by logistic maps, is employed both in encryption and decryption processes...
With digital multimedia distribution, intellectual property rights (IPR) are at a more risk than ever, due to the possibility of unlimited copying without fidelity loss. Encryption and copy protection mechanisms do not fully efficiently deal with the issue. Encryption usually protects the data only on the transport channel, and as soon as the data are decrypted for exhibit or playback, they can be...
Many methods have been put forth to perform image encryption using Chaotic Neural Networks. In this paper, another method of chaotic image encryption called the “Triple-Key” method is introduced. In this method, it is required to enter an 80-bit session key in addition to the initial parameter key and the control parameter key. Each of the keys forms just one part of the lock that needs to be opened...
This paper presents a method for encrypting user's data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. The key can be unpacked only by presenting a genuine fingerprint image. The fingerprint images are compared using an efficient fingerprint matching algorithm that involves a Phase...
In this paper, an efficient and secure encryption scheme for JPEG2000 codestream is proposed. The scheme encrypts each codeblock contribution to a packet (CCP) and does not introduce superfluous JPEG2000 markers in the protected codestream. It achieves full information protection for data confidentiality, and maintains all the advanced features of the original JPEG2000 codestream such as error resilience...
A novel permutation-substitution scheme, which is based on chaotic standard map, for the image encryption is proposed. It is loss-less symmetric block cipher and specifically designed for the colour images. The initial condition & system parameter of the chaotic standard map, number of iterations and number of rounds constitute the secret key of the algorithm. Firstly we mix all three colour layers...
This paper proposes a new joint error correction and encryption scheme based on turbo codes, which can be called as turbo-based encryption. The new scheme should have high error-correcting capability as well as security. In order to encrypt information by turbo code, two measures are adopted: 1) The interleaver of turbo code is improved, therefore it can be controlled by a secret key; 2) Another interleaver...
An improved image encryption method, which is based on hyperchaotic sequence, is proposed. Firstly, chaotic sequences based on Rössler hyperchaotic system are generated, and the image is pro-encrypted by replacing pixels in the image with generated sequences; then horizontal rows and vertical rows in the pro-encrypted image are further scrambled with Logistic mapping, in order to improve the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.