The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the modern digital era, the storage of digital data in multi-users systems and transmission over the internet is prime important in the society. The cryptographic technique is one of the possible solutions for protecting digital information for unauthorized uses. In this technique, the encryption algorithm should be simple to design and implementation. In the proposed article, a novel color image...
This paper mainly focused on image hiding process by LSB substitution method and applying scanning methodology as a key on stego-image. As the use digital techniques for transmitting and storing images are increasing, It becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various techniques which are discovered from time to time to encrypt...
The paper describes MS EXCEL-based application implementing the processes of encryption and decryption of English texts using the Hill cipher based on the matrix of size 3×3. The processes of encryption and decryption of 6-character words in English are illustrated. Numerous examples obtained by the application developed are presented in the paper. The material is used in the educational process in...
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptography Scheme. This proposal shows a new visual cryptography for color image by proposing special table for both IP and IP−1 in a way to increase the diffusion then putting the plain image...
A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column...
Exchange of data over the open networks and internet is rapidly growing so security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc. In today's world most of the multimedia applications involve images. Image encryption has applications in internet communication, multimedia systems, medical imaging, telemedicine,...
Chaos based encryption techniques have been gaining immense attraction for the past few years with a view of enhancing security coupled with reduction in computational complexity. This paper explores the drawbacks of chaotic key based algorithm (CKBA) which was primarily designed for monochrome images. We put forth an improved chaotic key based image encryption algorithm for monochrome and color images...
A random phase mask plays a significance role in encryption/decryption of color image. In this paper we are presenting a comparison between chaotic function and different random phase masks, which is used encryption decryption of color images, based on Fractional Fourier Transform (FRT). Random The different fractional orders and random phase masks used during the process of encryption and decryption...
The using of binary affine transformation for simultaneous encryption-decryption of two images the same dimension that are clearly marked internal contours.
Information security is an important issue. Today's encryption technologies can be traced back to the earliest ciphers, and have grown as a result of evolution. The first ciphers were cracked, so new, stronger ciphers emerged. Code breakers set to work on these and eventually found flaws, forcing cryptographers to invent better ciphers and so on. Hill Cipher is one of the most famous symmetric cryptosystem...
In this paper, an optical cryptosystem with adaptive steganography is proposed for color image encryption and decryption. The optical cryptosystem employs a double random phase encoding algorithm to encrypt and decrypt color images. The color image is first separated into three channels: red, green, and blue. Each channel is encrypted by two random phase masks generated from session keys. For higher...
A novel scheme for the embedding XML file in a 24-bit BMP color image using steganographic technique is presented in this paper. The lab color space is used instead of the RGB color space which is found to be more suitable for watermarking application. The XML file that is to be embedded is encrypted by providing a password and decrypted during watermark detection phase. The watermark detection process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.