The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For secure data transmission over internet, it is important to transfer data in high security and high confidentiality, information security is the most important issue of data communication in networks and internet. To secure transferred information from intruders, it is important to convert the information into cryptic format. Different methods used to ensure data security and confidentiality during...
Communication between devices and data through networks have been increasing drastically in the past few decades. Encryption of data provides high level of security. This paper presents a median based technique for selective encryption where partial data of image is encrypted based on pixel values. An encrypted mask of the image is also appended with the image that specifies the pixels that are encrypted...
The digital image data transmission and storage in today's cyberspace has increase with privacy and security concerns. Digital media collected from different sources such as surveillance systems, forensic databases, medical images are very sensitive hence security concerns regarding the safe transmission and authentication of such digital data across secured and unsecured communication channels needs...
Cryptography is the art of securing information by making sure that the secret can be understood only by the right person. Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network...
This paper proposes a wireless communication system for secure transmission of data. Bluetooth is used as the wireless communication medium due to its low-cost and low-power consumption features. Advanced encryption standard (AES) protocol is implemented for the security reason over Bluetooth stack. RC10 prototyping board with Xilinx XC3S1500L-4-FG320 device has been used for the hardware evaluation...
A new approach of digital image encryption is proposed based on the fractional Fourier transform and chaos. The algorithm can be summarized as follows. Firstly, scramble the image in time domain with chaos, and then combine it and the discrete fractional Fourier transform in X direction. Secondly, scramble the image obtained in the fractional Fourier domain with chaos, and then combine it and the...
This paper presents a novel fast algorithm, which consists of two parts, namely, Choquet fuzzy integral for generation of a pseudo-random keystream, and a self-adaptive masking process for increasing shuffling pixels of the image. The first part, which is the major core of the encryption algorithm, is a pseudo-random keystream generator based on the Choquet fuzzy integral. A 128-bit key is used for...
This paper presents a novel image security system based on the replacement of the pixel values using recursive Cellular automata (CA) substitution. The advantages of our proposed method are that it is computationally efficient and it is reasonably passing sensibility analysis tests. The proposed method is carried out by using one half of image data to encrypt the other half of the image mutually....
To better protect the security of information, this paper proposed an information transmission scheme which combined the cryptosystem and information hiding. The scheme pretreated the information firstly by making use of the RSA arithmetic which belongs to the public key cryptosystem, and then took advantage of the improved LSB which based on the Human Visual System to make the cryptograph hid in...
With the recent advances in internet and multimedia technologies by which the exchange and the transmission of information became easy, encryption methods have been proposed to protect confidential and secure digital data from illegal access. In this paper, we propose a new image encryption model that uses the Frei-Chen bases. The projections of the Frei-Chen bases on the image are used to represent...
The existing image encryption algorithms encrypt images independently, which means the probability of an eavesdropper working out one image stays the same under the same circumstances (same bits of keys and the same algorithm, for example). However, in real-life applications such as communication systems, on one hand, sequences of images may need to be sent with various security demands, and on the...
In this paper we are proposing a technique for secret communication between Alice and Bob. We are using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th bit locations or 7th and 8th bit locations or 6 and 8 bit locations of...
Steganography deals with hiding of data in images and steganalysis reveals the presence of data and also the data. In this paper, we propose a steganography technique that is based on randomizing the sequence of cipher bits. We compute the suitability measure of the various random sequences of the cipher bits against a given image and select the random sequence closest to the image. We generate these...
With the increased use of digital images in numerous fields, especially sensitive ones like medicine and military where confidentiality is extremely important, their encryption has become mandatory. This paper depicts our proposed digital image encryption technique which employs two types of non-linear pixel transformation and the traditional Hill cipher which is a Matrix Transformation (MT). While...
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies, there is a huge data transaction in mobile, internet, TV, teleconferencing, telemedicine and military applications. For all these applications we need a security. Encryption is one of way to give the security for data; in this regard we propose a hybrid approach for partial...
With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality,...
This paper proposes a novel confusion and diffusion algorithm for image encryption based on logistic map and cheat image. We choose the initial condition and control parameter of logistic map as the secret key. The cheat image selected from the most common images in public network, together with the chaotic matrices generated by logistic maps, is employed both in encryption and decryption processes...
The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new...
This work proposes a novel scheme for lossy compression of an encrypted image with flexible compression ratio. A pseudorandom permutation is used to encrypt an original image, and the encrypted data are efficiently compressed by discarding the excessively rough and fine information of coefficients generated from orthogonal transform. After receiving the compressed data, with the aid of spatial correlation...
A novel scheme on reality preserving image encryption is proposed in this paper. The Hilbert transform and the double random phase encoding are utilized in the proposed method. The encrypted image is real-valued without data expanding, which can benefit the digital processing of images by electronic computers where speed of computation is important. The image is processed in the plane which can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.