The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As it often happens in cryptography, a visual cryptographic method serves as primitive for more evolved file encryption algorithm. During the development and evaluation process of the pixel sieve method, several weaknesses popped out. In the attempt of solving these weaknesses a possibility to transform the method from pixel based graphical cryptographic method to a bit based file cryptographic method...
A novel permutation-substitution scheme, which is based on chaotic standard map, for the image encryption is proposed. It is loss-less symmetric block cipher and specifically designed for the colour images. The initial condition & system parameter of the chaotic standard map, number of iterations and number of rounds constitute the secret key of the algorithm. Firstly we mix all three colour layers...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of...
Encryption is used to transmit data in open networks with security. Each type of image has its own features, therefore different techniques can be adopted to protect the image from unauthorized access. Most of the available encryption algorithms are mainly used for large devices. There is no such image encryption algorithm with smallest key for smaller devices like cell phone, smart card etc. In this...
The purpose of digital image scrambling technology is to put a meaningful image into a disordered one to enhance the resistance ability against illegal attacks so as to improve security. This paper proposes an image scrambling transformation method based on the idea of inverse transformation in finite integer domain. It includes gray transformation and position transformation. At the same time, it...
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these algorithms can only change the cover itself to be encrypted. In this paper, the invertible watermarking can be used to perform the encryption, which can not only use the additional information...
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obsession that the important image information in transmission is easily intercepted by unknown persons or hackers. In order to enhance the image information security, image encryption becomes...
The watermark is more likely to prevent itself from JPEG-compression attack when it is embedded into the DC values of 8??8 DCT blocks. However, embedding the watermark with the same intensity into the DC values of DCT blocks may distort the watermarked image to a large extent. To solve this problem, a novel robust image-watermark algorithm is proposed with the characteristics of selective embedding...
As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. Therefore the communication security is now an important issue for multimedia communications. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system...
The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines...
The large-scale communication of multimedia data on Internet motivates the protection of digital information against illegal duplication and manipulation. Advances that facilitate electronic publishing and commerce also heighten threats of intellectual property theft and unlawful tampering. This work is concerned with the perceptual models used for data protection, secrete communication, author's...
This paper discusses a biometric encryption system using fuzzy vault scheme implemented on FPGA development board. Cryptographic algorithms are very secure overall but have a weak point in terms of the storage of the crypto keys. Biometric authentication systems have many exploitable weak points that can be used to compromise the system. Biometric encryption is a security scheme that combines strong...
Image encryption plays a vital role in many related aspects of our daily life. In this paper, we introduced a new image encryption algorithm using the Ikeda map. This encryption method inherits the advantages of chaos-based encryption method, which has a high sensitivity to the encryption key, a large space of encryption keys, a random-like property, etc. The same encryption algorithm can be also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.