The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we are proposing a technique for secret communication between Alice and Bob. We are using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th bit locations or 7th and 8th bit locations or 6 and 8 bit locations of...
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies, there is a huge data transaction in mobile, internet, TV, teleconferencing, telemedicine and military applications. For all these applications we need a security. Encryption is one of way to give the security for data; in this regard we propose a hybrid approach for partial...
The using of binary affine transformation for simultaneous encryption-decryption of two images the same dimension that are clearly marked internal contours.
The security of digital images attracts much attention recently. For images the transformation can be implemented at two levels, the first one consists of the pixel value permutation and the second one consists of position permutation. In this paper, we propose an encryption scheme for digital images with new pixel position permutation method based on Evolvable Hardware (EHW). In this work, we use...
As it often happens in cryptography, a visual cryptographic method serves as primitive for more evolved file encryption algorithm. During the development and evaluation process of the pixel sieve method, several weaknesses popped out. In the attempt of solving these weaknesses a possibility to transform the method from pixel based graphical cryptographic method to a bit based file cryptographic method...
This paper presents a image encryption algorithm based on Arnold transformation and chaotic mapping. Firstly, Arnold transformation is used to scramble image. Then we use Tent mapping to encrypt scrambled image. The result shows that the algorithm is easy to realize, providing high security.
In this paper, a novel image cheat-encryption algori-thm based on hyper-chaotic Chen-system is proposed. The hyper-chaos is employed to encrypt plain image into cheat-like image. The cheat-image is transferred in network and easily neglected by attackers. If cheat succeeds, it is impossible to decrypt. When the cheat-image fails to cheat the attackers, security and performance analysis shows the cheat-encryption...
A new encryption scheme for digital images based on compound Chaos algorithm is presented in this paper. The compound Chaos algorithm combines the Lorenz Chaotic system and Logistics map to generate the pseudo-random sequences. Then the pseudo-random sequences are used to produce the permutation matrix to encrypt the digital image. Matlab is used for simulation testing of the image encryption. Algorithm...
In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and image steganography. We encrypt the secret message by using a new cipher which is extended from Hill cipher. Then the cipher text of the secret message is embedded into the carrier image in 6th, 7th and 8th bit locations of the darkest and brightest pixels. Here 8th bit means...
In this paper the audio and image are converted into unified data format. This data is then converted into randomized spectral components using two dimensional discrete fractional random transform. The parameters of encryption scheme are also utilized as a key in watermark embedding process. At the receiver end the data is decrypted, decoded for watermark and then reconverted to their original data...
A novel scheme for the embedding XML file in a 24-bit BMP color image using steganographic technique is presented in this paper. The lab color space is used instead of the RGB color space which is found to be more suitable for watermarking application. The XML file that is to be embedded is encrypted by providing a password and decrypted during watermark detection phase. The watermark detection process...
According to the characteristics of discrete chaotic sequences and basic encrypting principles of information, and organically combining some inherent characteristics of digital images, with a view of high efficiency and perfect effect for encryption and decryption of digital images, meanwhile, and considering the high security of the encrypting algorithm, a discrete chaotic encrypting algorithm of...
Todaypsilas Information Technology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-added by embedding other hidden-service within the main service, hence promoting value-added to the service. The value-added services are accomplished by using the technique of Multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.