The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the recent advances in internet and multimedia technologies by which the exchange and the transmission of information became easy, encryption methods have been proposed to protect confidential and secure digital data from illegal access. In this paper, we propose a new image encryption model that uses the Frei-Chen bases. The projections of the Frei-Chen bases on the image are used to represent...
Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless...
In this work, we propose a color image encryption of variable sizes using logistic chaotic map. We considered a process of permutation, followed by a diffusion algorithm. To evaluate this encryption method's performance, we applied a statistical analysis, and developed histograms of the original and encrypted images. For the correlation analysis, we evaluate the behavior of two adjacent pixels on...
In this manuscript, we describe a fully pipelined single chip architecture for implementing a new simultaneous image compression and encryption method suitable for real-time applications. The proposed method exploits the DCT properties to achieve the compression and the encryption simultaneously. First, to realize the compression, 8-point DCT applied to several images are done. Second, contrary to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.