The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a perceptually scalable and JPEG compression tolerant DCT-based image encryption scheme is proposed. There are two main features of the proposed scheme, first the decryption algorithm is able to reconstruct the plaintext-image even if the encrypted image is JPEG compressed. Secondly, the encryption algorithm can be adjusted to produce cipher-image with varying perceptual distortion...
This paper uses the open source computer vision library (OpenCV for short) as basic library and calls library functions to achieve real-time video capture and output. We narrate the process of making the matrix interpretable as an image through analyzing the data structure of IplImage and meaning of its member variable. The library functions to read video take the video frame for unit and the storage...
A novel scheme on reality-preserving image encryption is proposed in this paper. The chaos function and the linear canonical transform are employed. The unpredictability and initial sensitivity properties of chaotic system are utilized to generate both the scrambling matrix and the masks for encryption. The image is processed in the linear canonical domain via saving half of the spectrum to construct...
In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and A5/1. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. So a chaotic Henon and baker's map is used to generate permutation matrix. An external secret key is used to derive the initial conditions for the chaotic map. Pixel shuffling...
This paper presents a new image encryption algorithm, in this algorithm, shuffling matrix and diffusing matrix are generated based on Chen's hyper-chaotic system. Firstly, the Chen's hyper-chaotic system is used to shuffle the position of the image pixels, then use Chen's hyper-chaotic system to confuse the relationship between the original image and the cipher image. The experimental results demonstrate...
This Cellular Automata (CA) has been used in cryptography over the past decade for its advantages in generating pseudo-random sequence. In this paper, a novel encryption algorithm for image in our project is proposed, which is based on an improved two-dimensional CA approach. A weighted and p-interval two-dimensional CA approach forms a new evolutionary matrix including lots of optional parameters...
The period of Arnold transformation is a key parameter, which affects its application effectiveness in the fields of image encryption, digital watermark, information hiding, etc. However, the previous research results on the period of discrete two-dimensional Arnold transformation are very rough estimation and lack of practical application value. By analyzing the relationship between the image order...
A new encryption scheme for digital images based on compound Chaos algorithm is presented in this paper. The compound Chaos algorithm combines the Lorenz Chaotic system and Logistics map to generate the pseudo-random sequences. Then the pseudo-random sequences are used to produce the permutation matrix to encrypt the digital image. Matlab is used for simulation testing of the image encryption. Algorithm...
Multimedia security is already one of the most crucial problems in information science. Specially, as the character of digital image, the traditional cipher such as DES and RSA are not suitable for being applied to encrypt the digital image. Therefore, the study of image encryption scheme attracts the interest of large researchers. Nowadays, a variety of image encryption methods have been proposed...
The dynamic response of chaotic system is unpredictable and highly sensitive to the variation of initial values of a system. Therefore, the distinguished elements of variables applied to produce encryption codes for the color-image encryption can increase the communication security. This paper proposed a hybrid encryption technique for the color image based on the multi-chaotic-system which combines...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.