The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work,...
In this paper, a novel involutory parametric transform is proposed by exploiting the reciprocal-orthogonal parametric transform. In addition, a recursive algorithm is proposed for its simple construction and fast computation. The transform has a very large number of independent parameters that are useful for many applications. Specifically, we show by implementing the double random phase encoding...
The security of digital images attracts much attention recently. For images the transformation can be implemented at two levels, the first one consists of the pixel value permutation and the second one consists of position permutation. In this paper, we propose an encryption scheme for digital images with new pixel position permutation method based on Evolvable Hardware (EHW). In this work, we use...
This paper proposes an image encryption algorithm based on a progression, which scrambles the pixel and changes the value of the pixel using the progression. The experiments illustrate the new algorithm can adapt almost all the images and it is more secure.
In this paper, a novel image cheat-encryption algori-thm based on hyper-chaotic Chen-system is proposed. The hyper-chaos is employed to encrypt plain image into cheat-like image. The cheat-image is transferred in network and easily neglected by attackers. If cheat succeeds, it is impossible to decrypt. When the cheat-image fails to cheat the attackers, security and performance analysis shows the cheat-encryption...
Zigzag transformation is a kind of scrambling algorithm with low time complexity and good scrambling effect. And inner product polarization vector algorithm is a new encryption algorithm deduced from Attribute Theory. Here both above are combined by first making use of improved Zigzag transformation to have the image scrambled, next encrypting the scram-bled image by way of inner product polarization...
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then `embedded' in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is...
In this paper, we describe a new forensic image format which can handle high capacity computer disk storages like IDE, SAT A, USB, or etc. And also, it supports metadata that can be defined and extended by users. Especially, it has flag field in which users set the encryption and digital signature algorithms.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.