The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new color image encryption and compression algorithm based on the DNA complementary rule and the Chinese remainder theorem, which combines the DNA complementary rule with quantum chaotic map. We use quantum chaotic map and DNA complementary rule to shuffle the color image and obtain the shuffled image, then Chinese remainder theorem from number theory is utilized to diffuse...
This paper presents the concept of image compression after encryption and study about the various technologies applied on encryption-then-compression technology. It is also analyses the various secured compression technologies and can be applied to different types of images. This survey addresses the recipe for the secured image compression technologies based on JPEG, JPEG2000 and JPEG XR and presents...
This paper describes the process of implementing and testing a Chaos based cryptographic algorithm to secure biometric images. This was completed by a group of undergraduate students as part of completing their capstone experience project. The algorithm implemented uses an external secret key of 80-bit and two chaotic logistic maps. The algorithm was successfully implemented and passed all tests.
Camouflaging of twofold images is necessary while information's are communication through image. Technology brings the communication easier, most of the communication today through open network, for this threats also increased frequently. This paper brings the new technique called flow code procedure technique. Given binary image converted into text representation and encrypted using flow code procedure...
Data generated and stored worldwide is increasing multifold every year, with images and media content accounting for a large portion of this data. In addition to volume, ensuring adequate security is an important challenge that needs to be addressed. In this paper, we propose an efficient, secure data-storage approach based on compressive sensing. Our approach uses data deduplication to remove identical...
In 21st century, all bank systems are connected with one another through internet technology. This system of bank is called as core banking network. Banks allows customer to transfer and receive money in their own account through various ways. Bank makes payments using cash, money order, online payment, demand draft, NEFT payment system, RTGS payment system, or through cheque payment system. In this...
Advancement in technology has made the traffic of digital image mainly in the field of medical application a daily routine. Now a day's transmission of medical image especially over wireless is very common. But with the concern for security of image is also growing proportionally resulting from the increasing amount of imaging data. Two important measures for evaluating an encryption system are speed...
In the last few years, visual privacy has become a major problem. Because of this, encrypted image processing has received a lot of attention within the scientific and business communities. Data hiding in encrypted images (DHEI) is an effective technique to embed data in the encrypted domain. The owner of an image encrypts it with a secret key and it is still possible to embed additional data without...
In current scenario various Base band Data Handling Systems (BDH) systems are getting realized by various space agencies. They are unique and project specific. This will call for realization of new system or re-engineering of existing systems, intern takes lot of lead time for design, realization and testing. This paper gives novel approach towards realization of multi mission system where by changing...
In this research, presented an enhanced image security using improved RSA cryptography and Spatial Orientation Tree Wavelet compression (STW) method for color or grayscale image. Steganography is the science of hiding secret messages so that you can be sent to target without mistrust. It is the most famous type of carrier to grip data. Firstly, input the secret message, then encrypt the message using...
With the current emergence of the Internet, there is a need to securely transfer images between systems. In this context, we propose a secure image encryption algorithm that uses both AES and Visual Cryptographic techniques to protect the image. The image is encrypted using AES and an encoding schema has been proposed to convert the key into shares based on Visual Secret Sharing. The cryptanalysis...
In this paper, a novel encryption and decryption method for color images based on the Hadamard transform (HT) and logical modulation has been proposed. Firstly, considering security and efficiency, together, our cryptosystem combined with image compression can reduce encryption time and promote real-time secure image transmission and storage. Then the compressed image is encrypted by logical modulation...
Due to the continuous growth of technology, we can easily transfer data from one place to another. At the same time the data is more likely to be hacked by the attacker. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. Data is the most valuable thing today from an individual to an organization because...
Data transmission in a secure manner over the internet has gained higher interest since last decade as the use of encryption for transmitting embedded files before compression is very essential. The major challenge is designing the architecture so as to perform the file encryption at sender side and the file compression at the NSP side in order to achieve the distinguished works assigned to senders...
This paper provides a technique for the protection of image in open wireless channel. It depends on steganography and cryptography (double random phase encoding). In this method primary step is to cover a message image inside an another image through steganography to make a stego image and then a simple encoding technique; double random phase encoding (DRPE) is perform on stego image. For the evaluation...
Now-a-day's great request of net application requires data to be transmitted in a secure manner. Data broadcast in public communication structure is not safe because of interception and improper manipulation by eavesdropper. be cause the good-looking solution for this trouble is Secret writing, which is the art and science of writing hidden messages in this way no one, apart from the source and intend...
A multiple-image encryption method that is based on a modified logistic map algorithm, compressive ghost imaging, and coordinate sampling is proposed. In the encryption process, random phase-only masks are first generated with the modified logistic map algorithm; multiple secret images are transformed to be sparsed by the 2-D discrete cosine transformation (DCT) operation and scrambled by different...
With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible data hiding in encrypted images (RDH-EI) attracts more and more researchers’ attention. In this paper, we propose a novel framework for RDH-EI based on reversible image transformation (RIT). Different...
Biometric system security requires cryptographic protection of sample data under certain circumstances. We introduce and assess low complexity selective encryption schemes applied to JPEG2000 compressed fingerprint data. From the results we are able to deduce design principles for such schemes which will guide to finally design recognition system aware encryption schemes with low encryption complexity...
In many multimedia applications, image encryption has to be conducted prior to image compression. This paper proposes an Encryption-then-Compression system using a JPEG XR friendly perceptual encryption method, which enables to be conducted prior to JPEG XR compression. The proposed encryption method can provide approximately the same compression performance as that of JPEG XR compression without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.