The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital video contents now become easily available through Internet and various medium. Easy availability made digital video more popular than analog media. And it attains a sharp attention regarding its ownership. The ownership integrity can be easily violated using different video editing software. In this regard we are proposing a chip level framework in accordance with our already proposed LSB...
The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new...
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by...
Using Cryptography and Steganography at the same time, we try to provide Biometric as well as Password security to voter accounts. The scheme uses images as cover objects for Steganography and as keys for Cryptography. The key image is a Biometric measure, such as a fingerprint image. Proper use of Cryptography greatly reduces the risks in these systems as the hackers have to find both secret key...
A loss less and visible watermarking algorithm is proposed. The carrier image can restored loss less. The exterior appearance is like to mark by use of image addition technique. The visible watermarking can replace the mark. Because of self-recovery, it offers the original data to the validated user. The Hash function of RH arithmetic operator is constructed by Rijndael encryption algorithm. By using...
A novel scheme on reality preserving image encryption is proposed in this paper. The Hilbert transform and the double random phase encoding are utilized in the proposed method. The encrypted image is real-valued without data expanding, which can benefit the digital processing of images by electronic computers where speed of computation is important. The image is processed in the plane which can be...
The using of binary affine transformation for simultaneous encryption-decryption of two images the same dimension that are clearly marked internal contours.
IPTV provides information services, video contents and broadcast services using high-speed network. It is in the limelight after its commercialization and vitalizations. For protecting and authenticating the transmitted contents, IPTV system is equipped with a combination of CAS and DRM system for VOD contents but the system is too complicated and the construction is too costly. To address this problem,...
In this paper, we propose a (2, n) secret image sharing scheme with precise reconstruction for binary, grayscale and color image. In sharing phase, XOR-based secret sharing scheme is utilized and each participant is required to hold a certain number of shares, each having the same size as the secret image. In revealing phase, each two participants can recover the original secret image precisely by...
In this paper, we proposed a new image encryption algorithm, that is based on Arnold cat map and logistic chaotic system to improve the security of the image transmission. An input image can be shuffled by iterative using Arnold cat map operations. But, after several iterations the shuffle image will return to the original image. It is obvious that we cannot using the Arnold cat map only to promise...
In the traditional visual cryptography schemes, only one piece of image was encoded during encryption. And each of the shares that are generated was shown as a disorganized image. Due to the capacity of encrypted information, these schemes have few applications and because of the disorganized image share, they are easily suspected by hacker. In order to solve these problems, an Extended Visual Cryptography...
Security of a cryptographic system depends much on the randomness of random number used in the system. In this paper, a true random number generator based on the data of fingerprint (FPTRNG) is designed which extracts the random information from image data of fingerprint to generate random number. The random number generated by the generator is tested using the statistical test suite for random and...
Information explosion along with the tremendous growth in software and hardware technology are moving industries, educational institutions, organizations towards `paperless' environment. This change has a direct impact on the amount of information digitized, thus increasing the need for efficient storage mechanisms. Along with compact storage requirement, security is also considered important during...
The security of digital images attracts much attention recently. For images the transformation can be implemented at two levels, the first one consists of the pixel value permutation and the second one consists of position permutation. In this paper, we propose an encryption scheme for digital images with new pixel position permutation method based on Evolvable Hardware (EHW). In this work, we use...
This paper proposes a reversible visible watermarking method which are contour style. According to the fact that it has informational redundancy in a nature images usually, it is possible to embed watermarking image in the corresponding area of original image. Based on the cryptography method, users can view the original image after remove the visible watermarking by the proposed method. The proposed...
To study the security with known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encryption scheme based on 3D chaotic cat maps is not secure.
This paper proposes an RGB-based, secure technique to maintain and authenticate the integrity of a document. The novel Steganographic algorithm that we have proposed has its strength greatly enhanced by use of hybrid cryptography on data that is to be hidden in cover image. The secret message is converted into two kinds of plaintexts by subsequent ASCII and binary conversions and suitable bit stuffing...
A watermarking algorithm for the infrared image copyright protection was developed. The whole process was based on integer wavelet transform. Encrypt the grey scale image watermark by Logistic chaotic sequence, and then decompose based on integer wavelet. Select the perceptually significant wavelet coefficients, and then inosculate in the given position of the original image. The watermark was detected...
To reach the rural masses, banks are going all out in providing a user-friendly banking experience. To boost micro financing initiatives, banks are deploying biometric solutions with ATMs. Establishing the identity of a rural depositor through biometrics makes it possible for illiterate or barely literate folks to become part of the banking user community. Fingerprint recognition has been recognized...
In this paper, a novel extended visual cryptography scheme is presented. Differ from any existing visual cryptography scheme, the proposed scheme encodes one secret image into one shared image with innocent-looking. The secret image is visually revealed by copying the share, shifting the copy and superimposing the shifted copy and the original share together. The proposed scheme has the advantages...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.