The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel permutation-substitution scheme, which is based on chaotic standard map, for the image encryption is proposed. It is loss-less symmetric block cipher and specifically designed for the colour images. The initial condition & system parameter of the chaotic standard map, number of iterations and number of rounds constitute the secret key of the algorithm. Firstly we mix all three colour layers...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of...
The revolution in communication technology facilitates fast and reliable information transfers and is being increasingly used in various fields like scientific, military, civilian and economic. Apart from the speed and reliability, security in transferring the information is gaining much importance now days. Optical data transfer offers several dimensions in which information can be hidden such as...
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. This paper considers the problem of embedding a binary watermark in a gray-level image using the concept of Visual Cryptography (VC). This paper proposes a watermarking scheme which offers better security than Hwang's method, so that, attackers will not be able to...
The rapid development of networks such as internet, intranet, wireless communication etc., and multimedia techniques has emphasized on the need for copyright protection, authentication and identification and secret sharing of information. Visual cryptography is a secret sharing scheme where a secret binary image (SI) is encoded into n shares of random binary patterns. If the shares are xeroxed onto...
According to the particular properties of discrete chaotic sequences, and combining the structure characters of digital images, obeying the common encryption principles of digital images, a discrete chaotic exclusive OR encryption scheme of digital images is carefully studied and proposed. In the light of the size of a digital image which needs to be encrypted, and producing a corresponding binary...
The purpose of digital image scrambling technology is to put a meaningful image into a disordered one to enhance the resistance ability against illegal attacks so as to improve security. This paper proposes an image scrambling transformation method based on the idea of inverse transformation in finite integer domain. It includes gray transformation and position transformation. At the same time, it...
Visual secret sharing (VSS) is a technology that encrypts a secret image into several share images. When superimposes the shares, it can restore the secret by human vision. This paper proposes a novel image visual secret sharing scheme to encrypt two secret images in the same time. This scheme turns two secret images into two meaningless shares without any pixel expansion and codebook. In order to...
To protect the copyright of the digital image in the guarantee of image quality, a robust zero-watermarking scheme is proposed in the paper. The scheme selects the wavelet coefficients correctly to exploit the advantages of wavelet transform. Then the binary watermark is concealed into master share and ownership share by using the visual cryptography technique. Finally the ownership share is registered...
Combined the image encryption and hiding technique, this paper proposed a method of color image protective transmission based on Logistic map and LSB hiding algorithm. Firstly, Logistic map produced three chaotic sequences by one secret-key. Secondly, the image pixel matrixs of R,G,B were permuted by the chaotic sequences and digital image encryption was realized in the space domain. Finally, the...
In order to improve the capability of scrambling encryption, an novel image encryption scheme was presented to achieve higher security in the paper. And a large number of simulations were carried out to evaluate the performance of the proposed image encryption system. The experimental results show that the presented method can resist various kinds of attacks and provide an effective way for high security...
An improved image encryption method, which is based on hyperchaotic sequence, is proposed. Firstly, chaotic sequences based on Rössler hyperchaotic system are generated, and the image is pro-encrypted by replacing pixels in the image with generated sequences; then horizontal rows and vertical rows in the pro-encrypted image are further scrambled with Logistic mapping, in order to improve the security...
In this paper, we propose a novel (n, n) secret image sharing scheme. The construction of shares is based on matrix multiplication and the revealing is based on addition. The proposed scheme has no pixel expansion and can reconstruct the secret image precisely. It can be directly used to share grayscale images and can be easily extended to deal with the binary and color images. Experimental results...
This paper proposes an encoding method to encrypt multiple covert images into a host image to form an overt image. The codes encoded in the overt image are classified into seven groups. Identification codes are used to determine whether the overt image contains codes proposed in this paper or not, image number codes are used to indicate the number of covert images encoded in the overt image, base...
This paper presents a image encryption algorithm based on Arnold transformation and chaotic mapping. Firstly, Arnold transformation is used to scramble image. Then we use Tent mapping to encrypt scrambled image. The result shows that the algorithm is easy to realize, providing high security.
Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achieve...
A security of an image encryption scheme based on improved chaotic cat maps was analyzed. In these analyses, it has revealed some rules of key information leaking in certain instances, and has pointed out that the algorithm is insensitive to both the control parameters and the changes of plaintext. In the condition of known-image attack, an equivalent key-solved algorithm about once iteration and...
A novel scheme on reality-preserving image encryption is proposed in this paper. The chaos function and the linear canonical transform are employed. The unpredictability and initial sensitivity properties of chaotic system are utilized to generate both the scrambling matrix and the masks for encryption. The image is processed in the linear canonical domain via saving half of the spectrum to construct...
In order to improve the capability of encryption scheme, we first extended the two dimensional Arnold transformation to three dimensional, and designed one kind of new diffusion equation of the digital image pixel gray value, then introduced a novel digital image encryption algorithm in the paper, which was based on the three-dimensional Arnold transformation and the new diffusion transformation....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.