دانلود و نمایش مقالات مرتبط با Image encryption::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Image encryption

تعداد مقالات یافته شده: 26
ردیف عنوان نوع
1 Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion
تشخیص چهره قابل لغو بر اساس سیستم آشفته لورنز به ترتیب جزئی و همجوشی موج Haar-2021
Cancellable biometrics is the art of generating distorted or encrypted templates of original biometric templates. The evolution of cancellable biometrics is attributed to the advanced hacking technologies that can capture the original stored biometrics from databases. One of the solutions for this problem is to store cancellable biometric templates in the database rather than the original ones. This paper presents a cancellable face recognition scheme that is based on face image encryption with Fractional-Order (FO) Lorenz chaotic system. The basic idea is to generate user-specific random keys to be XORed with the red, green, and blue components of color face images. These keys are generated from the fractional- order Lorenz chaotic system. In addition, some post-processing is implemented on the encrypted color components of the face images with rotation and transposition of matrices. Finally, a wavelet fusion process is applied on these encrypted and processed face image components. The reason behind the utilization of wavelet fusion is to generate a single cancellable template for each color face image. Furthermore, wavelet fusion after post-processing of encrypted color components leads to a better degree of diffusion in the encrypted face templates. Actually, the encryption with the proposed algorithm is not full encryption, but it is appropriate for cancellable biometric applications. Moreover, the proposed scheme is secure due to the power of fractional-order Lorenz chaotic system that is very sensitive to initial conditions selected by the user. In addition, the post-processing incorporated with wavelet fusion is a non-invertible process. The validation of the proposed scheme is performed with experiments on FERET, LFW, and ORL databases. Evaluation metrics including Equal Error Rate (EER), Area under the Receiver Operating Characteristic (AROC) curve are utilized in the proposed scheme. Numerical values reveal EER levels close to zero and AROC values of 100% at low and mild noise levels. 2021 Elsevier Inc. All rights reserved.
Keywords: Cancellable biometrics | FO Lorenz chaotic systems | Random projection (RP) | Homomorphic transform | AROC
مقاله انگلیسی
2 Public key digital contents confidentiality scheme based on quantum spin and finite state automation
طرح محرمانه بودن محتویات دیجیتالی کلید عمومی مبتنی بر چرخش کوانتومی و اتوماسیون حالت محدود-2019
Numerous encryption plans are legitimately founded on the transformation of frameworks or by characterizing the strict guidelines. Most of the security systems are based on mathematical structures and their applications in diverse applied sciences. We propose here an advanced digital contents confidentiality scheme to simulate the phenomenon rather than creating rigid rules. We operate digital data trailed by quantum spin states for specific phase and finite state machine for limited number of rounds. The extent of the presented article revolves around the development and deployment of public key cryptosystem basis on the concepts of quantum spin states and finite state machine effectively. Both states (spin and finite state machine) provide the high degree of naturalness contrasted with ordinary cryptosystem.
Keywords: Information security | Digital contents privacy | Public key cryptography | Image encryption | Quantum cryptography | Quantum spin states | Finite state machine applications in | information security
مقاله انگلیسی
3 An efficient colour image encryption scheme based on 1-D chaotic maps
یک طرح رمزگذاری کارآمد تصویر بر اساس نگاشت های هرج و مرج 1 بعدی-2019
Nowadays, internet is the medium through which people are sharing digital images. However, security is an issue in sharing of those images. Encryption techniques play an important role for the security of images. In this paper, an efficient colour image encryption scheme is proposed using multiple piece-wise linear chaotic map (PWLCM) systems. The proposed scheme first performs two-times multi-way block- based rotational permutation operations and then row-column rotational permutations. Finally, it per- forms row, column, and block diffusion operations. This scheme is simple and secure because it involves only simple rotational permutation operations using only PWLCM systems. Also, this scheme is efficient because it requires less computations and less simulation time to encrypt colour images. The advantages of this scheme are high key space, high security, simplicity and high efficiency in terms of computational complexity and simulation time. The simulation outputs and the security analyses indicate that the pro- posed method has better performance in terms of encryption efficiency, security, and resistivity for most of the common attacks.
Keywords: Security | Chaotic cryptography | Colour image encryption | Rotational permutation operation | PWLCM system | Efficiency | Key space
مقاله انگلیسی
4 Cryptographic construction using coupled map lattice as a diffusion model to enhanced security
ساخت رمزنگاری با استفاده از شبکه نقشه همراه به عنوان یک مدل انتشار برای تقویت امنیت-2019
In this study, a new color image encryption model that uses an intertwining logistic map based confu- sion mechanism and coupled map lattice based diffusion process. It incorporates mixing based on pseudo random number generator to ensure shuffling incase of same pixels, intertwining logistic map based con- fusion mechanism enhance the key sensitivity in the model. Finally, Couple map lattice based diffusion is utilized in the model to change the pixels in a way that even one-bit change in a pixel of plain image leads to a change in large number of pixels of the cipher image. The proposed encryption method en- hance the security and results in better Number of pixel change rate (NPCR) and Unified average change intensity (UACI) scores. The correlation among the pixels of cipher image is reduced to be negligible. Corresponding results suggest that the proposed model is highly secure as compared with chaos based algorithms for image encryption application.
Keywords: Intertwining logistic map | Coupled map lattice | Confusion | Diffusion | Encryption
مقاله انگلیسی
5 An encryption scheme for securing multiple medical images
یک برنامه رمزگذاری برای ایمن سازی تصاویر پزشکی متعدد-2019
With the rise in medical imaging tools and telemedicine technology, the distance barriers in providing health care have been reduced by communicating patients data over the internet. To provide patients with privacy, the data are encrypted while transmitting over the insecure network. The paper proposes an encryption scheme for multiple medical images using a new finding in elliptic curve analogue ElGamal cryptosystem and Mersenne Twister pseudo-random number generator. The new finding quickens the encryption time as well as solve the problem of data expansion associated with ElGamal cryptosystem. Results from simulation, security and statistical analyses show that the proposed encryption algorithm can be used for multiple medical images encryption.
Keywords: Image encryption | Elliptic curve cryptography | Multiple medical images | Mersenne twister | Elgamal cryptosystem
مقاله انگلیسی
6 A novel approach for the development of the Twofish algorithm based on multi-level key space
یک رویکرد جدید برای توسعه الگوریتم Twofish مبتنی بر فضای کلیدی چند سطح-2019
This paper presents a new modification of the Twofish algorithm for strengthening security. This is done by using two additional control keys during 16 rounds of the standard Feistel Encryption algorithm. Our proposed algorithm uses three keys in the encryption and decryption processes instead of only one key for controlling variable bit sizes of the blocks (either 1or 2, or 4 or 8 bits), which determine the state ta- ble numbers. These tables are constructed from the addition in a Galois field (GF(2 n )) based on the block bit size to increase the complexity of the proposed algorithm. Results are evaluated based on the criteria of complexity, time encryption, throughput, National Institute of Standards and Technology (NIST), his- togram analysis, Number of Pixel of Change Rate (NPCR) and Unified Average Changing Intensity (UACI). The simulation results show that our proposed algorithm exceeds the original algorithm in complexity, where it obtained (2 4,722,900 ) probabilities for 16 rounds. In addition, NIST tests and histogram analysis provide better results for our proposed algorithm compared with the original. Also, NPCR of our pro- posed Twofish is close to the ideal value of this standard. All these results prove that our modification of the Twofish algorithm makes it stronger against attacks by increasing its complexity
Keywords: Cryptography | Information security | Symmetric block cipher | Twofish algorithm | Multi-states | Multi-level keys | Image encryption
مقاله انگلیسی
7 Implementation and practical problems of chaos-based cryptography revisited
پیاده سازی و مسائل عملی رمزنگاری مبتنی بر هرج و مرج تجدید نظر شده-2019
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as pseudorandomness, complexity, and sensitivity to parame- ter changes. Despite these characteristics being analogous to cryptographic requirements, the resulting chaos-based cryptosystems are usually difficult to analyze, inefficient, and have reproducibility issues. In this paper, we highlight some of the problems which deter the practical application of chaos-based cryptosystems. We show that recently published work in reputable journals still do not address these problems and remain only of academic interest. We also perform experiments to depict some of the implementation issues of digital chaos that need to be taken into consideration when designing chaos- based algorithms. We then discuss a number of possible solutions that can be explored to overcome these problems.
Keywords: Authentication | Chaos theory | Cryptography | Cryptanalysis | Image encryption | Security
مقاله انگلیسی
8 Cosine-transform-based chaotic system for image encryption
سیستم آشوب آور مبتنی بر ترانسفورماتیک برای رمزگذاری تصویر-2019
Chaos is known as a natural candidate for cryptography applications owing to its prop- erties such as unpredictability and initial state sensitivity. However, certain chaos-based cryptosystems have been proven to exhibit various security defects because their used chaotic maps do not have complex dynamical behaviors. To address this problem, this pa- per introduces a cosine-transform-based chaotic system (CTBCS). Using two chaotic maps as seed maps, the CTBCS can produce chaotic maps with complex dynamical behaviors. For illustration, we produce three chaotic maps using the CTBCS and analyze their chaos com- plexity. Using one of the generated chaotic maps, we further propose an image encryption scheme. The encryption scheme uses high-efficiency scrambling to separate adjacent pix- els and employs random order substitution to spread a small change in the plain-image to all pixels of the cipher-image. The performance evaluation demonstrates that the chaotic maps generated by the CTBCS exhibit substantially more complicated chaotic behaviors than the existing ones. The simulation results indicate the reliability of the proposed im- age encryption scheme. Moreover, the security analysis demonstrates that the proposed image encryption scheme provides a higher level of security than several advanced image encryption schemes.
Keywords: Chaotic system | Chaos-based encryption | Cryptography | Image privacy | Image encryption | Security analysis
مقاله انگلیسی
9 Sparse phase information for secure optical double-image encryption and authentication
اطلاعات فازی خلوت برای رمزگذاری و احراز هویت دو تصویر نوری ایمن-2019
A novel optical encryption and authentication method by sparse phase information was proposed. Phase-only component of double-image encryption function was generated and considered for sparse strategy. Partial information of these phase values was subjected to the authentication process. The sparse strategy of the phase data permits simultaneous data reduction to achieve the general requirements of storage and transmission. Cryptanalysis of the proposed method was carried out in terms of chosen-plaintext and chosen-ciphertext attacks. The sparse strategy for phase data makes it difficult to recognize the confidential information shown by double-image encryption and authentication system, thus, the security level of the overall process was increased. Computational simulations displayed the feasibility and more security of the proposed method.
Keywords: Optical security and encryption | Nonlinear optical signal processing | Pattern recognition | Nonlinear correlators | Multiple imaging | Fourier optics
مقاله انگلیسی
10 Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things
حفظ حریم خصوصی کوانتومی متناوب مبتنی بر حفظ حریم خصوصی مبتنی بر حفظ تصاویر مراقبت های بهداشتی در اینترنت اشیاء-2019
The development of quantum computers and quantum algorithms conveys a challenging scenario for several cryptographic protocols due to the mathematical scaffolding upon which those protocols have been built. Quantum walks constitute a universal quantum computational model which is widely used in various fields, including quantum algorithms and cryptography. Quantum walks can be utilized as a powerful tool for the development of modern chaos-based cryptographic applications due to their nonlinear dynamical behavior and high sensitivity to initial conditions. In this paper, we propose new encryption mechanism for privacy preserving Internet of Things-based healthcare systems in order to protect the patients’ privacy. The encryption/decryption processes are based on controlled alternate quantum walks. The proposed cryptosystem approach is composed of two phases: substitution and permutation, both based on independently computed quantum walks. Simulation results and numerical analysis of our data provide enough evidence to reasonably conjecture that our image encryption protocol is robust and efficient for protecting patients’ privacy protection.
Keywords: Image encryption | Quantum walks | Healthcare | Privacy preserving | Internet of Things
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2205 :::::::: بازدید دیروز: 2317 :::::::: بازدید کل: 4522 :::::::: افراد آنلاین: 9