Small Details Gray Scale Image Encryption Using RC6 Block Cipher

Author(s):  
Osama S. Faragallah ◽  
Hala S. El-sayed ◽  
Ashraf Afifi ◽  
S. F. El-Zoghdy
2014 ◽  
Vol 8 (1) ◽  
pp. 127-134
Author(s):  
Mar�a Elena Acevedo ◽  
Jos� �ngel Mart�nez ◽  
Marco Antonio Acevedo ◽  
Cornelio Ya�ez

Complexity ◽  
2022 ◽  
Vol 2022 ◽  
pp. 1-22
Author(s):  
Adélaïde Nicole Kengnou Telem ◽  
Cyrille Feudjio ◽  
Balamurali Ramakrishnan ◽  
Hilaire Bertrand Fotsin ◽  
Karthikeyan Rajagopal

In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. The novelties of the proposed encryption process are the methods used to extract an internal key to apply the zigzag process, affine transformation, and substitution-diffusion process. Initially, an original gray-scale image is converted into binary images. An internal secret key is extracted from binary images. The two keys are combined to compute the substitution-diffusion keys. The zigzag process is firstly applied on each binary image. Using an external key, every zigzag binary image is reflected or rotated and a new gray-scale image is reconstructed. The new image is divided into many nonoverlapping subblocks, and each subblock uses its own key to take out a substitution-diffusion process. We tested our algorithms on many biomedical and nonmedical images. It is seen from evaluation metrics that the proposed image encryption scheme provides good statistical and diffusion properties and can resist many kinds of attacks. It is an efficient and secure scheme for real-time encryption and transmission of biomedical images in telemedicine.


1983 ◽  
Vol 73 (1) ◽  
pp. 307-314
Author(s):  
George A. McMechan

abstract A digital seismic reflection section may be converted to a gray scale image composed of pixels and processed with techniques borrowed from the disciplines of image enhancement and pattern recognition. Types of processing include scaling, thresholding, density equalization, filtering, segmentation, and edge-finding. These are successfully applied to a migrated common mid-point seismic reflection line that traverses the Queen Charlotte fault (located in the northeastern Pacific Ocean). The result is the definition and enhancement of an elongated, near-vertical reflectivity anomaly associated with the Queen Charlotte fault.


Sign in / Sign up

Export Citation Format

Share Document