Bottom-boosting differential evolution based digital image security analysis

2021 ◽  
Vol 61 ◽  
pp. 102811
Author(s):  
D. Ghai ◽  
S. Tiwari ◽  
N.N. Das
Author(s):  
Riah Ukur Ginting ◽  
Dini M Hutagalung

The image is a function of 2 (two) dimensions f (x, y), where x and y are the coordinates that show the space, and the value of f (x, y) is called the image intensity at the coordinates. Digital image is an image that has a limited value of x, y, f (x, y). Digital images consist of a limited number of elements, where each element has coordinates and values. These elements are called pixels (Gonzalez and Woods., 2007). One method of randomization in the image is Arnold Transformation where the image is transformed using a cat map, which is a 2x2 matrix. After transformation, the value of each pixel gets new coordinates until the image does not have its original shape. As a result of the above problems, the author uses the basis of Arnold Transformation, to change the value of the map paint with Fibonacci and Lucas series for designing this application so that the randomization results have a higher level of security. The purpose of this study is (1) to do digital image randomization using Fibonacci and Lucas transforms so that the image does not have its original shape anymore and (2) save the randomized images into storage memory. The benefits of this study are (1) the design of digital image randomization applications, so that image security increases and (2) the effectiveness of the Fibonacci and lucas transformation methods in digital image randomization.Keywords: Image Processing, Fibonacci and Lucas


2018 ◽  
Vol 1114 ◽  
pp. 012152
Author(s):  
A M H Pardede ◽  
Dahlan Abdullah ◽  
Budhi Santri Kusuma ◽  
Citra Kurniawan ◽  
Suwarni ◽  
...  

Author(s):  
Gustavo Rodríguez- Cardona ◽  
Leonardo Humberto Ramírez- Beltrán ◽  
Marco Tulio Ramírez- Torres

The present investigation is proposing a new partial encryption algorithm for digital image, using the synchronization of cellular automata based on the local rule 90. Unlike other partial encryption algorithm, which become vulnerable to attacks such as Replacement Attack or Reconstruction Attack, this system encodes different bit planes, in function of the secret key, that is, for each block of clear text, different bits are encrypted to prevent that with an elimination operation of the encrypted bits information can be revealed. The synchronization of cellular automata has proven to be a useful tool for data encryption because it is sensitivity to initial conditions and, in addition, rule 90 is considered a chaotic standard. Both characteristics ensure cryptographic and perceptive security. Based on the results of the security analysis, this research could be an attractive option for image encryption with less computer cost and without compromising information confidentiality.


Sign in / Sign up

Export Citation Format

Share Document