scholarly journals A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 163729-163739
Author(s):  
Victor Manuel Silva Garcia ◽  
Marlon David Gonzalez Ramirez ◽  
Rolando Flores Carapia ◽  
Eduardo Vega-Alvarado ◽  
Eduardo Rodriguez Escobar
2014 ◽  
Vol 6 (3) ◽  
pp. 16-29
Author(s):  
Xiyu Han ◽  
Zhenxing Qian ◽  
Guorui Feng ◽  
Xinpeng Zhang

This paper proposes a novel method for data hiding in encrypted image using image interpolation. Before the image encryption, the original image is sampled and an interpolation algorithm is used to calculate an estimation of the original image. Errors between the original image and the estimated image are compressed by Huffman encoding, which are further embedded into the estimated image to generate the redundant room. After image encryption using an encryption key, the secret bits are embedded into the reserved room. On the receiver side, the hidden bits can be extracted and the original content of the image can be perfectly recovered. Compared with the published results, the proposed method provides a larger embedding payload.


Entropy ◽  
2018 ◽  
Vol 20 (12) ◽  
pp. 901 ◽  
Author(s):  
Dora Ballesteros ◽  
Jimmy Peña ◽  
Diego Renza

Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to 8 . 57 × 10 506 ). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.


Molecules ◽  
2018 ◽  
Vol 23 (8) ◽  
pp. 1878 ◽  
Author(s):  
Bin Wang ◽  
Yingjie Xie ◽  
Shihua Zhou ◽  
Xuedong Zheng ◽  
Changjun Zhou

As a primary method, image encryption is widely used to protect the security of image information. In recent years, image encryption pays attention to the combination with DNA computing. In this work, we propose a novel method to correct errors in image encryption, which results from the uncertainty of DNA computing. DNA coding is the key step for DNA computing that could decrease the similarity of DNA sequences in DNA computing as well as correct errors from the process of image encryption and decryption. The experimental results show our method could be used to correct errors in image encryption based on DNA coding.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Ming Li ◽  
Haiju Fan ◽  
Hua Ren ◽  
Dandan Lu ◽  
Di Xiao ◽  
...  

A novel method of meaningful image encryption is proposed in this paper. A secret image is encrypted into another meaningful image using the algorithm of reversible data hiding (RDH). High covertness can be ensured during the communication, and the possibility of being attacked of the secret image would be reduced to a very low level. The key innovation of the proposed method is that RDH is applied to compressive sensing (CS) domain, which brings a variety of benefits in terms of image sampling, communication and security. The secret image after preliminary encryption is embedded into the sparse representation coefficients of the host image with the help of the dictionary. The embedding rate could reach 2 bpp, which is significantly higher than those of other state-of-art schemes. In addition, the computational complexity of receiver is reduced. Simulations verify our proposal.


2021 ◽  
Vol 26 (2) ◽  
Author(s):  
Ekhlas K. Gbashi ◽  
Alaa kadhim Farhan

Image encryption is one of the primary approaches which is used to keep image information secure and safe. Recently, image encryption is turning its attention to combination with the field of DNA computing. In the presented study, a novel method of image encryption is suggested and implemented based on the DNA algorithm and Chaos theory, the most important principle in image encryption is breaking the correlation amongst pixels. This algorithm performs well against chosen cipher-text attacks. Furthermore, the proposed approach was implemented and analyzed for the Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), The performance of the encryption method is analyzed using the histogram, Shannon entropy and key space.


Author(s):  
Do-Hyung Kim ◽  
No-Cheol Park ◽  
Sungbin Jeon ◽  
Young-Pil Park

Novel crosstalk analysis method is suggested in optical encryption of multiple image. To optimize the total capacity of stored images in optical encryption of multiple images. We analyze the effect of crosstalk noise with each individual image by using suggested method. From the results, individual crosstalk robustness is verified with various target images and unbalance of image qualities among encrypted multiple images could be explained effectively. In addition, simple modulation method is adapted to equalizing image quality and it shows the highly improved results compare to conventional methods.


Author(s):  
M.A. Gregory ◽  
G.P. Hadley

The insertion of implanted venous access systems for children undergoing prolonged courses of chemotherapy has become a common procedure in pediatric surgical oncology. While not permanently implanted, the devices are expected to remain functional until cure of the primary disease is assured. Despite careful patient selection and standardised insertion and access techniques, some devices fail. The most commonly encountered problems are colonisation of the device with bacteria and catheter occlusion. Both of these difficulties relate to the development of a biofilm within the port and catheter. The morphology and evolution of biofilms in indwelling vascular catheters is the subject of ongoing investigation. To date, however, such investigations have been confined to the examination of fragments of biofilm scraped or sonicated from sections of catheter. This report describes a novel method for the extraction of intact biofilms from indwelling catheters.15 children with Wilm’s tumour and who had received venous implants were studied. Catheters were removed because of infection (n=6) or electively at the end of chemotherapy.


Sign in / Sign up

Export Citation Format

Share Document