scholarly journals A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process

Complexity ◽  
2022 ◽  
Vol 2022 ◽  
pp. 1-22
Author(s):  
Adélaïde Nicole Kengnou Telem ◽  
Cyrille Feudjio ◽  
Balamurali Ramakrishnan ◽  
Hilaire Bertrand Fotsin ◽  
Karthikeyan Rajagopal

In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. The novelties of the proposed encryption process are the methods used to extract an internal key to apply the zigzag process, affine transformation, and substitution-diffusion process. Initially, an original gray-scale image is converted into binary images. An internal secret key is extracted from binary images. The two keys are combined to compute the substitution-diffusion keys. The zigzag process is firstly applied on each binary image. Using an external key, every zigzag binary image is reflected or rotated and a new gray-scale image is reconstructed. The new image is divided into many nonoverlapping subblocks, and each subblock uses its own key to take out a substitution-diffusion process. We tested our algorithms on many biomedical and nonmedical images. It is seen from evaluation metrics that the proposed image encryption scheme provides good statistical and diffusion properties and can resist many kinds of attacks. It is an efficient and secure scheme for real-time encryption and transmission of biomedical images in telemedicine.

Author(s):  
Prabhakar Telagarapu ◽  
B. Jagdishwar Rao ◽  
J. Venkata Suman ◽  
K. Chiranjeevi

The objective of this paper is to visualize and analyze video.Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see unwanted objects in video frame, which can be removed by converting colour frames into a gray scale and implement thresh holding algorithm on an image. Threshold can be set depending on the object to be detected. Gray scale image will be converted to binary during thresh holding process. To reduce noise, to improve the robustness of the system, and to reduce the error rate in detection and tracking process, morphological image processing method for binary images is used. Morphological processing will be applied on binary image to remove small unwanted objects that are presented in a frame. A developed blob analysis technique for extracted binary image facilitates pedestrian and car detection. Processing blob’s information of relative size and location leads to distinguishing between pedestrian and car. The threshold, morphological and blobs process is applied to all frames in a video and finally original video with tagged cars will be displayed.


2014 ◽  
Vol 568-570 ◽  
pp. 617-621
Author(s):  
Jin Zhe Xie ◽  
Kai Liao ◽  
Jiu Long Xiong ◽  
Zhi Hu Wang

In this article we present a method to recognize artificial marks in augmented reality system. The distribution of marks is obtained by iterative approximation of the inconsistency between the synthetic gray-scale image and authentic binary image. The result shows our method can accurately recognize the marks, and solve the problem of mark recognition with partial occlusion or poor image quality.


2013 ◽  
Vol 319 ◽  
pp. 541-544
Author(s):  
Ye Bao Zhao ◽  
Wen Juan Yao

The emergence of cracks of structures is the initial omen of the structural damage. From the initial stage, structural cracks which are undistinguishable by naked eyes exist gradually and then contribute to the member damage, structural deformation and systematic instability as well. This paper made a detection and analysis for cracks of cement flooring by utilizing the digital picture technology, converting a color Image into a gray-scale image. Then ,an appropriate threshold was determined to distinguish between cracks and the background in a gray-scale image. Then, an edge-detection method and morphological techniques of dilation and erosion were used respectively to eliminate noise in the corresponding binary images and obtain crack boundaries.The graphic process program developed can be used to process the gained digital pictures .


2014 ◽  
Vol 8 (1) ◽  
pp. 127-134
Author(s):  
Mar�a Elena Acevedo ◽  
Jos� �ngel Mart�nez ◽  
Marco Antonio Acevedo ◽  
Cornelio Ya�ez

2019 ◽  
Vol 9 (3) ◽  
pp. 494
Author(s):  
Ming Li ◽  
Kanglei Zhou ◽  
Hua Ren ◽  
Haiju Fan

In order to meet the requirement of secure image communication in a resource-constrained network environment, a novel lightweight chaotic image encryption scheme based on permutation and diffusion has been proposed. It was claimed that this scheme can resist differential attacks, statistical attacks, etc. However, the original encryption scheme is found to be vulnerable and insecure to chosen-plaintext attack (CPA). In this paper, the original encryption scheme is analyzed comprehensively and attacked successfully. Only by choosing a full zero image as the chosen-plaintext of the diffusion phase, the encrypted image can be restored into permutation-only phase, and by applying the other chosen images as the chosen-plaintexts of the permutation phase, the map matrix which is equivalent to the secret key of the permutation phase can be further revealed. Experiments and analysis verify the feasibility of our proposed attack strategy.


Author(s):  
Osama S. Faragallah ◽  
Hala S. El-sayed ◽  
Ashraf Afifi ◽  
S. F. El-Zoghdy

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Sign in / Sign up

Export Citation Format

Share Document