scholarly journals Randomized Poly-encrypted Image Exploiting Chaotic Beheviour

Author(s):  
Bouslehi Hamdi ◽  
Seddik Hassen ◽  
Amaria Wael

The security of digital data has become an essential need. Because the storage, transmission of data social networking has became inevitable, the need to ensure that data is no longer a luxury but an absolute necessity. The picture takes a large part of the data and its presence every day more important. in this paper, we use a new technique encryption which is poly encryption, this technique is based on the Decomposition of the image in a random manner, and each block will be encrypted by an algorithm that used different algorithm

2005 ◽  
Vol 25 (1_suppl) ◽  
pp. S543-S543
Author(s):  
Satoshi Kimura ◽  
Keigo Matsumoto ◽  
Yoshio Imahori ◽  
Katsuyoshi Mineura ◽  
Toshiyuki Itoh

2009 ◽  
Vol 56 (S 01) ◽  
Author(s):  
J Bickenbach ◽  
R Rossaint ◽  
R Autschbach ◽  
R Dembinski

2008 ◽  
Vol 56 (S 1) ◽  
Author(s):  
I Breitenbach ◽  
A El-Essawi ◽  
U Carstens-Fitz ◽  
MB Anssar ◽  
W Ahl ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document