encrypted image
Recently Published Documents


TOTAL DOCUMENTS

239
(FIVE YEARS 118)

H-INDEX

17
(FIVE YEARS 6)

Author(s):  
Bouslehi Hamdi ◽  
Seddik Hassen ◽  
Amaria Wael

The security of digital data has become an essential need. Because the storage, transmission of data social networking has became inevitable, the need to ensure that data is no longer a luxury but an absolute necessity. The picture takes a large part of the data and its presence every day more important. in this paper, we use a new technique encryption which is poly encryption, this technique is based on the Decomposition of the image in a random manner, and each block will be encrypted by an algorithm that used different algorithm


2022 ◽  
Author(s):  
Jingbo Zhao ◽  
Tian Zhang ◽  
Jianwei Jiang ◽  
Tong Fang ◽  
Hongyang Ma

Abstract Aiming at solving the trouble that digital image information is easily intercepted and tampered during transmission, we proposed a color image encryption scheme based on alternate quantum random walk and controlled Rubik’s Cube transformation. At the first, the color image is separated into three channels: channel R, channel G and channel B. Besides, a random sequence is generated by alternate quantum walk. Then the six faces of the Rubik’s Cube are decomposed and arranged in a specific order on a two-dimensional plane, and each pixel of the image is randomly mapped to the Rubik’s Cube. The whirling of the Rubik’s Cube is controlled by a random sequence to realize image scrambling and encryption. The scrambled image acquired by Rubik’s Cube whirling and the random sequence received by alternate quantum walk are bitwise-XORed to obtain a single-channel encrypted image. Finally the three-channel image is merged to acquire the final encrypted image. The decryption procedure is the reverse procedure of the encryption procedure. The key space of this scheme is theoretically infinite. After simulation experiments, the information entropy after encryption reaches 7.999, the NPCR is 99.5978%, and the UACI is 33.4317%. The encryption scheme with high robustness and security has a excellent encryption effect which is effective to resist statistical attacks, force attacks, and other differential attacks.


Author(s):  
Elhadi Mehallel ◽  
Djamel Abed ◽  
Amar Bouchemal

The single-carrier frequency division multiple access (SC-FDMA) is a promising technique that has been adopted as an uplink transmission scheme in the long-term evolution (LTE) cellular system. This is attributed to its advantages such as the low peak-to-average power ratio (PAPR) and the utilization of frequency-domain equalizers to resolve the problem of inter-symbol interference (ISI). In this paper, a Discrete Wavelet Transform (DWT) based SC-FDMA system is proposed for the effective transmission of encrypted images. The 2D Chaotic baker map encryption algorithm has been used to encrypt images to enhance their security during transmission via SC-FDMA- based systems. The performance of the process of encrypted image transmission using the 2D Chaotic baker map algorithm with wavelet transform-based SC-FDMA (DWT SC-FDMA) system is evaluated in terms of different performance metrics, with comparison to Discrete Fourier Transform SC-FDMA (DFT SC-FDMA) and, Discrete Cosine Transform SC-FDMA (DCT SC-FDMA) systems. The viability of the proposed scheme was tested with different wireless channel models and different subcarriers mapping schemes. Experimental results show that the proposed method of the encrypted image transmission via the DWT SC-FDMA system provides a remarkable performance gain compared to the other versions of the SC-FDMA system in terms of the PSNR, and the BER metrics in the wireless channel models. It also demonstrates the effectiveness of the proposed scheme and adds a degree of encryption to the transmitted images through the wireless channels.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2338
Author(s):  
Chuntao Wang ◽  
Renxin Liang ◽  
Shancheng Zhao ◽  
Shan Bian ◽  
Zhimao Lai

Nowadays, it remains a major challenge to efficiently compress encrypted images. In this paper, we propose a novel encryption-then-compression (ETC) scheme to enhance the performance of lossy compression on encrypted gray images through heuristic optimization of bitplane allocation. Specifically, in compressing an encrypted image, we take a bitplane as a basic compression unit and formulate the lossy compression task as an optimization problem that maximizes the peak signal-to-noise ratio (PSNR) subject to a given compression ratio. We then develop a heuristic strategy of bitplane allocation to approximately solve this optimization problem, which leverages the asymmetric characteristics of different bitplanes. In particular, an encrypted image is divided into four sub-images. Among them, one sub-image is reserved, while the most significant bitplanes (MSBs) of the other sub-images are selected successively, and so are the second, third, etc., MSBs until a given compression ratio is met. As there exist clear statistical correlations within a bitplane and between adjacent bitplanes, where bitplane denotes those belonging to the first three MSBs, we further use the low-density parity-check (LDPC) code to compress these bitplanes according to the ETC framework. In reconstructing the original image, we first deploy the joint LDPC decoding, decryption, and Markov random field (MRF) exploitation to recover the chosen bitplanes belonging to the first three MSBs in a lossless way, and then apply content-adaptive interpolation to further obtain missing bitplanes and thus discarded pixels, which is symmetric to the encrypted image compression process. Experimental simulation results show that the proposed scheme achieves desirable visual quality of reconstructed images and remarkably outperforms the state-of-the-art ETC methods, which indicates the feasibility and effectiveness of the proposed scheme.


2021 ◽  
Author(s):  
Rajana Kanakaraju ◽  
Lakshmi V ◽  
Shanmuk Srinivas Amiripalli ◽  
Sai Prasad Potharaju ◽  
R Chandrasekhar

In this digital era, most of the hospitals and medical labs are storing and sharing their medical data using third party cloud platforms for saving maintenance cost and storage and also to access data from anywhere. The cloud platform is not entirely a trusted party as the data is under the control of cloud service providers, which results in privacy leaks so that the data is to be encrypted while uploading into the cloud. The data can be used for diagnosis and analysis, for that the similar images to be retrieved as per the need of the doctor. In this paper, we propose an algorithm that uses discrete cosine transformation frequency and logistic sine map to encrypt an image, and the feature vector is computed on the encrypted image. The encrypted images are transferred to the cloud picture database, and feature vectors are uploaded to the feature database. Pearson’s Correlation Coefficient is calculated on the feature vector and is used as a measure to retrieve similar images. From the investigation outcomes, we can get an inference that this algorithm can resist against predictable attacks and geometric attacks with strong robustness.


2021 ◽  
Vol 17 (11) ◽  
pp. 155014772110590
Author(s):  
Fang Cao ◽  
Jiayi Sun ◽  
Xiangyang Luo ◽  
Chuan Qin ◽  
Ching-Chun Chang

In this article, a framework of privacy-preserving inpainting for outsourced image and an encrypted-image inpainting scheme are proposed. Different with conventional image inpainting in plaintext domain, there are two entities, that is, content owner and image restorer, in our framework. Content owner first encrypts his or her damaged image for privacy protection and outsources the encrypted, damaged image to image restorer, who may be a cloud server with powerful computation capability. Image restorer performs inpainting in encrypted domain and sends the inpainted and encrypted image back to content owner or authorized receiver, who can acquire final inpainted result in plaintext domain through decryption. In our encrypted-image inpainting scheme, with the assist of Johnson–Lindenstrauss transform that can preserve Euclidean distance between two vectors before and after encryption, the best-matching block with the smallest distance to current block can be found and utilized for patch filling in Paillier-encrypted image. To eliminate mosaic effect after decryption, weighted mean filtering in encrypted domain is conducted with Paillier homomorphic properties. Experimental results show that our privacy-preserving inpainting framework can be effectively applied in secure cloud computing, and the proposed encrypted-image inpainting scheme achieves comparable visual quality of inpainted results with some typical inpainting schemes in plaintext domain.


Sign in / Sign up

Export Citation Format

Share Document