image cipher
Recently Published Documents


TOTAL DOCUMENTS

74
(FIVE YEARS 27)

H-INDEX

19
(FIVE YEARS 3)

2021 ◽  
Author(s):  
Yu‐Jie Sun ◽  
Hao Zhang ◽  
Zhen‐Yu Li ◽  
Xing‐Yuan Wang ◽  
Chun‐Peng Wang
Keyword(s):  

Author(s):  
Manu Shrivastava ◽  
Satyabrata Roy ◽  
Krishna Kumar ◽  
Chirag Vinodkumar Pandey ◽  
Jyoti Grover

Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1000
Author(s):  
Heping Wen ◽  
Jiajun Xu ◽  
Yunlong Liao ◽  
Ruiting Chen ◽  
Danze Shen ◽  
...  

In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper proposes a security-enhanced image communication scheme based on cellular neural network (CNN) under cryptanalysis. First, the complex characteristics of CNN are used to create pseudorandom sequences for image encryption. Then, a plain image is sequentially confused, permuted and diffused to get the cipher image by these CNN-based sequences. Based on cryptanalysis theory, a security-enhanced algorithm structure and relevant steps are detailed. Theoretical analysis and experimental results both demonstrate its safety performance. Moreover, the structure of image cipher can effectively resist various common attacks in cryptography. Therefore, the image communication scheme based on CNN proposed in this paper is a competitive security technology method.


Author(s):  
Zhihua Gan ◽  
Xiuli Chai ◽  
Xiangcheng Zhi ◽  
Wenke Ding ◽  
Yang Lu ◽  
...  

2021 ◽  
Vol 551 ◽  
pp. 39-53
Author(s):  
Ming Xu ◽  
Zihong Tian

2021 ◽  
Vol 554 ◽  
pp. 145-156
Author(s):  
Feng Yu ◽  
Xinhui Gong ◽  
Hanpeng Li ◽  
Shihong Wang

2021 ◽  
Vol 21 (1) ◽  
pp. 15
Author(s):  
Rika Ayu Sukmawati ◽  
Abduh Riski ◽  
Ahmad Kamsyakawuni

The development of sending messages that are increasingly easy and sophisticated makes it easier for third parties to access or sabotage the contents of the message, so we need a science called cryptography to secure the message. This research is to secure the message on image encoding using Playfair Cipher and 3D Playfair Cipher. The process of encryption and decryption on Playfair Cipher uses two-letter pairs (bigram), while in 3D Playfair Cipher uses three-letter pairs (trigrams). The encryption process uses Playfair Cipher and 3D Playfair Cipher to produce a different image cipher with plain image visually. In the decryption process, the cipher image returns into the plain image using Playfair Cipher and 3D Playfair Cipher. Histogram analysis, NPCR, and UACI are used to see the difference between ordinary images and password images using Playfair Cipher and 3D Playfair Cipher. The average results of histogram analysis that shows safe based on research data are 14061,483 using 3D Playfair Cipher, the average NPCR results that show safe based on research data are 99.2% using Playfair Cipher, and the average UACI results showing safe based on research data is 29.1% using 3D Playfair Cipher. The results of the study indicate that the proposed method can be used to secure the message.


2021 ◽  
Vol 50 (1) ◽  
pp. 55-75
Author(s):  
K SundaraKrishnan ◽  
RAJA SP ◽  
JAISON B

The transmission of significant masses of sensitive and secret images over a public network is inevitable, and demands effective tools and technology to safeguard and conceal the data. In this paper, a symmetric multiple color image encryption technique is proposed by adopting a dual permutation and dual substitution framework. Firstly, the input images are combined into a large image and then segmented into many small and equal-sized pure-image elements. Secondly, using the elementary cellular automata Rule-30, these pure-image elements are permuted to obtain mixed-image elements. Thirdly, second-level permutation is undertaken on the mixed-image elements by applying zigzag pattern scanning. Fourthly, pixel values are substituted by employing the circular shift method; subsequently, second-level pixel substitution is realized through using chaotic random sequences from a 2D logistic map. Finally, the big encrypted image is segmented into smaller encrypted images. Additionally, the keys are calculated from the input images to attain input sensitivity. The efficiency of this method is quantified, based on the unified average changing intensity (UACI), information entropy, number of pixels change rate (NPCR), key sensitivity, key space, histogram, peak signal-to-noise ratio (PSNR) and correlation coefficient (CC) performance metrics. The outcome of the experiments and a comparative analysis with two similar methods indicate that the proposed method produced high security results.


Sign in / Sign up

Export Citation Format

Share Document