encrypt image
Recently Published Documents


TOTAL DOCUMENTS

5
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Li Xiong ◽  
Peng Li ◽  
Yingqian Zhang ◽  
Feifei Yang ◽  
Chenguang Ma

Abstract In this paper, a new memristor chaotic system is designed based on Chua’s memristor chaotic system. To get the complete picture of the brain of a three-dimensional chaotic attractor, red and blue 3D glasses is used to observe the chaotic attractor, and using Lyapunov exponent spectrum, SE complexity and C0 complexity to analyze dynamical characteristics of new memristor chaotic system. The results illustrate that the chaotic state of the new memristor chaotic system is distributed over a large parameter range, which shows that the new memristor chaotic system is more suitable for image encryption applications. To verify the image encryption application of the new memristor chaotic system, a novel image encryption algorithm is designed based on the new memristor chaotic system and DNA variation. The security performances of the designed algorithm indicate that the proposed algorithm can effectively encrypt image and has better security performance.


Author(s):  
Kai Zhu ◽  
Zizhi Lin ◽  
Yun Ding

There have been many ways to construct an algorithm to encrypt image. Most often the algorithms are based on DNA sequence or other methods. In this paper, we proposed a new method which is based on singular value decomposition. In this approach, we can encrypt a small portion of the data through RSA encryption algorithm. The strength of the proposed method is insured through various statistical and security analysis. It shows that the algorithm has good encryption effect and higher encryption efficiency, which can be applied to the storage and network transmission of military, medical and other digital images.


2014 ◽  
Vol 3 (2) ◽  
pp. 1 ◽  
Author(s):  
Safwat Hamad ◽  
Amal Khalifa ◽  
Ahmed Elhadad ◽  
Saad Rida

In this paper, a new extension of the Playfair cipher algorithm is proposed to encrypt image data more securely. The proposed method constructs a 16×16 secret key matrix to scramble image data byte by byte. In addition, the algorithm complexity is increased using masking and XOR procedure. That is, the key is used to generate a mask that is subsequently XORed with the scrambled image. Experimental results showed that using two slightly different secret keys, the resultant encrypted images are still completely different.


2011 ◽  
Vol 216 ◽  
pp. 293-296
Author(s):  
Feng Huang ◽  
Xiang Jun Ouyang ◽  
Xing Ping Liu

The paper analyzes a symmetric image encryption scheme based on a new chaotic two-dimensional map. The map can encrypt image. The numbers of the left-map and the right-map are used as the secret keys of encryption. A diffusion mechanism was used to diffuse the pixels of image. But it isn’t enough safe. Firstly there are a lot of week keys and duplicate keys. Secondly the diffusion mechanism is too simple to ensure the information security. The paper designs a new method of keys generation. The keys are non-zero and random. It has a large keys space and avoids the duplicate keys. Then it takes parts of keys as the parameters of a classic chaotic map. The process is the new diffusion mechanism. It solves the problem of weak keys. Simulation results show the effectiveness of the method.


Author(s):  
Agustinna Yosanny

Rapid development of Information Technology causes information can access easier without space boundaries. Image is a form of information, which contains many information. Some image contains confidential information that cannot distribute to unauthorized persons. Therefore, image encryption application is create to encrypt part of image that has confidential information. The image encryption application is encrypt image by applying DES, Triple DES, and IDEA algorithms. The research was applying analysis and design methodology. The analysis methodology was undertaken through literature study and algorithm research and testing. The design methodology was undertaken through database, features, system, and screen layout design. Results of the research are image encryption application that can encrypt part of image and or all of image by applying three algorithms such as DES, Triple DES, and IDEA. This application is show comparation of these algorithms. In conclusion, method of encryption can apply to image, so that confidential information of the image can protect from unauthorized person. 


Sign in / Sign up

Export Citation Format

Share Document