Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Encryption" wg kryterium: Temat


Wyświetlanie 1-14 z 14
Tytuł:
Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system
Autorzy:
Nie, Zhe
Liu, Zheng-Xin
He, Xiang-Tao
Gong, Li-Hua
Powiązania:
https://bibliotekanauki.pl/articles/174108.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
hyper-chaotic system
advanced encryption standard
discrete cosine transform
image encryption
image compression
Opis:
An image compression and encryption algorithm by combining the advanced encryption standard (AES) with the hyper-chaotic system is designed, in which Arnold map is employed to eliminate part of the block effect in the image compression process. The original image is compressed with the assistance of a discrete cosine transform and then its transform coefficients are encrypted with the AES algorithm. Besides, the hyper-chaotic system is adopted to introduce the nonlinear processfor image encryption. Numerical simulations and theoretical analyses demonstrate that the proposed image compression and encryption algorithm is of high security and good compression performance.
Źródło:
Optica Applicata; 2019, 49, 4; 545-558
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A known-plaintext attack on iterative random phase encoding in fractional Fourier domains
Autorzy:
Yin, F.
He, Q.
Liu, Z.
Powiązania:
https://bibliotekanauki.pl/articles/174043.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
phase encoding
known-plaintext attack
Opis:
Known-plaintext attack is considered for decrypting the image generated by iterative random phase encoding in fractional Fourier transform domains. The double random phase encoding in Fourier domains is introduced to design the known-plaintext attack procedure. The decryption test is explored without both fractional order and these random phase masks. Some numerical simulations are made to demonstrate the validity of the known-plaintext attack.
Źródło:
Optica Applicata; 2017, 47, 1; 131-139
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression-encryption algorithm combining compressive sensing with log operation
Autorzy:
Chen, R.-L.
Zhou, Y.
Luo, M.
Zhang, A.-D.
Gong, L.-H.
Powiązania:
https://bibliotekanauki.pl/articles/174009.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
image compression
compressive sensing
log operation
Opis:
Based on compressive sensing and log operation, a new image compression-encryption algorithm is proposed, which accomplishes encryption and compression simultaneously. The proposed image compression-encryption algorithm takes advantage of not only the physical realizability of partial Hadamard matrix, but also the resistance of the chosen-plaintext attack since all the elements in the partial Hadamard matrix are 1, –1 or log 1 = 0. The proposed algorithm is sensitive to the key and it can resist various common attacks. The simulation results verify the validity and reliability of the proposed image compression-encryption algorithm.
Źródło:
Optica Applicata; 2018, 48, 4; 563-573
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption based on permutation polynomials over finite fields
Autorzy:
Wu, Jianhua
Liu, Hai
Zhu, Xishun
Powiązania:
https://bibliotekanauki.pl/articles/1835797.pdf
Data publikacji:
2020
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
finite field
permutation polynomials
scrambling
diffusion
image encryption
Opis:
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists of four stages: i) a mapping from pixel gray-levels into finite field, ii) a pre-scrambling of pixels’ positions based on the parameterized permutation polynomial, iii) a symmetric matrix transform over finite fields which completes the operation of diffusion and, iv) a post-scrambling based on the permutation polynomial with different parameters. The parameters used for the polynomial parameterization and for constructing the symmetric matrix are used as cipher keys. Theoretical analysis and simulation demonstrate that the proposed image encryption scheme is feasible with a high efficiency and a strong ability of resisting various common attacks. In addition, there are not any round-off errors in computation over finite fields, thus guaranteeing a strictly lossless image encryption. Due to the intrinsic nonlinearity of permutation polynomials in finite fields, the proposed image encryption system is nonlinear and can resist known-plaintext and chosen-plaintext attacks.
Źródło:
Optica Applicata; 2020, 50, 3; 357-376
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption algorithm by using the logistic map and discrete fractional angular transform
Autorzy:
Yu, J.
Li, Y.
Xie, X.
Zhou, N.
Zhou, Z.
Powiązania:
https://bibliotekanauki.pl/articles/173813.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
logistic map
discrete fractional angular transform
Opis:
A new image encryption scheme based on logistic map and discrete fractional angular transform has been proposed. In the proposed scheme, the original image is encrypted with the random sequence generated by the logistic map, and the encrypted image is subsequently processed by the discrete fractional angular transform, which produces the ciphertext after double encryptions. The parameters of the logistic map and the order of the discrete fractional angular transform serve as the main keys of the image encryption algorithm. Simulation results show that the proposed image encryption algorithm can effectively resist the attacks of statistical analysis, and has acceptable encryption effect and security.
Źródło:
Optica Applicata; 2017, 47, 1; 141-155
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption based on Chebyshev chaotic map and S8 S-boxes
Autorzy:
Hussain, Iqtadar
Anees, Amir
Alkhaldi, Ali Hussain
Aslam, Muhammad
Siddiqui, Nasir
Ahmed, Rehan
Powiązania:
https://bibliotekanauki.pl/articles/173918.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
chaos
noise-resistant
statistical analysis
key sensitivity
Opis:
The encryption of image data is artful as compare to others due to some special characteristics such as entropy, contrast, the correlation between the pixels, intensity, and homogeneity. During encryption process, it is conventionally not easy to manage these characteristics with non-chaotic cryptosystems. Therefore for the sake of strong encryption algorithms, in last decades many cryptographers have presented invulnerable schemes for image encryption based on the chaotic maps. This manuscript aims to propose a strong encryption scheme based on a symmetric group of permutation advanced encryption standard (AES) substitution boxes and modified Chebyshev map. Principally, the secret key depends upon the parameters of Chebyshev map to create confusion in the main image and is encrypted by the scheme made from the S8 AES S-boxes and chaotic map. By this procedure, one can obtain an encrypted image that is entirely twisted. The results of analyses showed that the presented image encryption is strong and invulnerable.
Źródło:
Optica Applicata; 2019, 49, 2; 317-330
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation
Autorzy:
Jiang, Hao
Nie, Zhe
Zhou, Nanrun
Zhang, Wenquan
Powiązania:
https://bibliotekanauki.pl/articles/173461.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
compressive sensing
double random phase encoding
Josephus traversing
Opis:
A double-image encryption scheme based on compressive sensing is designed by combining a double random phase encoding technique with Josephus traversing operation. Two original images are first compressed and encrypted by compressive sensing in the discrete wavelet domain and then connected into a complex image according to the order of the alternate rows. Moreover, the resulting image is re-encrypted into stationary white noise by a double random phase encoding technique. Lastly, Josephus traversing method is utilized to scramble the transformed image. The initial states of the Henon chaotic map are the secret keys of this double-image encryption algorithm, which can be used to control the construction of the measurement matrix in compressive sensing and generation of the random-phase mask in double random phase encoding. Simulation results show that the proposed double-image encryption algorithm is effective and secure.
Źródło:
Optica Applicata; 2019, 49, 3; 445-459
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression and encryption algorithm with wavelet-transform-based 2D compressive sensing
Autorzy:
Fan, Jing-Hui
Liu, Xian-Bao
Chen, Yan-Bin
Powiązania:
https://bibliotekanauki.pl/articles/175122.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
wavelet transform
compressive sensing
chaos scrambling
image encryption
image compression
Opis:
By combining a wavelet transform with chaos scrambling, an image compression and encryption algorithm based on 2D compressive sensing is designed. The wavelet transform is employed to obtain the sparse representation of a plaintext image. The sparse image is measured in two orthogonal directions by compressive sensing. Then, the result of 2D compressive sensing is confused by the Arnold transform and the random pixel scrambling. The combination of four-dimensional chaos and logistic map is exploited to generate the first row of the key-controlled circulant matrix. The proposed algorithm not only carries out image compression and encryption simultaneously, but also reduces the consumption of the key by controlling the generation of measurement matrix. Experimental results reveal that the proposed image compression and encryption algorithm is resistant to noise attacks with good compression performance and high key sensitivity.
Źródło:
Optica Applicata; 2019, 49, 3; 461-472
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reversible data-hiding-through-encryption scheme using rotated stream cipher
Autorzy:
Manikandan, V. M.
Powiązania:
https://bibliotekanauki.pl/articles/2097957.pdf
Data publikacji:
2021
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
reversible data-hiding
image encryption
image decryption
secure message transmission
Opis:
Research into the domain of reversible data-hiding has received a great deal of attention in recent years due to its wide applications in medical image transmission and cloud computing. Reversible data-hiding during image encryption is a recently emerged framework for hiding secret data in an image during the image-encryption process. In this manuscript, we propose a new reversible data-hiding-through-encryption scheme that will ensure a high embedding rate without bringing any additional overhead of key handling. The proposed algorithm can use any secure symmetric encryption scheme, and the encryption and/or decryption key should be shared with the receiver for data extraction and image recovery. As per the proposed scheme, the data hider can hide threebits of a secret message in an image block of a size of B × B pixels. The data extraction and image recovery will be carried out by analyzing the closeness between adjacent pixels. The simulation of the new scheme carried out on the USC-SIPI dataset shows that the proposed scheme outperforms the well-known existing schemes in terms of embedding rates and bit error rates.
Źródło:
Computer Science; 2021, 22 (2); 267-291
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain
Autorzy:
Singh, H.
Powiązania:
https://bibliotekanauki.pl/articles/173502.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
fractional Hartley transform
FrHT
image encryption
mean squared error
noise attacks
entropy
Opis:
This paper proposed an enhanced asymmetric cryptosystem scheme for optical image encryption in the fractional Hartley transform domain. Grayscale and binary images have been encrypted separately using double random phase encoding. Phase masks based on optical vortex and random phase masks have been jointly used in spatial as well as in the Fourier planes. The images to be encrypted are first multiplied by optical vortex and random phase mask and then transformed with direct and inverse fractional Hartley transform for obtaining the encrypted images. The images are recovered from their corresponding encrypted images by using the correct parameters of the fractional Hartley transform and optical vortex, whose digital implementation has been performed using MATLAB 7.6.0 (R2008a). The random phase masks, optical vortex and transform orders associated with the fractional Hartley transform are extra keys that cause difficulty to an unauthorized user. Thus, the proposed asymmetric scheme is more secure as compared to conventional techniques. The efficacy of the proposed asymmetric scheme is verified by computing the mean squared error between recovered and the original images. The sensitivity of the asymmetric scheme is also verified with encryption parameters, noise and occlusion attacks. Numerical simulation results demonstrate the effectiveness and security performance of the proposed system.
Źródło:
Optica Applicata; 2017, 47, 4; 557-578
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Double-image encryption scheme based on the phase-truncated multiple-parameter Fresnel transform
Autorzy:
Zhou, Ling
Zhou, Hang
Ma, Yan
Zhou, Nan-Run
Powiązania:
https://bibliotekanauki.pl/articles/2086756.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
chaotic system
phase-truncated multiple-parameter Fresnel transform
scrambling
diffusion
image encryption
Opis:
A double-image encryption algorithm is proposed with the phase-truncated multiple-parameter Fresnel transform. Firstly, the pixel positions of two plaintext images are scrambled and then the results are merged into one image with the scrambling operation. Subsequently, the resulting image is encrypted by phase truncation and phase reservation in the multiple-parameter Fresnel transform domain. The phase information is scrambled by the affine transform and then recombined with the amplitude information. The final encryption image is obtained with the pixel scrambling and diffusion methods to further enhance the security of the image encryption system, where the scrambling and diffusion operations are based on logistic map, logistic-sine system and 2D logistic-adjusted-sine map. The image encryption scheme is robust against the common attacks due to the nonlinear properties of diffusion and phase truncation. Numerical simulation results verify the performance and the security of the proposed double-image algorithm based on the phase-truncated multiple-parameter Fresnel transform.
Źródło:
Optica Applicata; 2022, 52, 2; 163--177
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane zagadnienia implementacyjne zaawansowanych algorytmów kryptografii wizualnej
Selected aspects of implementation of advanced visual cryptography algorithms
Autorzy:
Wiśniewski, P.
Ogiela, M. R.
Powiązania:
https://bibliotekanauki.pl/articles/155838.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
podział sekretu
kryptografia wizualna
szyfrowanie informacji obrazowej
secret sharing
visual cryptography
image encryption
Opis:
W publikacji scharakteryzowano dwa zaawansowane algorytmy kryptografii wizualnej: tzw. rozszerzoną kryptografię wizualną, w której istnieje możliwość umieszczenia fałszywych danych w sekretnych częściach obrazu, oraz skuteczną technikę szyfrowania obrazów kolorowych. Zaprezentowano także przykładową aplikację umożliwiającą użycie jednej z czterech metod oraz odczyt utajnionej informacji. Otrzymane wyniki działania opisywanych algorytmów potwierdzają wysoką skuteczność tego rodzaju technik kryptograficznych oraz zasadność ich praktycznego zastosowania.
The paper presents two advanced visual cryptography algorithms: extended visual cryptography (EVCS) [2], where it is possible to place false information in shares of an image, and an effective encryption method for color images. This publication also presents an example application, which allows its user to execute one of four visual cryptography algorithms and to decrypt the secret information by joining shares. The first section shows the purpose of encrypting image data and main advantages of visual cryptography. In the second section an idea of secret sharing is presented. The third section describes visual cryptography techniques, where it is possible to create meaningful shares by encoding false information into shadow images. An example of (2,4)-threshold EVCS scheme is presented for a secret binary image. The fourth section presents a visual cryptography algorithm suitable for color images, which was analysed using a sample image. In the fifth section a visual cryptography system is proposed and its main features are presented, including procedure descriptions and obtained execution times of encryption algorithms. The summary presents the advantages of advanced visual cryptography algorithms and the utility of the application created for research. The obtained results of executing the described algorithms confirm the efficiency of these cryptographic techniques and the validity of its practical applications.
Źródło:
Pomiary Automatyka Kontrola; 2014, R. 60, nr 12, 12; 1185-1188
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption scheme based on a Gaussian apertured reality-preserving fractional Mellin transform
Autorzy:
Wang, Mengmeng
Pousset, Yannis
Carré, Phillippe
Perrine, Clency
Zhou, Nanrun
Wu, Jianhua
Powiązania:
https://bibliotekanauki.pl/articles/1835799.pdf
Data publikacji:
2020
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
Gaussian apertured reality-preserving FrMT
Collins diffraction
Arnold transform
bitwise XOR
Opis:
An image encryption scheme based on a Gaussian apertured reality-preserving fractional Mellintrans form (GARPFrMT) is proposed. The GARPFrMT was realized in the diffraction domain.The Gaussian aperture, like a soft aperture, improved the amount of light that passed through the lens compared to a hard aperture and reduced the light leakage at the edge of the lens, assisting to some extent in resisting direct attacks. In the proposed scheme, the reality-preserving transform was constructed in the diffraction domain to ensure that the cipher-text is real. The GARPFrMT is a nonlinear transformation used for eliminating potential insecurity existing in the linear image encryption system. In order to further enhance the security of the encryption system, an Arnold transform, and a bitwise XOR operation were employed for permutation and scrambling in the encryption process. Simulation results and theoretical analysis show that the proposed algorithm is feasible and capable of with standing several common attacks.
Źródło:
Optica Applicata; 2020, 50, 3; 477-495
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Color image encryption using singular value decomposition in discrete cosine Stockwell transform domain
Autorzy:
Vaish, A.
Kumar, M.
Powiązania:
https://bibliotekanauki.pl/articles/173700.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
discrete cosine Stockwell transform
image encryption
singular value decomposition
mean square error
structural similarity index measurement
Opis:
In this paper, an image encryption technique using singular value decomposition (SVD) and discrete cosine Stockwell transform (DCST) is proposed. The original source image is encrypted using bands of DCST along with the SVD decomposed images. The number of bands in DCST, parameters used to mask the singular values, the way of permutation used to shuffle the values of SVD transformed images and the way of arrangement of SVD matrices are used as encryption keys. It is necessary to have correct knowledge of all the keys along with their respective values, for correct decryption of encrypted images. The robustness and the quality measurement of proposed work are analyzed by comparing it with some existing works.
Źródło:
Optica Applicata; 2018, 48, 1; 25-38
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-14 z 14

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies