Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Yadav, Ak" wg kryterium: Autor


Wyświetlanie 1-3 z 3
Tytuł:
Asymmetric double-image encryption using twin decomposition in fractional Hartley domain
Autorzy:
Kumar, Jaideep
Singh, Phool
Yadav, Ak
Powiązania:
https://bibliotekanauki.pl/articles/2060684.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
double image encryption
twin decomposition
asymmetric cryptosystem
fractional Hartley transform
Opis:
Twin decomposition, consisting of equal and random modulus decompositions, not only makes a cryptosystem asymmetric but also resists special attack. A new double-image asymmetric crypto-system using twin decomposition in fractional Hartley domain is proposed. An input grayscale image, bonded with another grayscale image as its phase mask, is transformed via fractional Hartley transform. Equal modulus decomposition is applied on the resulting image, giving us two intermediate images. One of them is subjected to another fractional Hartley transform followed by random modulus decomposition, whereas the other serves as the first private key. The application of random modulus decomposition also results in two images: encrypted image and the second private key. During the process of decryption, firstly the encrypted image is combined with second private key and thereafter it is subjected to inverse fractional Hartley transform. The resulting image is then combined with the first private key, and followed by another inverse fractional Hartley transform, thus recovering the two original images. The proposed cryptosystem is validated for pairs of grayscale images.
Źródło:
Optica Applicata; 2022, 52, 1; 21--35
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain
Autorzy:
Anjana, Savita
Yadav, Ak
Singh, Phool
Singh, Hukum
Powiązania:
https://bibliotekanauki.pl/articles/2172830.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
QR decomposition
audio encryption
random modulus decomposition
Opis:
In this paper, an asymmetric audio and image encryption mechanism using QR decomposition and random modulus decomposition (RD) in the Fresnel domain is proposed. The audio file is recorded as a vector and converted to a two-dimensional array to act as an image or a sound map. This sound map is encrypted using the image encryption algorithm proposed in this paper. The proposed cryptosystem is validated for both audios and grayscale images. Fresnel parameters and the two private keys obtained from QR decomposition and random modulus decomposition (RD) form the key space. Computer-based reproductions have been carried out to prove the validity and authenticity of the scheme. Simulation results authenticate that the scheme is robust and efficient against various attacks and is sensitive to input parameters.
Źródło:
Optica Applicata; 2022, 52, 3; 359--374
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting
Autorzy:
Anjana, Savita
Rakheja, Pankaj
Yadav, Ak
Singh, Phool
Singh, Hukum
Powiązania:
https://bibliotekanauki.pl/articles/2086764.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
QR decomposition
Fresnel transform
sparse matrix
asymmetric cryptosystem
Opis:
A novel asymmetric scheme for double image encryption, compression and watermarking based on QR decomposition in the Fresnel domain has been presented. The QR decomposition provides a permutation matrix as a ciphertext, and the product of orthogonal and triangular matrix as a key. The ciphertext obtained through this process is a sparse matrix that is compressed by the CSR method to give compressed encrypted data, which when combined with a host image, gives a watermarked image. Thus, a cryptosystem that involves compression and watermarking is proposed. The proposed scheme is validated for grayscale images. To check the efficacy of the proposed scheme, histograms, statistical parameters, and key sensitivity are analyzed. The scheme is also tested against various attacks. Numerical simulations are performed to validate the security of the scheme.
Źródło:
Optica Applicata; 2022, 52, 2; 283--295
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies