Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014, IJCT
Multimedia communication is the new age of communication. The image communication is one of most popular multimedia communication. This type of communication always faces problem of security. The communication breaching rate is rising very rapidly. The image privacy is facing a bigger threat. In this paper, we represent a new approach for image encryption and decryption by using pixel shifting and based on Quasigroup(Latin Square) without performing translation, through which there is low computational requirement. In this we apply new type of encryption and decryption here we used Quasigroup as a key. Image pixel reshuffling is done randomly and non-repeated manner.
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
The New Image Encryption and Decryption Using Quasi Group2014 •
Multimedia Communication is the new age of communication. Image Communication is one of the most popular types of multimedia communication. This type of communication always faces security challenges. Security breach is rising at a rapid rate. Image privacy is facing an even bigger threat. There are several image cryptography techniques having both positive and negative consequences. Via this paper, we are presenting a new approach for image encryption and decryption by using pixel shifting and using Quasigroup (Latin Square) without performing translation. It requires low computation as a key. Image pixel reshuffling is done randomly and in a non-repeated manner.
2017 •
A During last two decades, there has been a prolific growth in the chaos based image encryption algorithms. Up to an extent these algorithms have been able to provide an alternative to exchange large media files (images and videos) over the networks in a secure way. However, there have been some issues with the implementation of chaos based image ciphers in practice. One of them is reduced/small key space due to the fact that chaotic behavior is only observed for certain range of system parameters/initial conditions of the chaotic system used in such algorithms. To overcome this difficulty, we propose a simple, efficient and robust image encryption algorithm based on combined applications of quasigroups and chaotic standard map. The proposed image cipher is based on the popular substitution-diffusion architecture (Shanon) where a quasigroup of order 256 and chaotic standard map have been used for the substitution and permutation of image pixels respectively. Due to the introduction ...
International Journal of Engineering Research and Technology (IJERT)
IJERT-A Survey Report on Image Encryption Techniques2013 •
https://www.ijert.org/a-survey-report-on-image-encryption-techniques https://www.ijert.org/research/a-survey-report-on-image-encryption-techniques-IJERTV2IS101165.pdf In these days as multimedia data transferred over insecure channel, it becomes an important issue to encrypt image with a suitable image encryption algorithms. An image encryption is different from text due to large processing, pixels definition, time to encrypt and size. This is also a different approach due to different type of attacks possible on text and image data. In this paper we study some encryption technique on the basis of their classification. Major technique are classified in different categories are, (I) Pixel Position permutation based algorithm, (II) value transformation based algorithm and (III) visual transformation based algorithm. We aim to frame this paper as literature survey of these classifications.
Journal of Electrical Engineering
A New Cryptographic Strategy for Digital Images Article Info ABSTRACT Corresponding Author2014 •
Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing the two Boolean operations: XOR and Rotation that are done on the bits of the pixels in the image. This method is implemented by firstly doing a sequential XOR operation on all the bits of pixels in the image, and secondly makes a circular rotate right of these bits. These two operations are repeated many times during the encryption phase. The security and performance of the proposed encryption method have been evaluated by applying it on images and analyze the recorded results using key space analysis, key sensitivity analysis, and statistical analysis. The performance experiments show that the proposed method is promising to use effectively in wide fields of image encryption.
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
A Survey Paper Based On Image Encryption and Decryption Technique2022 •
Nowadays multimedia system knowledge protection is changing into important. The coding technique is employed to safeguard multimedia system knowledge. There are completely different techniques wont to defend confidential image knowledge from unauthorized access. during this paper, we've got an inclination to survey existing work that's used entirely completely different techniques for image coding and that we to boot give a general introduction relating to cryptography.
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Toplumsal Tarih Şubat 2024
Lenin: "Türk Şehri Kars için Savaşmayacağız"2024 •
Creating history and identity in Asia Minor : the case of Aeolian Kyme
Creating history and identity in Asia Minor : the case of Aeolian Kyme2023 •
HAL (Le Centre pour la Communication Scientifique Directe)
Mariana (Lucciana, Haute-Corse) : paysage, architecture et urbanisme de l’Antiquité au Moyen Âge2017 •
Cryptogamie Algologie
Rise of Subgen. Rhoicosphenula Lange-Bert. to the Genus Level, and Description of a New Gomphosphenia s.s. Species from Puerto Rico2021 •
Aktualʹnì pitannâ gumanìtarnih nauk
Analysis of the aspects of professionalism of a tour guide2020 •
International Journal for Population Data Science
Intellectual Disability in Children with Congenital Heart Defects in Western Australia2018 •
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)
Two Knives Cut Better Than One: Chinese Word Segmentation with Dual Decomposition2014 •
2015 •
Clinical Genetics
Epileptic encephalopathy caused by ARV1 deficiency: Refinement of the genotype–phenotype spectrum and functional impact on GPI‐anchored proteins2021 •
2015 •