Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
4,273 result(s) for "image encryption"
Sort by:
Handbook of image-based security techniques
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB-- Provided by publisher.
Chaos-Based Image Encryption: Review, Application, and Challenges
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos, such as sensitivity to initial conditions, topological transitivity, and pseudo-randomness, are conducive to cross-referencing with other disciplines and improving image-encryption methods. Additionally, this paper covers practical application scenarios and current challenges of chaotic image encryption, thereby encouraging researchers to continue developing and complementing existing situations, and may also serve as a basis of future development prospects for chaos-based image encryption.
Multiple-image encryption algorithm based on DNA encoding and chaotic system
Under the Internet platform, the digital images are widely applied in many fields at present. To protect the content of multiple images, a new multiple-image encryption (MIE) algorithm based on Deoxyribonucleic acid (DNA) encoding and chaotic system is proposed in this paper. Different from the traditional image encryption algorithms, the permutation and diffusion of the new algorithm is manipulated on the three-dimensional DNA matrix. Firstly, k plain images are combined into a big image which is then encoded with the DNA codes; secondly, the big image is scrambled by a chaotic sequence; thirdly, the big image is segmented into k images with the same size of the plain images, and they are diffused by a chaotic image encoded with the DNA codes; finally, k encrypted images are obtained after the DNA decoding. SHA-256 hash value of the plain images is employed to calculate the initial values and control parameters of the chaotic systems. Experimental results and algorithm analyses show that the new encryption algorithm has excellent encryption effect and high security.
Hyperchaos and the fusion of Moore’s automaton with gold sequences for augmented medical image encryption
This study presents a sophisticated encryption methodology specifically designed for the secure transfer of medical images across cloud services. The initial phase of the algorithm involves the consolidation of multiple images to form a single augmented image, which is then subjected to the first layer of encryption. This layer employs an encryption key and an S-box generated through a Memristive Coupled Neural Network Model (MCNNM), establishing a strong foundation for security. Following this, the novel integration of Moore’s Automaton with Gold sequences is applied as a confusion mechanism, intrinsically scrambling the image structure to effectively disrupt pixel correlations. The encryption process iterates over N cycles, significantly deepening the level of encryption with each iteration. Performance evaluations reflect a considerable key space of and a high encryption rate of 15.5 Mbps, while rigorous statistical tests validate the algorithm’s resilience. The encryption system proposed in this manuscript not only ensures a formidable level of security but is also pragmatically designed for application in the protection of sensitive healthcare data.
A novel infinitely coexisting attractor and its application in image encryption
The security performance of image encryption schemes based on chaotic systems has been greatly improved. Specifically, those chaotic systems with high-dimension or special attractors have shown more benefits for enhancing performance. By introducing the tangent function, a 4-dimensional chaotic system with infinite coexisting attractors is constructed. And the dynamical behaviors are analyzed through phase diagrams, bifurcation diagrams, Lyapunov exponent spectrum and spectral entropy complexity diagram. The results demonstrate that the system exhibits self-replication with respect to the initial value y 0 and possesses rich dynamical properties, such as infinite coexisting attractors, sensitivity to initial values and period-doubling bifurcation. These characteristics make it suitable for chaotic cryptography applications. Subsequently, a lossless double color image encryption scheme is designed based on the constructed system. The scheme adopts a diffusion-scrambling-diffusion processing method, and cleverly utilizes the information of the original plaintext image in the scrambling process, which significantly enhances the ability to resist known plaintext attacks or selected plaintext attacks. The experimental results verify that the designed algorithm not only effectively encrypts color and grayscale images, but also allows for encryption images of any size. Moreover, the algorithm implementation process is efficient and ensures high security performance, effectively resisting differential attacks, rotation attacks and cropping attacks. This research exploration on the chaotic characteristics of the nonlinear high-dimensional system and its application in image encryption is expected to provide theoretical guidance in the field of secure communication.
Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap
Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption. In addition to such a survey, this paper studies the main challenges in this field, establishes an ecosystem for chaotic image encryption, and develops a future roadmap for further research in this area.
Optimized Homomorphic Encryption (OHE) algorithms for protecting sensitive image data in the cloud computing environment
This research aims to enhance photo encryption security by developing a sophisticated technique. This method uses homomorphic encryption to address challenges in encrypting visible spectrum pictures. Each red–green–blue (RGB) channel of the image is divided into smaller sub-values, encrypted separately using an optimized homomorphic encryption algorithm, and then combined for further encryption. Additionally, a novel approach involves combining surrounding pixels to embed extra data during encryption. The process allows for compression and decompression of encrypted components for easier storage or transmission. After decryption, the initial pixel values are recovered, removing any unnecessary data and condensing each channel's pixel intensity into just two sub-values. Multiple security evaluations confirm the method's robustness and resistance, emphasizing its strong security features for encrypted images.
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content.
An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.
Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map
To enhance the encryption proficiency and encourage the protected transmission of multiple images, the current work introduces an encryption algorithm for multiple images using the combination of mixed image elements (MIES) and a two-dimensional economic map. Firstly, the original images are grouped into one big image that is split into many pure image elements (PIES); secondly, the logistic map is used to shuffle the PIES; thirdly, it is confused with the sequence produced by the two-dimensional economic map to get MIES; finally, the MIES are gathered into a big encrypted image that is split into many images of the same size as the original images. The proposed algorithm includes a huge number key size space, and this makes the algorithm secure against hackers. Even more, the encryption results obtained by the proposed algorithm outperform existing algorithms in the literature. A comparison between the proposed algorithm and similar algorithms is made. The analysis of the experimental results and the proposed algorithm shows that the proposed algorithm is efficient and secure.