Results 41 to 50 of about 6,410,352 (379)

Inverse computational ghost imaging for image encryption

open access: yesOptics Express, 2021
Computer-generated random patterns and bucket detection are two key characteristics of computational ghost imaging (GI), which offer it a potential application in optical encryption. Here, we propose an inverse computational GI scheme, in which bucket signals are firstly selected and then random patterns are calculated correspondingly.
Peixia Zheng, Qilong Tan, Hong-chao Liu
openaire   +2 more sources

Medical Image Encryption: A Comprehensive Review

open access: yesDe Computis, 2023
In medical information systems, image data can be considered crucial information. As imaging technology and methods for analyzing medical images advance, there will be a greater wealth of data available for study.
Saja Theab Ahmed   +4 more
semanticscholar   +1 more source

A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization

open access: yesMathematics, 2023
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because of their complex properties such as pseudo randomness and extreme sensitivity. This paper proposes a new color image encryption algorithm based on a hyper-
Xiaoyuan Wang   +5 more
semanticscholar   +1 more source

A Fast Image Encryption Algorithm Based on Improved 6-D Hyper-Chaotic System

open access: yesIEEE Access, 2022
Aiming at the security and efficiency of image transmission, a fast image encryption algorithm based on an improved 6-D chaotic system is proposed.
Haiping Chen   +3 more
doaj   +1 more source

Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure

open access: yesMathematics, 2023
This paper proposes a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. Firstly, the color pure image is decomposed into red, green, and blue components, and then a chaotic sequence based on plaintext association is ...
Heping Wen   +4 more
doaj   +1 more source

A Modified Binary Encryption Algorithm based on Diffuse Representation [PDF]

open access: yes, 2017
In the era of Internet, the multimedia data can be used by anyone. There is a chance that unintended users get access to the data so, encryption is needed to hide the multimedia data from the unauthorized users.
Arthy, R. (R)   +4 more
core   +1 more source

Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2019
A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit images through an untrusted channel provider, such as social network service providers. The proposed scheme enables the use of a smaller block size and a larger number of
Tatsuya Chuman   +2 more
openaire   +2 more sources

Algorithm of Encrypting Digital Image Using Chaos Neural Network

open access: yesAdvances in Multimedia, 2022
With the rapid development of digital communication technology, data and image encryption methods will get more and more in-depth research in these aspects.
Ying Mao
doaj   +1 more source

AES Image Encryption [PDF]

open access: yes, 2021
Abstract An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access.
openaire   +1 more source

RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System

open access: yesSymmetry, 2022
The exponential growth in transmission of multimedia over the Internet and unsecured channels of communications is putting pressure on scientists and engineers to develop effective and efficient security schemes. In this paper, an image encryption scheme
Wassim Alexan   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy