Academic literature on the topic 'Image Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Image Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Image Encryption"

1

Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (March 13, 2021): 341. http://dx.doi.org/10.3390/e23030341.

Full text
Abstract:
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been suggested to improve secure image encryption schemes. Nowadays, chaotic methods have been found in diverse fields, such as the design of cryptosystems and image encryption. Chaotic methods-based digital image encryptions are a novel image encryption method. This technique uses random chaos sequences for encrypting images, and it is a highly-secured and fast method for image encryption. Limited accuracy is one of the disadvantages of this technique. This paper researches the chaos sequence and wavelet transform value to find gaps. Thus, a novel technique was proposed for digital image encryption and improved previous algorithms. The technique is run in MATLAB, and a comparison is made in terms of various performance metrics such as the Number of Pixels Change Rate (NPCR), Peak Signal to Noise Ratio (PSNR), Correlation coefficient, and Unified Average Changing Intensity (UACI). The simulation and theoretical analysis indicate the proposed scheme’s effectiveness and show that this technique is a suitable choice for actual image encryption.
APA, Harvard, Vancouver, ISO, and other styles
2

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Full text
Abstract:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning along with encryption schemes exhibited more effective outcomes, especially when used with digital images. This paper aims to reduce and change the transferred data between interested parties and overcome the problem of building negative conclusions from encrypted medical images. In order to do so, the target was to transfer from the domain of encrypting an image to encrypting features of an image, which are extracted as float number values. Therefore, we propose a deep learning-based image encryption scheme using the autoencoder (AE) technique and the advanced encryption standard (AES). Specifically, the proposed encryption scheme is supposed to encrypt the digest of the medical image prepared by the encoder from the autoencoder model on the encryption side. On the decryption side, the analogous decoder from the auto-decoder is used after decrypting the carried data. The autoencoder was used to enhance the quality of corrupted medical images with different types of noise. In addition, we investigated the scores of structure similarity (SSIM) and mean square error (MSE) for the proposed model by applying four different types of noise: salt and pepper, speckle, Poisson, and Gaussian. It has been noticed that for all types of noise added, the decoder reduced this noise in the resulting images. Finally, the performance evaluation demonstrated that our proposed system improved the encryption/decryption overhead by 50–75% over other existing models.
APA, Harvard, Vancouver, ISO, and other styles
3

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms are popular in enhancing security for image encryption. The main computational intelligence algorithms used in image encryption are neural network, fuzzy logic and genetic algorithm. In this paper, a review is done on computational intelligence-based image encryption methods that have been proposed in the recent years and the comparison is made on those methods based on their performance on image encryption.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (December 16, 2022): 9929. http://dx.doi.org/10.3390/s22249929.

Full text
Abstract:
Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further improve the key sensitivity and plain-image sensitivity of the encryption algorithm. Finally, in a series of security analysis experiments, the experimental image Lena was tested 100 times, and the average encryption time was 0.479 s. The average value of the information entropy, pixel change rate and uniform average change intensity of the cipher image reached 7.9994, 99.62% and 33.48%, respectively. The experimental results show that the fast image encryption algorithm based on logistics-sine-cosine mapping takes less time to encrypt, and the cipher image has good information entropy and diffusivity. It is a safe and effective fast image encryption algorithm.
APA, Harvard, Vancouver, ISO, and other styles
5

Kovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.

Full text
Abstract:
An image as a stochastic signal is one of the most common forms of information. Protecting images from unauthorized access and applying is a correspondingly urgent task. This causes the use of well-known classical encryption methods in the case of image encryption. But the image is a signal that possesses, in addition to typical informativeness, also visual informativeness. Informativeness for modern image processing methods makes it possible to ensure unauthorized access. Creating an attack on an encrypted image is possible in two ways: by traditional hacking of encryption methods, or by classical methods of visual image processing (filtering, highlighting contours, etc.). In this regard, one more requirement is put forward to encryption methods in the case of their application concerning images - this is the complete noise of the encrypted image. This is necessary so that the use of visual image processing methods becomes impossible. The RSA algorithm is one of the most widely known industrial standards for encrypting signals. Unlike symmetric encryption, in an open-key encryption scheme, it is impossible to calculate the decryption procedure, knowing the encryption procedure. Namely, the working time of the algorithm for calculating the decryption procedure is so great that it cannot be implemented on any modern computers, as well as on computers of the future. Such coding schemes are called asymmetric. Therefore, the urgent task is to implement the application of the RSA algorithm so that when encrypting an image: – the cryptographic stability of the RSA algorithm has not become worse; – the full image noise was achieved to prevent the use of visual image processing techniques. The algorithm of elements of the RSA algorithm, as the most resistant to unauthorized decryption of signals, and bitwise operations for a compatible combination during encryption and decryption of images is proposed by the authors. Encryption - decryption is performed without additional noise. The proposed algorithm is applied to images in which there are strictly extracted contours. Elements of the RSA algorithm are assigned to perform bitwise operations on the intensity values of pixels of a color image. The developed algorithm has higher cryptographic stability compared to the traditional RSA algorithm. The authors described the possibilities of using elements of the RSA algorithm in bitwise transformations when encrypting and decrypting images. The results of encryption simulation for cryptographic transformations of color images of a given dimension are presented. Modified models and algorithmic procedures of key formation processes of direct and inverse cryptographic transformations have been developed. They are reduced to elemental mathematical operations.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.

Full text
Abstract:
This paper proposes a hyperchaos-based image encryption algorithm, which consists of two scrambling-diffusion operations and one scrambling operation. In the proposed algorithm, the initial conditions of a hyperchaotic Chen system are first generated using the Message Digest 5 (MD5) value of digital images and given initial values, and then the images will be encrypted using the keystream created by the system. Since the initial values of hyperchaotic Chen systems are related to plaintext and the encryption process is related to the images, this algorithm is able to effectively protect images against selective plaintext attacks. Simulation results demonstrate that the present algorithm offers enhanced encryption performance, high security, and strong resistance to known attacks. Therefore, it may find wide application in image encryption transmission. Compared to other image encryption algorithms, the proposed algorithm uses different keystreams when encrypting different images and is capable of effectively resisting various plain image and differential attacks faster.
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Junfeng, Jialu Zhang, Dong Liu, and Xiaofeng Wang. "A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding." Entropy 25, no. 6 (June 3, 2023): 898. http://dx.doi.org/10.3390/e25060898.

Full text
Abstract:
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content.
APA, Harvard, Vancouver, ISO, and other styles
8

Kouadra, Imane, Mehamal Bouchra, Tewfik Bekkouche, and Lahcene Ziet. "Encryption face area in color images using Chaotic Maps." International Conference on Pioneer and Innovative Studies 1 (June 13, 2023): 501–6. http://dx.doi.org/10.59287/icpis.880.

Full text
Abstract:
This paper introduces a region-based selective image encryption technique using a chaoticapproach. The aim is to address the growing need for secure face image transmission and storage in variousapplications where image information requires protection from unauthorized access. Existing imageencryption schemes often rely on generating randomness in the image to hide the content, but they can betime-consuming during the encryption and decryption processes. Therefore, an efficient algorithm is crucialto ensure practicality and effectiveness. To tackle this challenge, the proposed technique focuses onselectively encrypting and reconstructing facial regions in images. By identifying the importance of faceimages in applications where security is critical, the proposed method offers a targeted approach toencryption. This selective encryption allows for improved efficiency in both encryption and decryptionprocesses, reducing computational complexity and enhancing overall performance. The experimentsdemonstrate the successful encryption and reconstruction of face images, highlighting the preservation offacial details and the robustness of the encryption against attacks. These results confirm the suitability ofthe proposed technique for applications that require secure face image transmission and storage.
APA, Harvard, Vancouver, ISO, and other styles
9

Abeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (January 17, 2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Full text
Abstract:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumari, Abinaya, B. Akshaya, B. Umamaheswari, K. Thenmozhi, Rengarajan Amirtharajan, and Padmapriya Praveenkumar. "3D Lorenz Map Governs DNA Rule in Encrypting DICOM Images." Biomedical and Pharmacology Journal 11, no. 2 (June 26, 2018): 897–906. http://dx.doi.org/10.13005/bpj/1446.

Full text
Abstract:
This paper introduces a framework for the secure encryption of healthcare images. The objective of this paper is to encrypt medical images based on Deoxyribo Nucleic Acid (DNA), 3D Lorenz chaotic map, BITXOR operations. The different keys are employed to provide confusion, permutation, encoding and diffusion operations in the encryption procedure to provide uncorrelated image pixels. The proposed algorithm uses 3D Lorenz attractor as chaotic system for encrypting colour Digital Imaging and Communication in Medicine (DICOM) images. Further the encrypted image will be validated using encryption quality to evaluate the security analysis.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Image Encryption"

1

Bowley, James. "Sparse image representation with encryption." Thesis, Aston University, 2013. http://publications.aston.ac.uk/20914/.

Full text
Abstract:
In this thesis we present an overview of sparse approximations of grey level images. The sparse representations are realized by classic, Matching Pursuit (MP) based, greedy selection strategies. One such technique, termed Orthogonal Matching Pursuit (OMP), is shown to be suitable for producing sparse approximations of images, if they are processed in small blocks. When the blocks are enlarged, the proposed Self Projected Matching Pursuit (SPMP) algorithm, successfully renders equivalent results to OMP. A simple coding algorithm is then proposed to store these sparse approximations. This is shown, under certain conditions, to be competitive with JPEG2000 image compression standard. An application termed image folding, which partially secures the approximated images is then proposed. This is extended to produce a self contained folded image, containing all the information required to perform image recovery. Finally a modified OMP selection technique is applied to produce sparse approximations of Red Green Blue (RGB) images. These RGB approximations are then folded with the self contained approach.
APA, Harvard, Vancouver, ISO, and other styles
2

Akdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.

Full text
Abstract:
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature in terms of scrambling performance, bandwidth expansion, key size and security. Furthermore this method is applied to the H.263 video sequences for the encryption of I-frames.
APA, Harvard, Vancouver, ISO, and other styles
3

Uehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Norman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Howard Chi Ho. "Partial encryption for image and video communication." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ34345.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maniccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manisekaran, Pradheep [Verfasser]. "Image Encryption by Using ACGLML / Pradheep Manisekaran." München : GRIN Verlag, 2021. http://d-nb.info/123663103X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wadhwani, Sandeep. "Using chaotic encryption schemes in distributed image storage." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119757.

Full text
Abstract:
Security and privacy of photos stored in the clear in third party servers has been the biggest concern for customers in recent years. One way of enhancing the privacy and security of photos stored in third party servers is to encrypt the photos before storing them. However, using encryption to secure the information held in the photos precludes applying any image processing operations while they are held in the third party servers. To address this issue, we have designed and implemented a distributed image storage system that is based on the Chord protocol which enhances privacy using chaotic map transformations and image segmentation. The distributed system we use has two types of resources: trusted server resources and untrusted peer-to-peer resources. The images are encrypted using an Arnold's cat map algorithm and split into strips before uploaded to the destination machines. The cat map algorithm shuffles an image pixels and produces a noise-like image. A pixelated (a group of nearby pixels are made the same color) image of the original image is generated to represent it in the central server. From the pixelated image we generate the key parameters that control the cat map transformations. A variety of pixel-level, block-level and binary filters have been implemented to support image processing on encrypted images in the system. One of the concerns of using cat maps for security purposes is the quality of shuffling provided by these transformations. For certain parameter values and image sizes cat map transformations reveal the original image as ghosts or clusters. As part of my thesis, I studied the ghost and cluster formation scenarios. I performed many experiments and proposed simple tests that can be used to detect the parameter values that should be avoided.
La sécurité et l'intimité des images électronique stockée dans des serveurs tierces est une des plus grandes préoccupations de nos jours. L'une des manières d'améliorée la sécurité est de crypter les données contenu dans les images avant de les télécharger vers le serveur en question. Cependant, le fait d'utiliser des techniques cryptographiques pour assurer la sécurité des images, ce la empêche l'application d'opérations de traitement d'images pendant qu'ils résident sur les serveurs. Pour résoudre ce problème, nous avons conçu et mis en œuvre un système distribué pour télécharger les images sur les serveurs qui est basée sur le protocole "Chord", améliorant la sécurité en utilisant des techniques de la théorie du chaos pour transformer l'image puis finalement la segmenter. Le système distribué que nous utilisons contient deux types de ressources : des ressources de serveur fiable et des ressources non fiables paires à pair. Les images sont cryptées avec l'application de l'algorithme chat d'Arnold, l'image résultante est divisée en morceaux avant d'être télécharger aux machines destinataires. L'algorithme de chat d'Arnold produit une image bruyante. Une image pixélisé (un groupe de pixels voisines sont changer de façon que les couleurs soient les même entre eux) est aussi créé de l'image originale. L'image pixélisée est utilisé pour représenter l'image originale sur le serveur central. A partir de l'image pixélisée, nous créerons les paramètres de la clé qui contrôlent la transformation chaotique. Une variété de filtres au niveau des pixels, blocs des pixels et de la représentation binaire ont été mis en œuvre pour permettre des opérations de traitement sur les images cryptées dans le système. La qualité du brouillement en utilisant les transformations chaotiques est un souci par rapport à la sécurité. Pour certaines valeurs de paramètres et dimensions d'images, on peut percevoir des fantômes de l'image originale. Pour ma thèse de maitrise, J'ai étudié les scenarios qui donnent naissance à des formations de fantômes. J'ai effectué de nombreuses méthodes expérimentales et proposer des simples testes pour pouvoir détecter les valeurs de paramètres qui doivent être évité.
APA, Harvard, Vancouver, ISO, and other styles
9

Basavarasu, Srinivasa R. "Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1376636620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Pianhui. "Research on digital image watermark encryption based on hyperchaos." Thesis, University of Derby, 2013. http://hdl.handle.net/10545/305004.

Full text
Abstract:
The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Image Encryption"

1

Machine learning in image steganalysis. Hoboken: Wiley, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jun, Tian, Tan Tieniu, Zhang Liangpei, Society of Photo-optical Instrumentation Engineers., Hua zhong gong xue yuan., Université Michel de Montaigne-Bordeaux III., Guo jia zi ran ke xue ji jin wei yuan hui (China), and China Jiao yu bu, eds. Image compression and encryption technologies: 22-24 October 2001, Wuhan, China. Bellingham, Wash: SPIE, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

NATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

NATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

S, Schmalz Mark, Society of Photo-optical Instrumentation Engineers., and Society for Industrial and Applied Mathematics., eds. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VI, with applications: 5 and 7 August 2003, San Diego, California, USA. Bellingham, Wash., USA: SPIE, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. Bellingham, Wash: SPIE, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

X, Ritter G., and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image pattern recognition, compression, coding, and encryption X, with applications: 26-27 August, 2007, San Diego, California, USA. Bellingham, Wash: SPIE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

S, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. Bellingham, Wash., USA: SPIE, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Image Encryption"

1

Praveenkumar, Padmapriya, and Amirtharajan Rengarajan. "Medical Image Encryption." In Cryptographic and Information Security, 297–320. Boca Raton, Florida : CRC Press, [2019]: CRC Press, 2018. http://dx.doi.org/10.1201/9780429435461-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Bing, Li Qian, and Hoi-Kwong Lo. "Quantum Encryption." In Optical and Digital Image Processing, 769–87. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527635245.ch34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Millán García-varela, Maria Sagrario, and Elisabet Pérez-Cabré. "Optical Data Encryption." In Optical and Digital Image Processing, 739–67. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527635245.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vanitha, V., and D. Akila. "Bio-medical Image Encryption Using the Modified Chaotic Image Encryption Method." In Artificial Intelligence on Medical Data, 231–41. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0151-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pfarrhofer, Roman, and Andreas Uhl. "Selective Image Encryption Using JBIG." In Communications and Multimedia Security, 98–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552055_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Binay Kumar, and Jagat Singh. "Multispectral Bayer Color Image Encryption." In Springer Proceedings in Mathematics & Statistics, 235–48. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1157-8_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hazra, Tapan Kumar, Kishlay Raj, M. Sumanth Kumar, Soummyo Priyo Chattopadhyay, and Ajoy Kumar Chakraborty. "Image Encryption Using Pseudorandom Permutation." In Advances in Intelligent Systems and Computing, 125–38. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1544-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mehra, Isha, and Naveen K. Nishchal. "Pan-Sharpened Image Optical Encryption." In Springer Proceedings in Physics, 441–44. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2367-2_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shyamala, P. "Chaos Based Image Encryption Scheme." In Communications in Computer and Information Science, 312–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19263-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sahoo, Aradhana, Pratyasha Mohanty, and Purna Chandra Sethi. "Image Encryption Using RSA Algorithm." In Intelligent Systems, 641–52. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0901-6_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Image Encryption"

1

Kim, Do-Hyung, No-Cheol Park, Sungbin Jeon, and Young-Pil Park. "Novel Method of Crosstalk Analysis in Multiple Image Encryption and Image Quality Equalization Technology." In ASME 2014 Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/isps2014-6909.

Full text
Abstract:
Novel crosstalk analysis method is suggested in optical encryption of multiple image. To optimize the total capacity of stored images in optical encryption of multiple images. We analyze the effect of crosstalk noise with each individual image by using suggested method. From the results, individual crosstalk robustness is verified with various target images and unbalance of image qualities among encrypted multiple images could be explained effectively. In addition, simple modulation method is adapted to equalizing image quality and it shows the highly improved results compare to conventional methods.
APA, Harvard, Vancouver, ISO, and other styles
2

KASHMAR, Ali H., Mohammed A. HAZZAA, and Ammar I. SHIHAB. "EFFICIENT IMAGE ENCRYPTION SCHEMES BASED ON DEVELOPING AES ALGORITHM WITH FUZZY FUNCTION." In III.International Scientific Congress of Pure,Appliedand Technological Sciences. Rimar Academy, 2021. http://dx.doi.org/10.47832/minarcongress3-11.

Full text
Abstract:
This paper suggests three image encryption schemes based on developing ofAdvance Encryption Standard (AES) algorithm with the employment of fuzzy function for diagnoses medical images. In the three proposed image encryption methods, the image is firstly scrambled using the: a) First Algorithm: start with applied AES algorithm then the result modulated with Fuzzy function; .b) Second Algorithm: start with modulated Fuzzy function then the result applied AES algorithm. c) Third Algorithm: star with combine between modulated Fuzzy function with each operations of AES algorithm. The usage of a fuzzy map as a pre-processing scrambling stage along with the AES algorithm gives the advantages of both the noise immunity from the fuzzy map and the security encryption from the AES algorithm. Furthermore, the Triangular Membership Function (TMF) parameters are utilized as additional extra keys that improve the security of the image encryption methods. The analysis results of the security as well as evaluate the efficiency of developed algorithms detect that the cipher text image acquired is the similar as the plaintext image and fuzzy set theory was suitable for apply as round function in the design of other block image ciphers. Moreover, the security properties, demonstrated that our designs were highly secure and robust against possible image cryptographic attacks. Finally, the NIST statistical test for randomness as well as performance comparison between proposed schemes with identical methods ciphers image revealed that the proposed algorithms were quite secure, efficient, and faster than the conventional block ciphers. Key words: Image encryption, Advance Encryption Standard (AES), Fuzzy set theory, Triangular Membership Function (TMF), Peak Signal-to-Noise Ratio (PSNR), National Institute of Standards and Technology (NIST).
APA, Harvard, Vancouver, ISO, and other styles
3

Tanaka, Masayuki. "Learnable Image Encryption." In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). IEEE, 2018. http://dx.doi.org/10.1109/icce-china.2018.8448772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Yicong, Karen Panetta, and Sos Agaian. "Image encryption using binary key-images." In 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2009. http://dx.doi.org/10.1109/icsmc.2009.5346780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

GUO, Zhenzhou, and Xintong LI. "Image Encryption Algorithm of Chaos System Adding Cosine Excitation Function." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120715.

Full text
Abstract:
In order to increase the chaotic performance of the chaotic system, the chaotic system A-S proposed by Sprott is improved by adding a cosine excitation function to a controller. A series of new chaotic systems are obtained, and the chaotic performance of the improved system is verified. The image is encrypted by the chaotic sequence generated by the improved A chaotic system. In the scrambling part of the image encryption algorithm, the zigzag transformation is improved, and different directions are selected to start the traversal, so that the scrambling process is not easy to be restored. The diffusion part draws on the traditional IDEA algorithm to perform diffusion operations on the image. Finally, the encryption algorithm is analyzed and tested, and the results show that the algorithm has fast encryption and decryption speed, sufficient key space, and can resist statistical analysis attacks well. The algorithm can provide better guarantee for the security of images.
APA, Harvard, Vancouver, ISO, and other styles
6

Quenaya, Merisabel Ruelas, Alejandro-Antonio Villa-Herrera, Samuel Felipe Chambi Ytusaca, Julio Enrique Yauri Ituccayasi, Yuber Velazco-Paredes, and Roxana Flores-Quispe. "Image Encryption using an Image Pattern based on Advanced Encryption Standard." In 2021 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE, 2021. http://dx.doi.org/10.1109/colcom52710.2021.9486298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mishra, Kapil, and Ravi Saharan. "Image encryption utilizing lossy image compression." In 2017 International Conference on Computer, Communications and Electronics (Comptelix). IEEE, 2017. http://dx.doi.org/10.1109/comptelix.2017.8004020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saudagar, Saleha, Mukund Kulkarni, Anshuman Giramkar, Shreyas Godse, Snehal Gupta, Gyaneshwari Patil, and Sangram Gunjal. "Image Encryption based on Advanced Encryption Standard (AES)." In 2023 International Conference for Advancement in Technology (ICONAT). IEEE, 2023. http://dx.doi.org/10.1109/iconat57137.2023.10080243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Xiaoyi, Jixin Ma, Miltos Petridis, and Wencai Du. "Temporal Ordered Image Encryption." In 2011 Third International Conference on Communications and Mobile Computing (CMC). IEEE, 2011. http://dx.doi.org/10.1109/cmc.2011.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jasra, Bhat, and Ayaz Hassan Moon. "Image Encryption techniques:A Review." In 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2020. http://dx.doi.org/10.1109/confluence47617.2020.9058071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography