Academic literature on the topic 'Image Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Image Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Image Encryption"
Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (March 13, 2021): 341. http://dx.doi.org/10.3390/e23030341.
Full textAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Full textRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Full textWang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (December 16, 2022): 9929. http://dx.doi.org/10.3390/s22249929.
Full textKovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Full textHuang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Full textWu, Junfeng, Jialu Zhang, Dong Liu, and Xiaofeng Wang. "A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding." Entropy 25, no. 6 (June 3, 2023): 898. http://dx.doi.org/10.3390/e25060898.
Full textKouadra, Imane, Mehamal Bouchra, Tewfik Bekkouche, and Lahcene Ziet. "Encryption face area in color images using Chaotic Maps." International Conference on Pioneer and Innovative Studies 1 (June 13, 2023): 501–6. http://dx.doi.org/10.59287/icpis.880.
Full textAbeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (January 17, 2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Full textKumari, Abinaya, B. Akshaya, B. Umamaheswari, K. Thenmozhi, Rengarajan Amirtharajan, and Padmapriya Praveenkumar. "3D Lorenz Map Governs DNA Rule in Encrypting DICOM Images." Biomedical and Pharmacology Journal 11, no. 2 (June 26, 2018): 897–906. http://dx.doi.org/10.13005/bpj/1446.
Full textDissertations / Theses on the topic "Image Encryption"
Bowley, James. "Sparse image representation with encryption." Thesis, Aston University, 2013. http://publications.aston.ac.uk/20914/.
Full textAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textNorman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textCheng, Howard Chi Ho. "Partial encryption for image and video communication." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ34345.pdf.
Full textManiccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.
Find full textManisekaran, Pradheep [Verfasser]. "Image Encryption by Using ACGLML / Pradheep Manisekaran." München : GRIN Verlag, 2021. http://d-nb.info/123663103X/34.
Full textWadhwani, Sandeep. "Using chaotic encryption schemes in distributed image storage." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119757.
Full textLa sécurité et l'intimité des images électronique stockée dans des serveurs tierces est une des plus grandes préoccupations de nos jours. L'une des manières d'améliorée la sécurité est de crypter les données contenu dans les images avant de les télécharger vers le serveur en question. Cependant, le fait d'utiliser des techniques cryptographiques pour assurer la sécurité des images, ce la empêche l'application d'opérations de traitement d'images pendant qu'ils résident sur les serveurs. Pour résoudre ce problème, nous avons conçu et mis en œuvre un système distribué pour télécharger les images sur les serveurs qui est basée sur le protocole "Chord", améliorant la sécurité en utilisant des techniques de la théorie du chaos pour transformer l'image puis finalement la segmenter. Le système distribué que nous utilisons contient deux types de ressources : des ressources de serveur fiable et des ressources non fiables paires à pair. Les images sont cryptées avec l'application de l'algorithme chat d'Arnold, l'image résultante est divisée en morceaux avant d'être télécharger aux machines destinataires. L'algorithme de chat d'Arnold produit une image bruyante. Une image pixélisé (un groupe de pixels voisines sont changer de façon que les couleurs soient les même entre eux) est aussi créé de l'image originale. L'image pixélisée est utilisé pour représenter l'image originale sur le serveur central. A partir de l'image pixélisée, nous créerons les paramètres de la clé qui contrôlent la transformation chaotique. Une variété de filtres au niveau des pixels, blocs des pixels et de la représentation binaire ont été mis en œuvre pour permettre des opérations de traitement sur les images cryptées dans le système. La qualité du brouillement en utilisant les transformations chaotiques est un souci par rapport à la sécurité. Pour certaines valeurs de paramètres et dimensions d'images, on peut percevoir des fantômes de l'image originale. Pour ma thèse de maitrise, J'ai étudié les scenarios qui donnent naissance à des formations de fantômes. J'ai effectué de nombreuses méthodes expérimentales et proposer des simples testes pour pouvoir détecter les valeurs de paramètres qui doivent être évité.
Basavarasu, Srinivasa R. "Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1376636620.
Full textWu, Pianhui. "Research on digital image watermark encryption based on hyperchaos." Thesis, University of Derby, 2013. http://hdl.handle.net/10545/305004.
Full textBooks on the topic "Image Encryption"
Jun, Tian, Tan Tieniu, Zhang Liangpei, Society of Photo-optical Instrumentation Engineers., Hua zhong gong xue yuan., Université Michel de Montaigne-Bordeaux III., Guo jia zi ran ke xue ji jin wei yuan hui (China), and China Jiao yu bu, eds. Image compression and encryption technologies: 22-24 October 2001, Wuhan, China. Bellingham, Wash: SPIE, 2001.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Find full textNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Find full textS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers., and Society for Industrial and Applied Mathematics., eds. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VI, with applications: 5 and 7 August 2003, San Diego, California, USA. Bellingham, Wash., USA: SPIE, 2004.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. Bellingham, Wash: SPIE, 2001.
Find full textX, Ritter G., and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image pattern recognition, compression, coding, and encryption X, with applications: 26-27 August, 2007, San Diego, California, USA. Bellingham, Wash: SPIE, 2007.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. Bellingham, Wash., USA: SPIE, 1998.
Find full textBook chapters on the topic "Image Encryption"
Praveenkumar, Padmapriya, and Amirtharajan Rengarajan. "Medical Image Encryption." In Cryptographic and Information Security, 297–320. Boca Raton, Florida : CRC Press, [2019]: CRC Press, 2018. http://dx.doi.org/10.1201/9780429435461-11.
Full textQi, Bing, Li Qian, and Hoi-Kwong Lo. "Quantum Encryption." In Optical and Digital Image Processing, 769–87. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527635245.ch34.
Full textMillán García-varela, Maria Sagrario, and Elisabet Pérez-Cabré. "Optical Data Encryption." In Optical and Digital Image Processing, 739–67. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527635245.ch33.
Full textVanitha, V., and D. Akila. "Bio-medical Image Encryption Using the Modified Chaotic Image Encryption Method." In Artificial Intelligence on Medical Data, 231–41. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0151-5_20.
Full textPfarrhofer, Roman, and Andreas Uhl. "Selective Image Encryption Using JBIG." In Communications and Multimedia Security, 98–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552055_10.
Full textSingh, Binay Kumar, and Jagat Singh. "Multispectral Bayer Color Image Encryption." In Springer Proceedings in Mathematics & Statistics, 235–48. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1157-8_20.
Full textHazra, Tapan Kumar, Kishlay Raj, M. Sumanth Kumar, Soummyo Priyo Chattopadhyay, and Ajoy Kumar Chakraborty. "Image Encryption Using Pseudorandom Permutation." In Advances in Intelligent Systems and Computing, 125–38. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1544-2_11.
Full textMehra, Isha, and Naveen K. Nishchal. "Pan-Sharpened Image Optical Encryption." In Springer Proceedings in Physics, 441–44. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2367-2_55.
Full textShyamala, P. "Chaos Based Image Encryption Scheme." In Communications in Computer and Information Science, 312–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19263-0_38.
Full textSahoo, Aradhana, Pratyasha Mohanty, and Purna Chandra Sethi. "Image Encryption Using RSA Algorithm." In Intelligent Systems, 641–52. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0901-6_56.
Full textConference papers on the topic "Image Encryption"
Kim, Do-Hyung, No-Cheol Park, Sungbin Jeon, and Young-Pil Park. "Novel Method of Crosstalk Analysis in Multiple Image Encryption and Image Quality Equalization Technology." In ASME 2014 Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/isps2014-6909.
Full textKASHMAR, Ali H., Mohammed A. HAZZAA, and Ammar I. SHIHAB. "EFFICIENT IMAGE ENCRYPTION SCHEMES BASED ON DEVELOPING AES ALGORITHM WITH FUZZY FUNCTION." In III.International Scientific Congress of Pure,Appliedand Technological Sciences. Rimar Academy, 2021. http://dx.doi.org/10.47832/minarcongress3-11.
Full textTanaka, Masayuki. "Learnable Image Encryption." In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). IEEE, 2018. http://dx.doi.org/10.1109/icce-china.2018.8448772.
Full textZhou, Yicong, Karen Panetta, and Sos Agaian. "Image encryption using binary key-images." In 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2009. http://dx.doi.org/10.1109/icsmc.2009.5346780.
Full textGUO, Zhenzhou, and Xintong LI. "Image Encryption Algorithm of Chaos System Adding Cosine Excitation Function." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120715.
Full textQuenaya, Merisabel Ruelas, Alejandro-Antonio Villa-Herrera, Samuel Felipe Chambi Ytusaca, Julio Enrique Yauri Ituccayasi, Yuber Velazco-Paredes, and Roxana Flores-Quispe. "Image Encryption using an Image Pattern based on Advanced Encryption Standard." In 2021 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE, 2021. http://dx.doi.org/10.1109/colcom52710.2021.9486298.
Full textMishra, Kapil, and Ravi Saharan. "Image encryption utilizing lossy image compression." In 2017 International Conference on Computer, Communications and Electronics (Comptelix). IEEE, 2017. http://dx.doi.org/10.1109/comptelix.2017.8004020.
Full textSaudagar, Saleha, Mukund Kulkarni, Anshuman Giramkar, Shreyas Godse, Snehal Gupta, Gyaneshwari Patil, and Sangram Gunjal. "Image Encryption based on Advanced Encryption Standard (AES)." In 2023 International Conference for Advancement in Technology (ICONAT). IEEE, 2023. http://dx.doi.org/10.1109/iconat57137.2023.10080243.
Full textZhou, Xiaoyi, Jixin Ma, Miltos Petridis, and Wencai Du. "Temporal Ordered Image Encryption." In 2011 Third International Conference on Communications and Mobile Computing (CMC). IEEE, 2011. http://dx.doi.org/10.1109/cmc.2011.71.
Full textJasra, Bhat, and Ayaz Hassan Moon. "Image Encryption techniques:A Review." In 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2020. http://dx.doi.org/10.1109/confluence47617.2020.9058071.
Full text