Dissertations / Theses on the topic 'Image Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Image Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bowley, James. "Sparse image representation with encryption." Thesis, Aston University, 2013. http://publications.aston.ac.uk/20914/.
Full textAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textNorman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textCheng, Howard Chi Ho. "Partial encryption for image and video communication." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ34345.pdf.
Full textManiccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.
Find full textManisekaran, Pradheep [Verfasser]. "Image Encryption by Using ACGLML / Pradheep Manisekaran." München : GRIN Verlag, 2021. http://d-nb.info/123663103X/34.
Full textWadhwani, Sandeep. "Using chaotic encryption schemes in distributed image storage." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119757.
Full textLa sécurité et l'intimité des images électronique stockée dans des serveurs tierces est une des plus grandes préoccupations de nos jours. L'une des manières d'améliorée la sécurité est de crypter les données contenu dans les images avant de les télécharger vers le serveur en question. Cependant, le fait d'utiliser des techniques cryptographiques pour assurer la sécurité des images, ce la empêche l'application d'opérations de traitement d'images pendant qu'ils résident sur les serveurs. Pour résoudre ce problème, nous avons conçu et mis en œuvre un système distribué pour télécharger les images sur les serveurs qui est basée sur le protocole "Chord", améliorant la sécurité en utilisant des techniques de la théorie du chaos pour transformer l'image puis finalement la segmenter. Le système distribué que nous utilisons contient deux types de ressources : des ressources de serveur fiable et des ressources non fiables paires à pair. Les images sont cryptées avec l'application de l'algorithme chat d'Arnold, l'image résultante est divisée en morceaux avant d'être télécharger aux machines destinataires. L'algorithme de chat d'Arnold produit une image bruyante. Une image pixélisé (un groupe de pixels voisines sont changer de façon que les couleurs soient les même entre eux) est aussi créé de l'image originale. L'image pixélisée est utilisé pour représenter l'image originale sur le serveur central. A partir de l'image pixélisée, nous créerons les paramètres de la clé qui contrôlent la transformation chaotique. Une variété de filtres au niveau des pixels, blocs des pixels et de la représentation binaire ont été mis en œuvre pour permettre des opérations de traitement sur les images cryptées dans le système. La qualité du brouillement en utilisant les transformations chaotiques est un souci par rapport à la sécurité. Pour certaines valeurs de paramètres et dimensions d'images, on peut percevoir des fantômes de l'image originale. Pour ma thèse de maitrise, J'ai étudié les scenarios qui donnent naissance à des formations de fantômes. J'ai effectué de nombreuses méthodes expérimentales et proposer des simples testes pour pouvoir détecter les valeurs de paramètres qui doivent être évité.
Basavarasu, Srinivasa R. "Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1376636620.
Full textWu, Pianhui. "Research on digital image watermark encryption based on hyperchaos." Thesis, University of Derby, 2013. http://hdl.handle.net/10545/305004.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Ullagaddi, Vishwanath. "Development of Data Encryption Algorithms for Secure Communication Using Public Images." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341524458.
Full textWang, Mengmeng. "Optical Image encryption based on apertured FrMT in the Diffraction domain." Thesis, Poitiers, 2019. http://www.theses.fr/2019POIT2326.
Full textThis thesis focuses on the study of introducing the aperture into FrMT in diffraction domain (FrMT) and its application in optical image encryption system. The feasibility of the proposed encryption schemes is verified by a series of numerical simulations. The main work is as follows:Firstly, an optical image encryption scheme based on the fractional Mellin transform with a hard aperture has been proposed. The apertured fractional Mellin transform (apertured FrMT) can be performed through the log-polar transform and the apertured fractional Fourier transform in diffraction domain. The side-lengths of the hard aperture serve as a key to improve the security and further increase the key space of the encryption system. This hard aperture is not only used to control the amount of light passing the lens by adjusting its size, but also reduces the leakage of light, which will, to some extent, enhance the robustness against direct attacks.Secondly, the Gaussian aperture, as a soft aperture for balancing between hard aperture and no aperture, is introduced into the apertured FrMT. With the Gaussian apertured FrMT in diffraction domain, a reality-preserving transform is proposed and used for image encryption. In this encryption scheme, for gray image, the Arnold transform and the bitwise XOR operation are also adopted to encrypt the image in order to enhance the security.Finally, the encryption algorithm based on Gaussian apertured reality-preserving FrMT (GARPFrMT) used for color image is proposed. Besides, nonlinear GARPFrMT, color space rotation, together with 3D scrambling and bitwise XOR operation make the proposed color image encryption algorithm have good performance.The simulation results have shown that the proposed encryption schemes are capable of resisting different common attacks and robust against noise and occlusion attacks
Li, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Full textOrgill, Gregory Leavitt. "Java Performance of the Rijndael Encryption Algorithm Across Compilers and Virtual Machines." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd681.pdf.
Full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Roth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Full textSalles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.
Full textThesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
Chan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.
Full textSmith, Bryan. "Responding to policies at runtime in TrustBuilder /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd414.pdf.
Full textKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Full textHaider, Rizwan. "Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-29916.
Full textGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Full textYip, Shu Kei. "Digital watermarking and data hiding /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ECED%202006%20YIP.
Full textLi, Richard Yuk Ming. "Digital watermarking and data hiding /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LIR.
Full textZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Full textEncryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.
Fu, Ming Sun. "Data hiding watermarking for halftone images /." View abstract or full-text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20FU.
Full textLeung, Wing Pan. "Visual cryptography for color images : formal security analysis and new construction /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b23759100f.pdf.
Full text"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 103-108)
Soukal, David. "Advanced steganographic and steganalytic methods in the spatial domain." Diss., Online access via UMI:, 2006.
Find full textChaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Full textWoo, Tim. "A Scalable, Secure, and Energy-Efficient Image Representation for Wireless Systems." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/940.
Full textKailasanathan, Chandrapal. "Securing digital images." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041026.150935/index.html.
Full textNoura, Mohamad. "Solutions cryptographiques efficaces et sécurisées pour les données médicales." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCD037.
Full textIn this thesis, effective and robust cryptographic schemes were proposed to overcome the current security and privacy issues of recent medical systems and applications. The main contribution of this thesis is to reach a high level of security with minimum possible overhead contrary to many other existing solutions. Therefore, two cipher schemes and a data availability approach were proposed for medical data to ensure the following security services: data confidentiality, integrity and availability as well as source authentication. The proposed cryptographic solutions are based on the dynamic cryptographic cipher structures to ensure a better resistance against existing and modern attacks. Moreover, these solutions were designed to be lightweight and they require a small number of iterations. The proposed ciphers round function is iterated only once and uses a key dependent block permutation. It also satisfies the required confusion and diffusion properties, consequently ensuring the desirable cryptographic properties. Simulation and experimental results demonstrated the efficiency and the robustness of the proposed cryptographic solutions. Furthermore, employing the proposed cryptographic schemes open the door to a dynamic cryptographic algorithms that can lead to a significant performance and security gain compared with other recent related state-of-art
Mohamed, Ali. "Investigation of Anisoplanatic Chaos-based Signal and Image Transmission and Retrieval Through Atmospheric Phase Turbulence." University of Dayton / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1583406088398142.
Full textHe, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Full textIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Suresh, V. "Image Structures For Steganalysis And Encryption." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/2273.
Full textYen, Jun-Zhong, and 顏君仲. "Online/Offline Image Encryption Mechanism." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/47224732554143659596.
Full text國立臺灣海洋大學
資訊工程學系
101
In this paper, an online/offline image encryption scheme based on chaotic system to provide a high speed image encryption is proposed. Our scheme uses index value of chaotic system to rearrange for position of image pixel and accommodates the concept of online/offline to decrease the time of image encryption. The value of index and chaotic sequence are calculated before getting image that we called the offline stage. In the online stage, image encryption can be quickly carried out. Experiment results show that our proposed scheme outperforms previously proposed one.
Hsiao, Hung-Yi, and 蕭弘益. "A Study of Chaotic Image Encryption." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/r7p54c.
Full text中原大學
電機工程研究所
93
In this thesis, the chaotic image encryption is studied by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. By these chaotic properties, the positions and values of the pixels of original image are randomly rearranged with the user key. As a result, the cipher image is able to reach a good properties of diffusion and confusion. Our proposed new scheme of chaotic image encryption can be briefly described as follows. At first, we utilize the one-dimensional logistic map to generate the encryption key, scrambling image table and noise image. Then, the source image (i.e., plaintext) is scrambled with scrambling image table and performed exclusive OR operation with the encryption key. Furthermore, several transformed images according above procedures are embedded into a noise image by watermarking techniques to form a pre-encryption image. Finally, scrambling processes and exclusive OR operations with key length of 256, 512 and 1024 bits are executed to obtain the encryption image. Our contribution of the proposed new chaotic image encryption scheme is that, by MATLAB simulation, the cipher images have 6 good characteristics as follows. (1)The correlation between source image and cipher image is very small, almost equal to zero. That is, the source image and cipher image are mostly independent. In addition, the correlation among the cipher images is almost zero. This represents the cipher images are mostly independent, too. (2)The histogram of cipher image pixels is uniform nearly. Namely, our cipher image holds a good confusion property on the statistics. (3)From the simulation of the two-dimensional discrete Fourier transform and shift zero-frequency component of discrete Fourier transform to center of spectrum, we can discovery the energy at the spectrum is consistent, i.e., our cipher image possesses good diffusion property on the statistics. (4)The size of the noise image is able to be adjusted (the size of noise image must equal to or bigger than the size of source image) to protect the source image (plain image). Via the noise image, it lets us to get excellent confusion and diffusion properties of cipher images according to the MATLAB simulations. That is to say, our encryption method derives a good security on communication. (5)Our encryption algorithm is easy to implement on the IC chip. (6)The encryption performance is nice. To sum up, for our proposed new scheme of the chaotic image encryption, the noise image plays a important role. The cipher image characteristic of statistics on confusion and diffusion become excellent due to join the noise image. That is, our new chaotic image encryption method can acquire very fine ciphertext and communication safety.
Wu, Chang-Sian, and 巫昌憲. "A Study of Batch Image Encryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/93711550800291119496.
Full text國立嘉義大學
資訊工程學系研究所
95
As the network bandwidth has gained much more growth, it’s nowadays popular to share a large number of still images via the Internet by means batch transmission. This trend carries out people’s desire for enjoying online multimedia services. In order to keep the confidentiality of traveling images, traditional encryption techniques seem to be well designed to meet this requirement. However, it’s well-known that the size of image is generally much larger than that of text. Furthermore, partial distortion of images is allowed by human visual systems. Hence, traditional cryptographic encryption algorithms are sometimes not suitable for being used directly to encrypt a batch of images. On the other hand, most of the existing schemes aimed at encrypting a single image so that the schemes can potentially be improved to encrypt a batch of images at once in an efficient way. In this thesis, four novel batch image encryption algorithms based on either Visual Cryptography (VC) or Vector Quantization (VQ) are presented to benefit from their computational efficiency and low transmission bandwidth without damaging the original compression rate. The experimental results show the performance in terms of compression rate and extra encryption computational cost.
Ou-Yang, Yen, and 歐陽諺. "Fast Image Encryption Based on Lifting Wavelet Transform and Advanced Encryption Standard." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/89200471963606880129.
Full text大葉大學
資訊工程學系碩士班
99
In this thesis, We simulate wavelet hierarchical features, combined with the the look-up table of Advanced Encryption Standard, and the mix column’s finite fields GF(28) multiplication and addition, and propose a low-volume image encryption algorithm, which considers digital image as a big block and encryption of the big block. The selection and generation of subkey depends on the user’s key, make the encryption, decryption and key generation system use the same algorithm. The results (effects) of encryption and decryption can be achieved by only changing look-up table for encryption and decryption. The simulation results show the proposal can effectively resists various attacks when the encryption rounds are at least more than two rounds (ex. statistical analysis, differential attack ....). Our proposal uses the hierarchical concept of wavelet transformation as the concept of the rapid diffusion and confusion, with great avalanche effect.
劉江龍. "An Image Encryption Schme with Compression Effect." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/28801436180557353851.
Full text國防管理學院
資源管理研究所
83
A private key encryption scheme for a two-dimensional image data is proposed in this work. This scheme is designed on the basis of lossless data compression principle. The proposed scheme is developed to have both data encryption and compression performed simultaneously. For the lossless data compression effect, the quadtree data structure is used to represent the image; for the encryption purpose, various scanning sequences of image data are provided. The scanning sequences comprise of a private key for encryption. 24 possible combinations of scanning sequences are defined for accessing four quadrants, thereby making available 24n×4n(n-1)/2 possibilities to encode an image of resolution 2n×2n, The security of the proposed encryption scheme therefore relies on the computational infeasibility of an exhaustive search approach. Also, a differential quadtree encryption scheme for gray-level and color image is proposed to enhence the compression effect. Ten images of 512×512 pixels are used to verify the feasibility of the proposed scheme. Two of them are binary image. Five of them are gray images. and the rest three are color images. The results of testing and analysis demonstrate the characteristics of the proposed scheme. This scheme can be applied for problems of data storage or transmission in a public network.
Hsu, Y. H., and 許怡樺. "Image Hybrid Encryption Based on Chaotic Systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/92878874310440753110.
Full text國立彰化師範大學
工業教育與技術學系
99
Since the dynamic trajectory of chaos system has the high sensitivity to the initial value and the variation of parameter, the application of chaos system to encryption of images can improve the security of image transmission. This thesis proposes a chaos system based hybrid color-image technique with Arnold Cat Map (ACM), Baker Map (BM) and Line Map (LM). The proposed system can completely scatter the outline of images and disarray the distribution feature of color levels. Besides, it has an extreme key space. Eventually, an encryption software program which can demonstrates the dynamic trajectory of chaos system, the effect of encryption of images, and some statistic data of security is developed in the study. Security tests of the program include information entropy, relation coefficient, MSE, NPCR, and UACI. The experimental results prove the high effect and encryption security of the proposed technique. Keyword: Chaos System, Image encryption, Bit-Chaotic-Shuffle, Statistic data of security, Hybrid encryption.
Hsu, Po-Yu, and 許柏昱. "Secret Sharing with Image Encryption Access Control Mechanisms for Digital Images." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/dk5e2e.
Full text亞洲大學
資訊多媒體應用學系
103
Privacy is the import issue in recent years. To protect the image privacy, access control is the general way to authorize different groups with different abilities to see authorized contents. Visual cryptography is a technique to encode the secret image into several meaningless shares; Later, the secret image can be reconstructed by stacking shares without any computations. In visual cryptography, three main problems are discussed: pixel expansion, contrast and share management. Pixel expansion is the problem that the reconstructed image is bigger than the original one. Contrast is a measure to judge whether the reconstructed image is easy to recognize. Share management is the problem for administrator on difficult to manage and dispatch the shares to participants because the contents of shares are meaningless. The other techniques are image encryption and image authentication. Image encryption helps owners encrypt the image to prevent from secret leakage. Image authentication is used to authenticate whether the image is not a fake one. In this paper, two methods are provided. First, based on visual cryptography, a hybrid secret sharing with access control is proposed. The tag image is hidden into the shares. Next, the tag images can be obtained by self-stacking the shares for administrator to resolve the share management problem. Also, the experiments show no pixel expansion problem. The second method encrypts the whole or parts of secret image according to the authorization. The authentication codes are embedded back to the encrypted image. The authentication codes are extracted to judge whether the decrypted image is authentic. The experiments prove its feasibility and effective.
Yu-Chia, Liu, and 劉育嘉. "Acceleration of the Encryption of Digital Medical Image." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/59589941446042049381.
Full text台北醫學院
醫學資訊研究所
89
The hospital digitalization makes all doctors got more quick and efficient work. Digital image transits for end to end to doctors for diagnosis or other purpose at 1’st step, this need time control. So big as digital image data for transits is already wasting time, now we need to maintain security issue too, so it waste more time to have security procedure as encryption, water marking, digital signature… At our encryption, we have use all now a day encryption techniques and make use of unimodular mathematical algorithm for our architecture of digital image data. Now, we announce new algorithm for faster encryption to only digital images and should makes doctors have their information at most first time.
Chuang, Ming-Chuan, and 莊銘權. "Suitable for JPEG 2000 Image Encryption/Decryption Scheme." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/85047454584863342890.
Full text國防大學中正理工學院
電子工程研究所
96
Image encryption is a very important part for image security. Image compression technologies change with each passing day. They not only improve compression efficiency, but also provide a rich set of features for a variety of applications. Therefore, an efficient image encryption method should be developed according to the characteristics of the compression technique itself. JPEG 2000 is an emerging standard for still image compression. JPEG 2000 provides various functionalities to solve the problems for different image applications and possibly become a most popular image format. Therefore, JPEG 2000 image encryption has become a hot topic for image security. One of the important properties of JPEG 2000 codestream is that the two consecutive bytes in the packet body should be in the interval [0x0000, 0xFF8F] so that a standard JPEG 2000 decoder can exactly decode the JPEG 2000 compressed codestream. This is so called the compatibility of JPEG 2000 and should be followed by an effective JPEG 2000 encryption method. This thesis proposes a cryptography-based JPEG 2000 image encryption technique which uses the stream cipher to encrypt the JPEG 2000 codestream. To be compatible with the syntax of JPEG 2000, the proposed technique replaces the syntax non-compliant bytes with syntax compliant bytes and records the positions of these bytes as the deciphering information. The deciphering information is then embedded in the header of the JPEG 2000 codestream making use of the characteristics of the syntax of the JPEG 2000 to facilitate the decryption in the decoding side. Experimental results show that the proposed JPEG 2000 image encryption scheme not only can be compliant with the syntax of JPEG 2000, but also can encrypt the entire packets of the JPEG 2000 codestream. That is, the proposed technique has good compatibility and security. Moreover, because the extra deciphering information generated in the encryption process is very small, the proposed technique is also compression equivalent. According to the good properties mentioned above, the proposed JPEG 2000 image encryption technique can provide effective protection of JPEG 2000 images in various applications.
Barakat, Mohamed L. "Hardware Realization of Chaos Based Symmetric Image Encryption." Thesis, 2012. http://hdl.handle.net/10754/234953.
Full textWang, Chin-Yuan, and 王群元. "FPGA Implementation of Chaos Algorithm for Image Encryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/14013934425841318521.
Full text國立成功大學
工程科學系碩博士班
95
A FPGA-based image capture system with chaotic encryption is developed in this thesis. The immediate image is captured via the COMS sensor, and then encrypted and decrypted by FPGA module. The Logistic map is employed as the encryption algorithm, which designed by the IEEE 754 floating point module to improve the accuracy of the result. For testing the feasibility of this system, the solutions of encryption and decryption are presented and valided on PC. It has been shown that this system can work effectively for image encryption and decryption operations.
Yekkala, Anil Kumar. "Analysis And Design Of Image And Video Encryption Algorithms." Thesis, 2006. http://hdl.handle.net/2005/436.
Full textChen, Ji-Tian, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57512107312564452704.
Full textLIU, SHANG-SHIN, and 劉尚鑫. "Reversible Data Hiding and Image Encryption in Frequency Domain." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/z9quac.
Full text國立屏東大學
資訊科學系碩士班
105
In recent years, the transmission of information has become more and more widespread. Open and widespread network has become a public contact pathway with each other. In the convenient and rapid times, the danger behind the network is the security issue of information transmission. Mostly, we do not know where the on-hand media files come from. The condition of knowing to use but knowing the source is growing. In this situation, it may that we have accidentally offended against the law but we do not know. Therefore, many people claim that they hold the files at first hand by illegal methods. How to protect the transmission of information and authenticate the message is an important thing obviously. In this thesis, we propose a reversible data hiding and image encrypting method in the frequency domain. We use the wavelet transform to transfer images from the spatial domain into the frequency domain, and encrypt the vision-sensitive low band using the RC4 stream cipher. Then, the secret message is reversibly embedded into the middle and high bands by the PVO approach and the middle and high bands are permutated to increase security. Finally, the processed results are compressed by the ZIP method. Experimental results show that our proposed method has nice encrypted effect in vision and can extract hidden hiding data correctly.