• Nenhum resultado encontrado

An image encryption algorithm utilizing julia sets and hilbert curves.

N/A
N/A
Protected

Academic year: 2017

Share "An image encryption algorithm utilizing julia sets and hilbert curves."

Copied!
9
0
0

Texto

Loading

Imagem

Figure 1. The scrambling process. It is assumed that A, B and C are coordinates in the image, and their pixel values of the R-layer are denoted by (a 7 a 6 a 5 a 4 a 3 a 2 a 1 a 0 ), (b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 ) and (c 7 c 6 c 5 c 4 c 3 c 2 c 1 c 0 )
Figure 3. Encryption process. The encryption process can be recycled in the circulation encryption for a better effect
Figure 6. Partial image. This image is partial enlarged one from the Figure 4, and the enlarged area is 20.466866–0.426705 of X-axis, and 20.603235–0.563074 of Y-axis.
Figure 8. Cipher image. The encryption image is obtained through the scrambling process and the diffusion process.
+5

Referências

Documentos relacionados

The position of the data is scrambled in the order of randomness of the elements obtained from the chaotic map and again rearranged back to their original position in

Figure 14 (b) -(d) shows the Lena image encrypted by our proposed algorithm, the FT-based algorithm and the FRT-based algorithm; after 70% of pixels were cropped, the

In this paper we have used capabilities and features of hyper chaos functions such as sensitivity to initial values, random behavior, non-periodic and certainty

Cryptography or sometimes referred to as encipherment is used to convert the plaintext to encode or make unreadable form of text [1]. The sensitive data are

The entropy of the watermarked image and correlation coefficient of extracted watermark image is very close to ideal values, proving the correctness of proposed

For lossy compression based on RLE algorithm and its modifications I2BN and I3BN, Zip algorithms, Rar and Huffman algorithm used two-threshold progressive image

The algorithm encryption and decryption of an image transform an image into cipher code using the random keys, which allow users to have confidentiality and security in

An attacker can examine the histogram of an encrypted image (red, green and blue) using the algorithms of attack and the statistical analysis of the encrypted image